top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


How to Become a Penetration Tester with Zero Experience In Five Steps
Author Charles Chibueze CISSP CISM PNPT In the recent past, I‘ve had quite a number of cybersecurity enthusiasts reach out for guidance...
abdelsyfane
Mar 25, 20243 min read
577 views
2 comments


Internet of Things (IoT)-Protecting Your Children
Author Marta Wang In partnership with Breezeline What is IoT? What is the Internet of things, or more commonly IoT? Look around at your...
abdelsyfane
Apr 24, 202310 min read
154 views
1 comment


TryHackMe Cyber Kill Chain
Originally published November 18, 2022 on Medium Author Dan Rearden The Cyber Kill Chain framework is designed for identification and...
abdelsyfane
Apr 17, 202317 min read
982 views
0 comments


What Should You Do if Your Child Is a Bully?
Originally published March 2022 on the Social Work License Map Bullying is a common occurrence in schools regardless of the ages of...
abdelsyfane
Apr 3, 20238 min read
79 views
0 comments


Put the Brakes on Car Hacking
Author Jeremy McIntyre In partnership with Breezeline Car hacking is a growing concern as more and more vehicles are equipped with...
abdelsyfane
Jan 30, 20233 min read
325 views
0 comments


How To REMOVE Your Personal Information Online For FREE (and PAID)
This blog was originally posted on Medium, July 2022 Author: @voldimmoral ~ a guide on how to go from someone to no one online without...
abdelsyfane
Nov 28, 20226 min read
208 views
0 comments


Understanding Vulnerabilities and a Remediation Walk-Through
Author Ashlyn Matthews In an attempt to practice my blue team skills, I launched a vulnerable instance from AWS and sought out to scan...
abdelsyfane
Sep 12, 20224 min read
60 views
0 comments


Capture The Flag for Beginners
Author: Cate Garrett You dream of being a cyber maven who is fluent in Python and always ready with the latest Kali distro. Yet your...
abdelsyfane
May 23, 20224 min read
63,245 views
14 comments


What is Zero Trust?
Author: Siggi Bjarnason Overview Let us go over what zero trust is. This is the latest buzzword in the infosec/cybersecurity industry...
abdelsyfane
Apr 18, 20226 min read
52 views
0 comments


NIDS: Snort - Playing Around with Snort
Author Ashlyn Matthews What is Snort Snort is an open source, signature-based Network-based Intrusion Detection System. What does that...
abdelsyfane
Mar 21, 20223 min read
298 views
0 comments


A Basic Introduction to Firewall Rule Management
Author Angeline Williams This is a quick read for anyone interested in a brief overview of firewall rules and the importance of managing...
abdelsyfane
Feb 7, 20223 min read
288 views
0 comments


Simplifying the MITRE ATT&CK Framework
This blog was originally published on 11/3/21 on Scythe's blog site. Author Nathali Cano Introduction Before we get into the nitty gritty...
abdelsyfane
Jan 3, 20226 min read
331 views
0 comments


OSINT for Beginners
Originally published October 4, 2021 on Teressa's website, Dark Shiny Unicorn Author Teressa Gehrke This blog is originally taken from a...
abdelsyfane
Oct 18, 20215 min read
860 views
0 comments


How I passed CompTIA Linux+ (XK0–004)
This blog was origonally published on Cyberteach.medium.com. Author David Lee I recently passed the CompTIA Linux+ XK0–004 certification...
abdelsyfane
Sep 20, 20213 min read
2,061 views
0 comments


Free Training and Conferences - Discovered During the Pandemic
Author Elaine Harrison-Neukirch In 2020, during the pandemic lock down, I decided to work on expanding my Cyber Security knowledge. I...
abdelsyfane
Sep 6, 20215 min read
1,239 views
0 comments


Sysmon – Enhanced Logging for Windows
Author Kevin Kipp A log-file is a file that records events that occur in an operating system or software. [1] These can be anything –...
abdelsyfane
Jul 26, 20214 min read
2,566 views
0 comments


Malware Analysis: Your Options to Understanding Their Behavior
Author Reynaldo Gonzalez Photo Source: InfoSec Insights via https://sectigostore.com/blog/malware-analysis-what-it-is-how-it-works/ Ever...
Emily Stamm
Apr 26, 20213 min read
156 views
0 comments


A Beginners Guide to OSINT
OSINT - Open Source Intelligence that refers to a collection of data/information by exploiting publicly available resources. It is used...
Emily Stamm
Mar 8, 20215 min read
18,668 views
0 comments


What You Need To Know About SIM-Jacking
A “Port-Out Scam” or “SIM-jacking” are techniques used by hackers where they trick phone carriers into transferring a consumer’s phone
abdelsyfane
Oct 19, 20202 min read
92 views
0 comments


What is Two Factor Authentication?
Author: Elaine Harrison-Neukirch A best practice in Cybersecurity is asserting that there are layers of protection (defense in depth)....
Emily Stamm
Oct 12, 20203 min read
106 views
0 comments
bottom of page