Cybersecurity Notes Splunk SIEM Study Notes | Cybersecurity Notes A comprehensive Splunk Study Guide breaks the ecosystem into three foundational components
Cybersecurity Notes Snort IDS Study Notes | Cybersecurity Notes this Snort Study Guide dives into the architecture behind detection logic from crafting custom detection rules
Cybersecurity Notes Computer Forensics Field Notes | Cybersecurity Notes These computer forensics notes and digital forensics notes are designed to serve as a comprehensive operational reference elevating digital evidence
Cybersecurity Notes Blue Team Study Notes | Cybersecurity Notes These Blue Team Notes and SOC Analyst Notes are designed as a practical Mastermind-level reference bringing together 790+ pages
R Programming Notes For Data Analysts You can also view the post content in a colorful format in my website
Google Data Analytics Professional Certificate Review and Summary Today I finished the Google Data Analytics Professional Certificate
Data Visualization and Dashboards with Excel and Cognos So in this post, I will outline the notes I have taken to summarise the course content in order to make things easier for those who don’t…
Excel Basics For Data Analysis — IBM Data Analyst Professional Certificate Review This is the second post that is part of reviewing the IBM Data Analyst Professional Certificate From IBM and Coursera. You can read the…
How to test if your exchange server is compromised and vulnerable In this post, I will briefly talk about testing your on-premises Microsoft exchange server is vulnerable to CVE-2021–26855, CVE-2021–26857…
Using Metasploit and Nmap to enumerate and scan for vulnerabilities In this article, we will discuss combining Nmap and Metasploit together to perform port scanning and enumerate for vulnerabilities.
IBM IT Fundamentals for Cybersecurity Certificate Review — Coursera If you have been trying to pass IBM Cybersecurity Analyst professional certificate and you are still failing then its time to take this…