CyberSec. رب إني لما أنزلت إلي من خير فقير 🤲
المدينة المنورة
Do you know what it is? if no please repost and I will answer :)
#Islam #Art #photo #photoscape #Structure #Travel #arabia
#Visit #architecture #scene
المدينة المنورة
Do you know what it is? if no please repost and I will answer :)
#Islam #Art #photo #photoscape #Structure #Travel #arabia
#Visit #architecture #scene
Cryptography✅
Encryption and it's type ✅
Hashing ✅
Digital Signatures✅
SSL AND TLS✅
Cryptography✅
Encryption and it's type ✅
Hashing ✅
Digital Signatures✅
SSL AND TLS✅
Security control ✅
Firewall ✅
Intrusion Detection system ✅
VPNs✅
Intrusion prevention system ✅
Network segmentation ✅
Security control ✅
Firewall ✅
Intrusion Detection system ✅
VPNs✅
Intrusion prevention system ✅
Network segmentation ✅
1.I've been Documenting all my journey both online and offline.
2. I haven't seen the link for the lazarus news but I made a research online and found lazarus as a group of unknown numbers of hackers
1.I've been Documenting all my journey both online and offline.
2. I haven't seen the link for the lazarus news but I made a research online and found lazarus as a group of unknown numbers of hackers
Case study : Wanna cry and talk talk data breachs.
Wanna cry is an example of crypto Ransomware attack that happened. Where attackers targeted computers running Microsoft windows worldwide.
Case study : Wanna cry and talk talk data breachs.
Wanna cry is an example of crypto Ransomware attack that happened. Where attackers targeted computers running Microsoft windows worldwide.
CTI cyber threats intelligence and analysis.
Is the act of gathering and analysing information on potential attacks that can harm organizations.
CTI cyber threats intelligence and analysis.
Is the act of gathering and analysing information on potential attacks that can harm organizations.
Studied cyber attack techniques and anti virus software and endpoint protection.
Studied cyber attack techniques and anti virus software and endpoint protection.
Dive deeper into vulnerability and exploit, Social engineering , how to recognize phishing attempts.
Full post coming up later.
Dive deeper into vulnerability and exploit, Social engineering , how to recognize phishing attempts.
Full post coming up later.
#100DaysOfCyberSecurity
Threats VS Attacks:
Threats are potential warning or danger.
Attack is when the harmful action actually happens.
#100DaysOfCyberSecurity
Threats VS Attacks:
Threats are potential warning or danger.
Attack is when the harmful action actually happens.
My personal life assess (practical)
And Recap/Summary of what I have learned through out this journey.
My personal life assess (practical)
And Recap/Summary of what I have learned through out this journey.
Day 8 of #35DaysOfLearningSecurity #NoFails
Case study of Security breaches:
Cyber attacks are on the rise, posing significant risks to organization.
Implement robust cybersecurity measures and focus on collaboration.
Day 8 of #35DaysOfLearningSecurity #NoFails
Case study of Security breaches:
Cyber attacks are on the rise, posing significant risks to organization.
Implement robust cybersecurity measures and focus on collaboration.
Cybersecurity controls are Mechanism or techniques for protecting organizations from a certain cyber attacks
Cybersecurity controls are Mechanism or techniques for protecting organizations from a certain cyber attacks
Security design is proactive approach that integrates security into design and development of software, hardware and systems. It focus on creating robust resilient and resistant systems and also addressing
Security design is proactive approach that integrates security into design and development of software, hardware and systems. It focus on creating robust resilient and resistant systems and also addressing
Learned recursive algorithm and solved recursive fibonacci sequence problem.
I did it in school oo but I understand it better now😂.
Screenshot of yesterday's work and worked on power of two algorithm function
Social engineering
DoS/DDoS
On path attack
SEO optimization
Password cracking.
Social engineering
DoS/DDoS
On path attack
SEO optimization
Password cracking.
Learned recursive algorithm and solved recursive fibonacci sequence problem.
I did it in school oo but I understand it better now😂.
Screenshot of yesterday's work and worked on power of two algorithm function
Learned recursive algorithm and solved recursive fibonacci sequence problem.
I did it in school oo but I understand it better now😂.
Threat and attack:
Any potential danger to information and exploiting the vulnerabilities to steal or damage data.
I have an assignment on this but my network is failing, I'll do it later.
Threat and attack:
Any potential danger to information and exploiting the vulnerabilities to steal or damage data.
I have an assignment on this but my network is failing, I'll do it later.
Screenshot of yesterday's work and worked on power of two algorithm function
Screenshot of yesterday's work and worked on power of two algorithm function
Learned Math algorithms: wrote code function of fibonacci sequence, factorial of number and prime number.
Learned Math algorithms: wrote code function of fibonacci sequence, factorial of number and prime number.