Okechukwu ChikeluAnalyzing a Basic Network ScanFor this study, let us use the link below, import it into Nessus and thus analyze it.Dec 21, 2023Dec 21, 2023
Okechukwu ChikeluVulnerability Assessment Vs. Penetration TestingDefinitions:Dec 21, 2023Dec 21, 2023
Okechukwu ChikeluDynamic Analysis of a Potential Malicious FileIn the course of this study, we would be using an online malicious code analyzer with link (https://www.hybrid-analysis.com/). This is a…Dec 1, 2023Dec 1, 2023
Okechukwu ChikeluHow to Fork a GitHub RepositoryTo fork refers to creating a copy of a project or codebase to diverge and develop independently.Dec 1, 2023Dec 1, 2023
Okechukwu ChikeluEthics: My thoughts on Uber CISOIn 2014, Uber suffered a data breach. The nature, circumstances and its broader cybersecurity program were investigated. After the launch…Nov 28, 2023Nov 28, 2023