Blog

Your blog category

How I Passed the GSEC Exam

What is the GSEC Exam? The GIAC Security Essentials (GSEC) exam is one of many certifications that is provided by GIAC. This is my second ever GIAC exam after I took the GIAC Fundamental Cybersecurity Technologies (GFACT) exam last year. Unlike the beginner-level GFACT exam (which was a 200-level exam), GSEC is a 400-level GIAC

How I Passed the GSEC Exam Read More »

Cisco Packet Tracer: Protocols

Whether you are looking to brush up on your computer networking skills, aiming to become a network administrator, or gain an advantage in this year’s CyberPatriot competition, Cisco packet tracer is a free network simulation tool that will provide you vital hands-on experience. Throughout these next few weeks, I will be posting many blogs related

Cisco Packet Tracer: Protocols Read More »

Cisco Packet Tracer: IOS Navigation

Whether you are looking to brush up on your computer networking skills, aiming to become a network administrator, or gain an advantage in this year’s CyberPatriot competition, Cisco packet tracer is a free network simulation tool that will provide you vital hands-on experience. Throughout these next few weeks, I will be posting many blogs related

Cisco Packet Tracer: IOS Navigation Read More »

email, newsletter, email marketing-3249062.jpg

What Happens When You Send an Email?

As the internet contributes more and more to our lives, communicating through email becomes more common. Millions of emails are“send” sent every second, but what actually happens when you click that “send” button? After reading this blog, you will have a deeper understanding of how emails are sent from one user to another! Email Servers

What Happens When You Send an Email? Read More »

How To Use Metasploit

In this blog, we will explore the functionalities of Metasploit– an adaptable penetration testing framework. No matter where you are in your journey of becoming a proficient ethical hacker, knowing how to use MetaSploit will aid you in your everyday work. This guide will provide you with a foundational understanding of Metasploit and how to

How To Use Metasploit Read More »

transformation, web, brain-4707710.jpg

How does the OSI Model work?

The OSI model (Open Systems Interconnection model) is a way of describing how devices send and receive data in a network. It is a theoretical model which allows devices with completely different functions to interact with each other. This model contains seven layers, and in each layer the data goes through a different process to

How does the OSI Model work? Read More »

Page 1 of 2
1 2