top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?
abdelsyfane
Mar 25, 20243 min read
How to Become a Penetration Tester with Zero Experience In Five Steps
Author Charles Chibueze CISSP CISM PNPT In the recent past, I‘ve had quite a number of cybersecurity enthusiasts reach out for guidance...
486 views2 comments
abdelsyfane
Apr 24, 202310 min read
Internet of Things (IoT)-Protecting Your Children
Author Marta Wang In partnership with Breezeline What is IoT? What is the Internet of things, or more commonly IoT? Look around at your...
139 views1 comment
abdelsyfane
Apr 17, 202317 min read
TryHackMe Cyber Kill Chain
Originally published November 18, 2022 on Medium Author Dan Rearden The Cyber Kill Chain framework is designed for identification and...
814 views0 comments
abdelsyfane
Apr 3, 20238 min read
What Should You Do if Your Child Is a Bully?
Originally published March 2022 on the Social Work License Map Bullying is a common occurrence in schools regardless of the ages of...
79 views0 comments
abdelsyfane
Jan 30, 20233 min read
Put the Brakes on Car Hacking
Author Jeremy McIntyre In partnership with Breezeline Car hacking is a growing concern as more and more vehicles are equipped with...
318 views0 comments
abdelsyfane
Nov 28, 20226 min read
How To REMOVE Your Personal Information Online For FREE (and PAID)
This blog was originally posted on Medium, July 2022 Author: @voldimmoral ~ a guide on how to go from someone to no one online without...
205 views0 comments
abdelsyfane
Sep 12, 20224 min read
Understanding Vulnerabilities and a Remediation Walk-Through
Author Ashlyn Matthews In an attempt to practice my blue team skills, I launched a vulnerable instance from AWS and sought out to scan...
58 views0 comments
abdelsyfane
May 23, 20224 min read
Capture The Flag for Beginners
Author: Cate Garrett You dream of being a cyber maven who is fluent in Python and always ready with the latest Kali distro. Yet your...
55,924 views14 comments
abdelsyfane
Apr 18, 20226 min read
What is Zero Trust?
Author: Siggi Bjarnason Overview Let us go over what zero trust is. This is the latest buzzword in the infosec/cybersecurity industry...
52 views0 comments
abdelsyfane
Mar 21, 20223 min read
NIDS: Snort - Playing Around with Snort
Author Ashlyn Matthews What is Snort Snort is an open source, signature-based Network-based Intrusion Detection System. What does that...
296 views0 comments
abdelsyfane
Feb 7, 20223 min read
A Basic Introduction to Firewall Rule Management
Author Angeline Williams This is a quick read for anyone interested in a brief overview of firewall rules and the importance of managing...
287 views0 comments
abdelsyfane
Jan 3, 20226 min read
Simplifying the MITRE ATT&CK Framework
This blog was originally published on 11/3/21 on Scythe's blog site. Author Nathali Cano Introduction Before we get into the nitty gritty...
330 views0 comments
abdelsyfane
Oct 18, 20215 min read
OSINT for Beginners
Originally published October 4, 2021 on Teressa's website, Dark Shiny Unicorn Author Teressa Gehrke This blog is originally taken from a...
832 views0 comments
abdelsyfane
Sep 20, 20213 min read
How I passed CompTIA Linux+ (XK0–004)
This blog was origonally published on Cyberteach.medium.com. Author David Lee I recently passed the CompTIA Linux+ XK0–004 certification...
2,045 views0 comments
abdelsyfane
Sep 6, 20215 min read
Free Training and Conferences - Discovered During the Pandemic
Author Elaine Harrison-Neukirch In 2020, during the pandemic lock down, I decided to work on expanding my Cyber Security knowledge. I...
1,237 views0 comments
abdelsyfane
Jul 26, 20214 min read
Sysmon – Enhanced Logging for Windows
Author Kevin Kipp A log-file is a file that records events that occur in an operating system or software. [1] These can be anything –...
2,470 views0 comments
Emily Stamm
Apr 26, 20213 min read
Malware Analysis: Your Options to Understanding Their Behavior
Author Reynaldo Gonzalez Photo Source: InfoSec Insights via https://sectigostore.com/blog/malware-analysis-what-it-is-how-it-works/ Ever...
149 views0 comments
Emily Stamm
Mar 8, 20215 min read
A Beginners Guide to OSINT
OSINT - Open Source Intelligence that refers to a collection of data/information by exploiting publicly available resources. It is used...
18,534 views0 comments
abdelsyfane
Oct 19, 20202 min read
What You Need To Know About SIM-Jacking
A “Port-Out Scam” or “SIM-jacking” are techniques used by hackers where they trick phone carriers into transferring a consumer’s phone
88 views0 comments
Emily Stamm
Oct 12, 20203 min read
What is Two Factor Authentication?
Author: Elaine Harrison-Neukirch A best practice in Cybersecurity is asserting that there are layers of protection (defense in depth)....
106 views0 comments
bottom of page