top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


abdelsyfane
Mar 25, 20243 min read
How to Become a Penetration Tester with Zero Experience In Five Steps
Author Charles Chibueze CISSP CISM PNPT In the recent past, I‘ve had quite a number of cybersecurity enthusiasts reach out for guidance...
537 views2 comments


abdelsyfane
Mar 11, 20242 min read
Empowering Narratives: A Young Black Woman pivots from TV Producer to Cybersecurity Marketer
Author Naki Carter As I type these words today, I revel in the journey from network TV producer to cybersecurity marketer. As the...
132 views1 comment

abdelsyfane
Mar 4, 20246 min read
Security-First Compliance for Small Businesses
Author Karen Walsh Purchase the book from Amazon. The year is 2017. A green-haired, tattooed, pierced mom sits in the back of an...
150 views7 comments

abdelsyfane
Feb 5, 20242 min read
Empowering the Next Generation in Cybersecurity
Author Zinet Kemal Purchase books here Welcome to my world, where cybersecurity and children’s literature intertwine to create something...
154 views1 comment


abdelsyfane
Jan 22, 202410 min read
The SIEM Playbook: Strategies for Preventing Brute Force Cybersecurity Breaches
Author Gabrielle Hempel In the ever-evolving landscape of cybersecurity, brute force attacks remain a persistent threat to organizations...
280 views0 comments


abdelsyfane
Dec 4, 20234 min read
Safeguarding the Digital Realm: The Vital Role of Language in Cybersecurity
Author April Uzzle Introduction In the interconnected landscape of today's world, where digital footprints weave intricate patterns...
91 views0 comments


abdelsyfane
Nov 27, 20234 min read
The Complex Interplay of Humanitarianism and Cybersecurity: Navigating the Digital Age Challenges
Author April Uzzle In today's interconnected world, the realms of humanitarianism and cybersecurity are becoming increasingly...
45 views0 comments


abdelsyfane
Nov 9, 20237 min read
Let’s build a Cloud Network - 02: Internet Gateway and Route Tables
Author Jinali Pabasara Welcome to the second article in our series, where we explore fundamental networking concepts in AWS. So far,...
92 views0 comments


abdelsyfane
Oct 30, 20237 min read
Cyberbullying: How to identify and handle online harassment
Author Ari Howard Almost half of U.S. students report they were bullied in some way online during the pandemic lock down. Similar to how...
299 views0 comments


abdelsyfane
Oct 23, 20234 min read
The Unsung Hero in Cybersecurity: Unveiling the Importance of Emotional Intelligence
Author April Uzzle In the ever-evolving landscape of digital warfare, where the battleground has shifted from physical realms to the...
115 views1 comment

abdelsyfane
Oct 9, 20233 min read
Navigating Cybersecurity: A Unique Journey
Author Jennifer Smith My voyage into cybersecurity defied convention, taking me down an unexpected and meandering path that has shaped...
86 views0 comments


abdelsyfane
Oct 3, 20233 min read
Connecting WOMEN In Cybersecurity and Information Technology (IT)
Author: voldimmoral A Place For Women To Connect With Other Women Around The World 💃 Are you a woman? Are you a student, curious mind,...
79 views0 comments


abdelsyfane
Sep 25, 20236 min read
Let’s build a Cloud Network- 01: VPC and Subnets
Author Jinali Pabasara Welcome to this article series, where we’ll embark on an exciting journey through fundamental networking...
92 views0 comments

abdelsyfane
Sep 24, 20233 min read
Navigating Cybersecurity: A Unique Journey
Author Jennifer Smith My voyage into cybersecurity defied convention, taking me down an unexpected and meandering path that has shaped my...
47 views0 comments


abdelsyfane
Sep 11, 20234 min read
Enhancing Africa's Cybersecurity Landscape: Insights from the July 2023 African Union Digital Gov
Author Emily Stamm Africa is experiencing tremendous technological progress, with internet penetration increasing and smart cities...
168 views0 comments


abdelsyfane
Sep 5, 20233 min read
Navigating the Landscape of Smart Devices: Privacy, Security, and Connectivity Introduction
Author Jennifer Smith In the ever-evolving landscape of technology, the rise of intelligent devices has transformed how we interact with...
68 views0 comments


abdelsyfane
Aug 14, 20236 min read
InfoSec Community Outreach Tips — Part 1: Public Libraries
Author: Tracy Z Maleef Originally published on Medium. Congratulations! You’ve decided to reach beyond your comfort zone and give a ...
147 views0 comments

abdelsyfane
Aug 7, 20235 min read
Amateur Insights: The Road to Cyber
Author Catarina Pottle As a recent graduate from a community college with an Associate of Applied Science in Cybersecurity, I have...
56 views0 comments

abdelsyfane
Jul 17, 20232 min read
Disability Pride Month
July is Disability Pride Month to commemorate the 1990 Americans with Disability Act, which protects people with disabilities from...
25 views0 comments


abdelsyfane
Jul 4, 20233 min read
Build a Threat Hunting Lab. Installing and Configuring Elasticsearch and Kibana
Authors: Laiali Kazalbach and Mohamed Elsayed Technical requirements VMware Workstation with at least 6 GB of RAM, 6 CPU cores, and a 70...
116 views0 comments
bottom of page