Obiagazie KenechukwuWeekly Update — Detection & Response IIHello, welcome back to my weekly updates. Here I talk about what I learned from my course and some online sources during the week. Last…Dec 17, 20231Dec 17, 20231
Obiagazie KenechukwuWeekly Update — Detection and Incident Response || Network Traffic AnalysisWelcome back to my weekly update. Here I talk about what I learned from my course and some online sources during the week. Last week I…Dec 4, 2023Dec 4, 2023
Obiagazie KenechukwuWeekly Update — Social Engineering, Malware, Web-based Exploits, Threat ModellingWelcome back to my weekly update. Here I talk about what I learned from my course and some online sources during the week. Last week I…Nov 27, 2023Nov 27, 2023
Obiagazie KenechukwuWeekly Stand up — Vulnerability ManagementWelcome back to our weekly updates.Nov 20, 2023Nov 20, 2023
Obiagazie KenechukwuWeekly Standup — Information Security & Information PrivacyWelcome back to our weekly standups. Last week, I discussed filtering in SQL, I also talked about attacks, threats, vulnerabilities…Nov 12, 2023Nov 12, 2023
Obiagazie KenechukwuWeekly Standup — Filtering In SQL || Assets, Threats, and VulnerabilitiesHey, it’s great to be back for my weekly standups.Nov 5, 2023Nov 5, 2023
Obiagazie KenechukwuWeekly standup — Continuation on The Linux Operating System.In my previous communication, I discussed the Linux operating system, its various components, and some package management tools…Sep 17, 2023Sep 17, 2023
Obiagazie KenechukwuWeekly Stand-up — The Linux Operating System (OS)Last week I talked about Security Hardening Practices— OS hardening, Network hardening, and Cloud Network hardening. I also briefly…Sep 10, 2023Sep 10, 2023