A white hat is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has
A grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker.
A black hat is a computer hacker who usually violates laws or typical ethical standards. The term originates from 1950s westerns, when bad guys typically wore black hats and good guys white hats.
Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion.
A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.
A RAT or remote administration tool, is software that gives a person full control a tech device, remotely. The RAT gives the user access to your system, just as if they had physical access to your device. With this access, the person can access your files, use your camera, and even turn on/off your device.
The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability. The CIA triad is a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.
DDoS Attack means "Distributed Denial-of-Service (DDoS) Attack" and it is a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites.
The term “botnet” refers to a collection of computers linked together to perform a specific task. Botnets themselves are not a threat to your network. However, when botnets are misused for malicious purposes, they can be very dangerous.
As we all strive to achieve our goals, I am presently pursuing a Bachelor’s degree in Cybersecurity while concurrently working as a cybersecurity field and as a tech support personnel. My aspirations in the cybersecurity field are vast, and I have set both short term and long term goals to achieve them. My short term goals involve sharpening my technical expertise and enhancing my understanding of the industry’s emerging trends. My long-term goals entail working for a prestigious cybersecurity firm where I can apply my knowledge and skills to help organizations mitigate cyber risks. I am committed to pursuing my aspirations with diligence and perseverance to attain the level of professional excellence that the cybersecurity field demands. A few short & long term goals are listed below.
As a registered private investigator since 2018, I have gained valuable experience and developed a diverse set of skills. I am currently pursuing studies in cyber security, and concurrently employed by both a tech company and a college in the cybersecurity field. Through these roles, I have honed my expertise in various areas of the industry and have become an adept professional capable of handling complex challenges. My passion for this field is evident in my continuous pursuit of knowledge and dedication into Cybersecurity.
out of 6277 (NCL 2023)
Self Trained
Work Experiance
Videos will be posted as I continue to create content. Be sure to subscribe to my YouTube channel.
Due to YouTube removing multiple videos of mine. I will now be hosting them myself. Please allow the video to load, I will work on getting them running faster and more smoothly. Thank you
As a professional in this field, I am able to provide you with the best possible assistance due to my ongoing education and active involvement in current industry practices.
My video tutorials are designed to provide you with easy-to-follow, comprehensive guidance. My step-by-step approach ensures that you gain a clear understanding..
Visit my cyber blog, which contains valuable information on important topics. Your visit would be greatly appreciated and I believe it will provide you with useful insights.
My approach will go beyond just talk and teaching, as we will spend ample time exploring and mastering all aspects of the tech landscape relevant to cybersecurity.
My approach involves identifying and exploring specific topics in a thorough manner, with a commitment to providing comprehensive answers to any questions that may arise.
The NCL Competition is supported by Cyber Skyline, a prominent cloud-based cybersecurity skills assessment platform that provides a secure environment for students to hone their cybersecurity skills. In collaboration with NCL, Cyber Skyline is proud to present the biannual NCL Competition.
While I recognize the significant benefits of learning a programming language, I have not yet had the opportunity to acquire sufficient knowledge in any particular language. It is my belief that a comprehensive understanding of a programming language is not necessarily required to engage in hacking. Rather hands on training is more what I go for.
It is worth noting that optimal learning techniques will differ depending on the individual. In my personal opinion, obtaining practical experience is the ideal approach. This can be achieved by establishing a personal lab environment to test and experiment, participating in Capture the Flag events, and utilizing reputable online resources such as TryHackMe.
I began my career in cyber security in 2010, however, it wasn’t until 2019 that I pursued formal education in the field. Prior to that, I gained extensive knowledge through self-teaching by studying books, videos, and other resources exploring the subject matter.
At this time, I am not able to provide personal tutoring due to my other commitments with work, school, and personal responsibilities. However, I am dedicated to producing valuable content through videos and teachings for all of my followers. I appreciate your understanding and hope that you will continue to benefit from the resources that I have available.
It is a common misconception that it is too late to pursue a career in cybersecurity. However, this is not the case. Though it requires a great deal of dedication and time, the field offers many opportunities for those who are passionate and committed to learning. It is important to note that not everyone will find success in the field, as the concepts can be challenging to grasp at times. Nevertheless, if you have a passion for cybersecurity, you will know early on and can take steps to achieve your goals. Just remember that it takes hard work and perseverance, but the rewards of a successful career in cybersecurity are significant.