top of page
Crafting Your Tech Odyssey: A Journey Through Resume Building
Introduction: In the labyrinth of the tech industry, your resume is your guiding beacon, illuminating the path toward your dream job....
May 18, 20244 min read
176 views
0 comments
Beyond Secrecy: The CIA Triad - More Than Just Classified Information
Ever heard the term "CIA Triad" and wondered if it had anything to do with the intelligence agency? Well, it does, but in a different...
Apr 7, 20242 min read
22 views
0 comments


What is TCP/IP?
TCP/IP, which stands for Transmission Control Protocol/Internet Protocol, is a suite of communication protocols that form the backbone of...
Nov 14, 20233 min read
21 views
0 comments


(WIP) Project Title: Securing a Small Network
Overview This project aims to demonstrate foundational cybersecurity skills by securing a small network environment. The focus will be on...
Nov 11, 20233 min read
20 views
0 comments


An Introduction to the Cyber Kill Chain: Unveiling the Seven Stages of Cyber Attacks
Introduction In today's digital landscape, where businesses and individuals rely heavily on technology, the threat of cyber attacks looms...
Aug 24, 20233 min read
10 views
0 comments


Mastering the Art of Encryption: Unveiling the Power of Symmetric and Asymmetric Encryption
Photo Credit: https://www.fortra.com/solutions/data-security/encryption In an increasingly digital world, the need to protect sensitive...
Jun 18, 20233 min read
10 views
0 comments

Mastering the Cyber Kill Chain: Defending Against Advanced Threats
In today's interconnected world, where technology permeates every aspect of our lives, the importance of cybersecurity cannot be...
May 18, 20233 min read
11 views
0 comments

Demystifying the OSI 7-Layer Model: Understanding the Function of Each Layer
The OSI (Open Systems Interconnection) 7-layer model is a fundamental concept in networking and plays a crucial role in understanding how...
May 15, 20232 min read
16 views
0 comments

Penetration Test Detailed Report | Target:Artemis (Fictional)
Detailed Technical Report Title: Technical Vulnerability Assessment Report for Artemis Prepared By: Daniel Song Prepared For: Artemis...
May 10, 202310 min read
107 views
0 comments

The Triad of Security: Safeguarding Confidentiality, Ensuring Integrity, and Providing Availability
Confidentiality, integrity, and availability, also known as the CIA triad, is a fundamental concept in information security. The CIA...
May 5, 20232 min read
4 views
0 comments

Cybersecurity Essential Terminology
In today's digital age, cybersecurity is more important than ever. With the increasing frequency and severity of cyber attacks, it's...
May 3, 20232 min read
6 views
0 comments

Operating Systems, what are they?
Before delving into the more technical aspects, let's start with the basics: What exactly is an operating system? We use technology in...
Apr 30, 20232 min read
14 views
0 comments
6 Fundamental Concepts Every Beginner Should Know About Cybersecurity
As a beginner in cybersecurity, it can be overwhelming to know where to start. The cybersecurity field is constantly evolving and new...
Apr 30, 20232 min read
37 views
2 comments
bottom of page