MY PROJECTS
Simulating An AWS EC2 Instance Attack
Simulating an AWS Instance Attack
Serverless Web Application With Multi-Region on AWS
Creating A Serverless Web Application with Multi-Region Deployment on AWS
Risk Assessment
Risk Assessment Report
VLAN Connection for New Employees & Proper Configuration
BugSquashers 2
TCP/IP and OSI Models
TCP/IP Models
A Critical Infrastructure For Nation’s Growth
A Critical Infrastructure For Nation’s Growth
PERSONAL STORIES
CYBER BASTET
GODDESS OF PROTECTIONBastet is a goddess of ancient Egyptian religion.She was a fierce lioness warrior…
WHAT IS CYBER SECURITY?
PERSONAL MEANINGSomeone once asked me, What does Cybersecurity mean to you?Feeling crazy, I repeated the…
KICKSTART A CAREER IN CYBER SECURITY
GET STARTEDI thought to myself, ‘If I were to start my cybersecurity journey today, what…
LINKEDIN OF OPTIMIZATION
ALL ABOUT LINKEDINLinkedIn as an app can be found to be scary or unrelatable when…
THE COMMUNITY
PERSONAL VIEWI wasn’t always a fan of communities. I never saw the need for one….
CYBERSECURITY RESOURCES FOR BEGINNERS
THE MAPCybersecurity is an industry where people from other professions or career paths can come…
BLOG POSTS
TOP 5 CYBER TIPS FOR 2024
TRAINING & AWARENESSThe first step to being cyber-safe is being aware.Aware of emerging threats and…
WHAT IS CYBER SECURITY?
PERSONAL MEANINGSomeone once asked me, What does Cybersecurity mean to you?Feeling crazy, I repeated the…
DIFFERENT PATHWAYS IN CYBERSECURITY
THE NICHESI once wrote about the different pathways or niches in cybersecurity. I decided it…
MY FAVOURITE PROVIDER
A provider? I am sure most of us have read about what a provider should…
CAN YOUR NAME OPEN DOORS
Let me first answer the question: Is this practice even right?Personally, Yes. Hold on, let…
THE HOST WITH THE MOST
INTRODUCTION You want to host a big party but don’t have space in your home….