Reflections on My Masters in Cyber Security Management — Module 1I’m thrilled to share that I’ve successfully completed all the modules in my MSc in Cyber Security Management at the University of Warwick…Aug 22, 2024Aug 22, 2024
CTF Tools & UtilitiesI recently participated in the SANS CTF for the WiCys Security Scholarship 2023 tier 1. The CTF lasted for 3 days and there were over 1000+…Sep 12, 2023Sep 12, 2023
You must have heard of ISO/IEC 27001.ISO/IEC 27001 is an international standard to manage information security. The implementation of ISO/IEC 27001 has many benefits such as…Jun 14, 2023Jun 14, 2023
NIST Risk Management Framework (SP 800–37 Rev.2)The NIST Risk Management Framework (SP 800–37 Rev.2) consists of 7 steps — Prepare (P), Categorize ©, Select (S), Implement (I), Assess…Mar 19, 2023Mar 19, 2023
Security Audit Process/MethodologyWhenever you decide to audit a company, it involves several phases. These phases might change from company to company but I’ve jotted down…Feb 16, 2023Feb 16, 2023
NIST CSF CoresThe NIST CSF (Cybersecurity Framework) core is like a set of desired cybersecurity activities and outcomes. It guides organizations in…Feb 15, 2023Feb 15, 2023
What would it be like if you hired a watchman just to protect the front gate of your house because…I wouldn’t capture your attention if I said “Importance of Cyber Security news” would I?Jan 30, 2023Jan 30, 2023
Role of development of IoT in the automation of the world“The Internet of Things assures automation and data exchange. This will change our future and the way we work and live.”May 18, 202123May 18, 202123
Another project just for marks?How many projects have you listed on your resume?Apr 14, 2021Apr 14, 2021
Basic Linux Commands for Beginnersls -> Displays a listing of information about files. Its default behavior is to return a list of files contained within the current…Apr 6, 2021Apr 6, 2021