top of page
Nov 18, 20242 min read
What are the common nmap commands?
The abbreviation Nmap stands for Network Mapper. It is a Linux command-line tool that is open-source and used to scan IP addresses and...
1 view
Nov 18, 20241 min read
How to install DVWA in Kali Linux?
Following tutorial demonstrates a simple way of installing DVWA in Kali https://www.youtube.com/watch?v=PaB17Cc0dUg
29 views
Nov 18, 20241 min read
How to install Kali Linux on a Virtual machine?
Following tutorial demonstrates an excellent way of installing Kali in vmware/virtualBox. https://www.youtube.com/watch?v=Bbe9YP86yoQ
0 views
Nov 18, 20241 min read
What is an SOC job?
SOC stands for "Security Operations Center." A job in an SOC involves working in a specialized team dedicated to monitoring and...
0 views
Nov 18, 20241 min read
How to prepare for a Security Operations center (SOC) job?
To prepare for a SOC Job, a candidate must have : Good understanding of Networking Fundamentals Basic Knowledge of different Operating...
1 view
Nov 18, 20242 min read
What are the various sources of knowledge on Data protection & Privacy?
The domains of data protection and privacy are broad, containing data from several sources. Some of the resources of knowledge on data...
1 view
Nov 18, 20242 min read
How to prepare for a Data protection / Privacy career?
A career in Data protection & Privacy is very easy to develop for law graduate freshers and technology freshers if they are provided with...
1 view
Nov 18, 20241 min read
What are hardening standards and where to find them?
System or security hardening is basically a process to eliminate the risk of security vulnerabilities and cyber attacks to secure a...
3 views
Nov 18, 20241 min read
How to prepare a checklist for an audit?
Creating an audit checklist is as simple as listing all the essential things you need to check. But if you want your list to be...
1 view
Nov 18, 20243 min read
What are the various Cyber security standards / Information security standards and where do you find the copies of these?
Following are some of the various Cyber security standards being used often across the world: ISO 27001: 2013 Â - Well known International...
0 views
bottom of page