Posts
2025
Exploring Vulnerabilities: A Hands-On Assessment with OpenVAS(GVM)
·408 words·2 mins·
loading
·
loading
Case Study
Security
Vulnerability Management
Network Security
Penetration Testing
Cybersecurity
Vulnerability Assessment
OpenVAS
Kali Linux
Network Security
Penetration Testing
Threat Intelligence
# Exploring Vulnerabilities: A Hands-On Assessment with OpenVAS(GVM) # Introduction
2024
Assessing the Risk Profile of CyberTech Solutions and Implementing a Security Policy
·1329 words·7 mins·
loading
·
loading
Cybersecurity
Risk Management
Information Security
IT Governance
Cybersecurity
Risk Assessment
Security Policy
Network Security
Password Policy
Incident Response
Data Protection
Employee Training
An in-depth assessment of CyberTech Solutions’ security risks and the development of a security policy to mitigate vulnerabilities, covering password policies, patch management, network security, data backup, and employee training.
Wireshark Traffic Analysis
·3267 words·16 mins·
loading
·
loading
Cybersecurity
Network Forensics
Penetration Testing
Incident Response
Wireshark
Traffic Analysis
Cybersecurity
Packet Analysis
Network Security
Forensics
Intrusion Detection
Threat Hunting
A deep dive into analyzing network traffic using Wireshark for security monitoring, forensics, and threat detection.
Secure Your Kali Linux with UFW: Uncomplicated Firewall Setup
·1473 words·7 mins·
loading
·
loading
Cybersecurity
Linux Security
System Hardening
Network Defense
Kali Linux
Firewall
UFW
Linux Security
Network Security
Cybersecurity
System Hardening
Penetration Testing
A step-by-step guide to configuring UFW (Uncomplicated Firewall) on Kali Linux to enhance security and protect against unauthorized access.
Vulnerability Scan Report for DATASAFE SOLUTION
·577 words·3 mins·
loading
·
loading
Security Reports
Vulnerability Scan
Cybersecurity
Network Security
Nmap
Comprehensive vulnerability scan report for DATASAFE SOLUTION, detailing security risks and recommendations.
Vulnerability Scan Report for DATASAFE SOLUTION
·1243 words·6 mins·
loading
·
loading
Cybersecurity
Vulnerability Assessment
Nmap
Security
Penetration Testing
Network Security
Assessment of all devices within the 192.168.37.0/24 range for security vulnerabilities.