Project: Vulnerability Scanning using NessusScanning for vulnerabilities is crucial for computer security because it helps identify weaknesses in your systems before attackers can…Aug 3Aug 3
Project: Microsoft Windows Defender and FirewallIn the rapidly evolving landscape of cybersecurity, hands-on experience is invaluable. As part of my ongoing commitment to understanding…Aug 3Aug 3
How do I get started in cyber security in 2024?Hello to all of you who reading this blog This is my blog on Medium. I hope you enjoy it.Apr 18Apr 18
Types of Web Application Attacks— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — -Oct 25, 2023Oct 25, 2023
Types of Malware:-In today’s digital age, the threat of malware attacks will only continue to increase. This increase can make it challenging for businesses…Oct 18, 2023Oct 18, 2023
What is the Zero Day Attack?Zero-day attacks are a type of advanced cyber threat. They take advantage of security flaws in software that are unknown to the software’s…Oct 18, 2023Oct 18, 2023
A list of SANS TOP 25The SANS top 25 vulnerabilities are created through multiple surveys and individual interviews with developers, senior security analysts…Oct 10, 2023Oct 10, 2023
what is CVE, CWE and NVD ?CVE, CWE, and NVD are all related to computer security and are used to identify and address vulnerabilities in software and hardware…Oct 10, 2023Oct 10, 2023