Common Network Analysis Tool For Cyber Security Analysts
A SOC relies on a supporting infrastructure of tools and systems that provide the following services: Network mapping Network monitoring Vulnerability detection Penetration testing Data […]
Browsing category
A SOC relies on a supporting infrastructure of tools and systems that provide the following services: Network mapping Network monitoring Vulnerability detection Penetration testing Data […]
In my previous article, I have talked about some of the facts that you need to know about computer security awareness. In this article, I want to […]
In my previous article, I have talked about all that you need to know about networks. In this article, I want to talk about […]
There is a saying that you cannot outgrow what you don’t know. The same thing applies to system security, you need to make […]
Statistical techniques can be used to evaluate the risk that exploits will be successful in a given network. This type of analysis can help decision-makers […]
Worms share similar characteristics. They all exploit an enabling vulnerability, have a way to propagate themselves, and they all contain a payload. Worm Components Despite […]
The term Trojan horse originated from Greek mythology. Greek warriors offered the people of Troy (the Trojans) a giant hollow horse as a gift. […]
It has been mentioned on several occasions that blogging is part of online marketing. Essentially, it is a strategy that is closely linked to […]
The security of the computer allows users to use the computer while keeping safe from threats. Computer Security can also be defined as managing […]
In my previous article, I talked about all that you need to know about networks. In this article, I want to talk about all […]
Before I start writing this article, here is a disclaimer. I am not writing this article to rubbish Nigeria as a country and I […]
Simply having a wired or wireless physical connection between end devices is not enough to enable communication. For communication to occur, devices must know “how” […]
Knowing the OSI reference model and the TCP/IP protocol model will come in handy when you learn about how data is encapsulated as it moves […]
In my previous article, I have talked much about how data travels across the network. In this article, I want to talk more about MAC […]
If your network is using the IPv4 communications protocol, the Address Resolution Protocol, or ARP, is what you need to map IPv4 addresses to MAC […]
Application layer programs generate data that must be exchanged between the source and destination hosts. The transport layer is responsible for logical communications between applications […]
You already know the fundamentals of TCP. Understanding the role of port numbers will help you to grasp the details of the TCP communication process. […]
The Dynamic Host Configuration Protocol (DHCP) for IPv4 service automates the assignment of IPv4 addresses, subnet masks, gateways, and other IPv4 networking parameters. This is […]
The webservers that we so often connect to using names like www⋅cisco⋅com, are actually reached by assigning IP addresses to packets. On the internet, these […]
The network devices that people are most familiar with are end devices. To distinguish one end device from another, each end device on a […]