What is Deception and Disruption Technology?
Understand how common types of deception and disruption technologies can be used to capture information on an attacker and their techniques.
Understand how common types of deception and disruption technologies can be used to capture information on an attacker and their techniques.
Understand the common forms of physical security controls that can protect an organisation's assets.
Understand what Zero Trust security is, how it works, and why it is essential in modern networks.
Understand the concept of a security gap analysis and why they are important.
Compare and contrast various types of security controls.
Is Linux a Kernel or an Operating System? Let's solve the longstanding misconception around what Linux really is.
When people say "Linux", they're usually referring to an Operating System rather than just the Linux Kernel. These operating systems are known as Linux Distributions or 'Distros'. Let's take a look at what distros are.
Have you ever wondered what makes up the Linux Operating System and how it works together? Well let's take a look!
The linux directory structure explained. What are the key directories involved and what are they for?
Linux follows five core principles which define its philosophy. What are they?
For many of us that have lived our entire lives within the Windows or MacOS ecosystem, the name Linux either doesn't ring a bell or you may just associate it with hackers you see on TV. So what actually is Linux?
Is it possible to mine Crypto with a Raspberry Pi? If you've ever wondered if a Raspberry Pi can mine cryptocurrencies and how you can do it yourself, then you're in the right place to find out. SPOILER I understand that some of you may not
In this article we will be covering how to enable SSH and WiFi on a Raspberry Pi without a monitor so that you may still access and put your Pi to use without having a desktop environment. Equipment List Required: * A PC with an Internet Connection. * Raspberry Pi * Power Supply
Equipment List Required: * A PC with an Internet Connection. * Raspberry Pi * Power Supply * Micro SD Card (At least 4gb recommended) * Micro SD Card Reader (If your PC doesn't have one already) If using Desktop Environment: * Micro HDMI to HDMI Cable * Monitor * Keyboard * Mouse Optional: * Ethernet cable (If not
What is a VPN? A VPN, is short for "Virtual Private Network", these allow you to create a secure network connection over a less secure public network. VPNs encrypt your internet traffic to make it challenging for third parties to track your online activities or steal your data.
Google Dorking is a powerful technique that leverages advanced search operators to refine search results and locate specific information indexed by Google.
Science & Technology
What is Quantum Computing? What are the Benefits of Quantum Computing? What Challenges does Quantum Computing face? What are the Impacts of Quantum Computing?
Cyber-Security
What is OSINT? Who uses OSINT? OSINT Sources. How is OSINT gathered? Applications of OSINT. Benefits of OSINT. Disadvantages of OSINT. Future Impacts on OSINT.
Cyber-Security
What are the Three Primary Strands of Cyber-Security? What is Governance? What is Risk Management? What is Compliance?
Cyber-Security
What is Security Culture? Why is a positive Security Culture Important? What benefits does it bring? How to integrate a positive security culture into your business?
Cyber-Security
What is the access management IAAA framework? How does it work? What are some examples?
Cyber-Security
What is Defence-In-Depth? What are the Layers of Defence? How is it implemented? What is Defence-In-Breadth? What is The Human Layer?
Cyber-Security
What is Non-Repudiation? Why is it important? How do we achieve it?
Cyber-Security
What is the CIA triad? Why is it so important in the world of information security? How to find the right balance?
Cyber-Security
What are Cyber-Security Frameworks and Standards? What are some examples? How are they used?
Cyber-Security
What does cyber-security protect? What counts as an asset? Why do we protect these assets?
Cyber-Security
An introduction to what Information Security is. What makes an effective Information Security program, and key challenges these programs may face.