Category / General / Learning / Review

    Loading posts...
  • uCertify-CS0-001-complete-Course-Review-cover

    uCertify CS0-001-complete Course Review

    I was approached by the marketing department of uCertify to review one of their exam preparation kits and write about it. I chose the CS0-001-complete course which covers the CompTIA CySA+ CS0-001 exam. It made sense to do this one as I’m studying for the Cysa+ certification. However, the courses are more expensive when compared to similar products. At the same time, the materials and content included is much more…

  • Vulnerability-Disclosure-Programs-cover-page

    Vulnerability Disclosure Programs

    This is a quick post on what a vulnerability disclosure program. I will explain it in more detail later on. A vulnerability disclosure program, also known as a bug bounty, is a program in which a company allows independent researchers to report vulnerabilities to the interested the company. To put it in other words. You own a company, a security researcher approaches you. He lets you know of a potentially…

  • content-filter-diagram

    Public Wifi and the online content filters

    Popular chains that offer free Wi-Fi to its patrons have begun implementing content filters. The popular coffee chain Starbucks being the most recent, deploying theirs in 2019. The sole reason for this? Porn. Prevalent usage of porn at all hours of the day, sometimes in broad daylight. This article is not to discuss why or when deployed. There are many articles that go in to further details about this. No,…

  • Coffee Reccomendation Bot

    I made a Twitter bot that suggests coffee recommendations. It tweets once every 3 hours and was built using cheapbotsdonequick.com. It is built upon the Tracery and JSON framework.  It is still in progress and I will continue to update the code to allow for more options. Currently, it uses the Starbucks menu as that is the largest coffeehouse chain in the US. 

  • IBM QRadar Installation

    Installing Qradar is a straightforward process, but sometimes complications can arise. For instance, In the latest CentOS release, there seems to be a repository missing. This guide is best suited for those who have already installed CentOS7 and have the QRadar ISO file ready to go but have run into some issues. Scouring the internet and its various forums, I found a great guide that seemed to resolve my issues.…

  • The CIA Triad

    Confidentiality, Integrity, and Availability are three terms that form the foundation for a good security base. If these terms are maintained then your security posture will be adequate. In the field of information security, this is something we (companies and individuals) all strive to attain and keep. Confidentiality – The information is secure from outside forces or anyone who is not authorized to view. Example: your cat photos will be…

  • How to spot a phishing email – #1

  • World Password Day Poster

  • World Password Day!

    Happy world password day! Celebrate by changing your passwords or enabling multi-factor authentication on your accounts. Remember that password can be categorized by the following: What you know – passwords, pins, passphrases What you have – USB token, cell phone, badge Who you are – fingerprints, retina scans   The best form of security is whats known as a layered defense where you combine authentication methods. For example, combine your…

  • close-up-key-keyboard

    Passwords – What are they?

    What is a password? A password is a series of numbers or letters in a sequence that when entered will grant you access to a software or system. When you create an account you are prompted for a password to be able to unlock it and gain access to your account. This allows you to use the system. Another way would be to imagine that you bought a house and…