Uncategorized

Configuring Cisco Switch with VLANs

Posted on:

Let’s say you want multiple LANs, but only have one switch? Or maybe you want to separate your networks into smaller sections, with each one having a different purpose? One for your trusted devices, one for Guest access, one for management, etc. How can you do this? This can be […]

Wireshark

Capturing a Password with Wireshark

Posted on:

In a digital landscape where data breaches and cyber threats are at every corner, the importance of robust cybersecurity practices has never been more important. Today, I will show you how I captured a password using Wiresahrk, a powerful and widely-used network analysis tool. Wireshark, is an open-source packet analyzer […]

Uncategorized

Installing PfSense with Virtual Box

Posted on:

In today’s digital landscape, cybersecurity is more important than ever. Cybersecurity has become an increasingly more important concern for organizations and individuals. With cyber threats and new constantly changing vulnerabilities, it is important for you to have a firewall set up if you value your network safety. That’s where PfSense […]

Azure , Security

Azure Honeypot & SIEM

Posted on:

During my time studying for the CompTIA Network+ exam, I learned what a SIEM is. SIEM stands for Security Information and Event Management, and is a tool that helps organizations monitor and analyze their security-related data from different sources to detect and respond to cybersecurity threats. In todays world theres […]

Uncategorized

Python Encryptor/Decrypter

Posted on:

During my time of studying for the CompTIA Network+ exam last week (I passed), there was a heavy emphasis on keeping everything secure. Encryption, hashing, VPNs, port security, etc. It is insane to me that past protocols and systems just sent information between computers completely naked out in the open. […]