Tatiane Pimenta Lealtatianepimentaleal.hashnode.dev·Mar 3, 2024Starting my Cyber Security JourneyFirst steps to the Cybersecurity path You should always expect something in programming to be easy. Never. And why, you may ask. Why should I think that? Well, for a simple reason: learning in depth. I am studying and focused on a Cybersecurity caree...Discuss#cybersecurity
Neviar Rawlinsonneviarrawlinson.hashnode.dev·Dec 24, 20233-Month Roadmap to Launch Your Cybersecurity Career with No Prior ExperienceEmbarking on a cybersecurity career without prior experience might seem like a daunting task, but with dedication and a well-structured roadmap, you can make significant strides in just three months. This article outlines a step-by-step plan to help ...Discuss·10 likes#cybersecurity
Varun Singh Rajputvarunsinghrajput.hashnode.dev·Dec 13, 2023What is authentication mechanisms in cybersecurity?Authentication mechanisms are a fundamental component of cybersecurity that play a crucial role in verifying the identity of users, systems, or entities attempting to access resources or services in a networked environment. In the realm of cybersecur...Discusscyber security certification
Alabi Erioluwacyberspace007.hashnode.dev·Nov 14, 2023Introduction To Cyber Security(VIII): The OSI Model.Session Layer This is the fifth layer of the OSI Model, it’s called the Session Layer. The session layer creates the setup, controls the connections, and ends the teardown, between two or more computers, this is called a "session". The session layer ...Discuss#cybersecurity
Alabi Erioluwacyberspace007.hashnode.dev·Nov 9, 2023Introduction To Cyber Security(VII): The OSI Model.TRANSPORT LAYER This is the fourth layer of the OSI Model. I like to call it the heart of the OSI Model. This is where much attention is required. It is responsible for the transmission of data segments between points on a network, including segmenta...Discuss#cybersecurity
Alabi Erioluwacyberspace007.hashnode.dev·Oct 23, 2023Introduction To CyberSecurity(I): Meaning and terms usedCyber Security What is Cyber Security? First, I would like to break the two words down “Cyber” and “Security”. Cyber: This is something that pertains to or has to do with the internet (computer networks). Security: This can be defined as the state of...Discuss#cybersecurity
Prajoti Raneprajotirane.hashnode.dev·Jun 19, 2023Introduction to malware and its role in cyber- securityIn today's digital age, cyber security has become a paramount concern for businesses and individuals alike. Malware, short for malicious software, is a common and persistent threat that can wreak havoc on computer systems and networks. Understanding ...Discuss·3 likes·36 readsmalware analysis
Raymond Fuorrycyberay.hashnode.dev·Jan 2, 2023What are the top 10 types of cyber attacks?That’s why it’s so important to stay informed about the top types of cyberattacks and what you can do to protect yourself and your organization from these threats. In this blog post, I’ll be discussing the top 10 types of cyberattacks and providing p...Discuss·50 reads#cybersecurity
Waleed Umarwaleedumar.hashnode.dev·Dec 27, 2022Introducing Cyber Security: A Beginner's HandbookIntroduction: What is cyber security and why is it important? Welcome to this blog on basic cybersecurity concepts! In this post, we'll be exploring the world of cyber security and teaching you some simple strategies that you can use to protect yours...Discuss·13 likes·92 readsonline safety
Driveit Techdriveittech.hashnode.dev·Nov 29, 2022Cyberspace | DriveittechThe term “cyberspace” refers to the virtual computer world, specifically an electronic medium used to facilitate online communication. Cyberspace is typically a large computer network of many global computer subnetworks that use the TCP/IP protocol t...Discusscyberspace