Author: spectnullbyte

0

Chapter 1 – Introduction to Linux

In this first chapter, we will not install any program, nor will we type any command. We will only learn a bit about Linux. Linux is an operating system, and so, it is only...

0

Google Dorks Explained

Whenever you want to look for something on the Internet, you use Google. The giant search engine indexes almost everything on the web. It has made billions of web pages accessible for people to...

startup, whiteboard, room 0

How to Design a Computer Network

You had just gotten a job at a respectable firm. A client came up to you and asked you to design a computer network for their company. They provided you with a document containing...

cyber security, cybersecurity, computer security 0

How to Become an Ethical Hacker

Any person who is seriously considering to become an ethical hacker should be aware of the challenges they might face. If you think that you will get to the expert level in a few...

0

CISSP Domain 8 Review – Software Development Security

This post serves as a review for the domain 8 of the CISSP. This domain covers the software development security. Before we start, here is a list that will help you navigate through the...

0

CISSP Domain 7 Review – Security Operations

This post serves as a review for the domain 7 of the CISSP. This domain covers security operations. Before we start, here is a list that will help you navigate through the different sections...

0

CISSP Domain 6 Review – Security Testing

This post serves as a review for the domain 6 of the CISSP. This domain covers security testing. Before we start, here is a list that will help you navigate through the different sections...