How Cloudflare Works: A Security Blueprint
A practical, in-depth guide to how Cloudflare works as a security layer — covering WAF, DDoS protection, DNS, TLS, rate limiting, and how to verify your configuration is actually working.
A practical, in-depth guide to how Cloudflare works as a security layer — covering WAF, DDoS protection, DNS, TLS, rate limiting, and how to verify your configuration is actually working.
A complete step-by-step guide to installing Snort 3 on Kali Linux using both repository and source-based methods — including dependencies, configuration, and verification.
Learn how to map security events in Splunk to the MITRE ATT&CK framework — understanding adversary behavior, tactics, techniques, and how to align your detections accordingly.
Step-by-step guide to setting up your own cybersecurity home lab for hands-on learning and practice.
Implement full packet capture and network forensics workflows to analyze and investigate security incidents in your home lab.
Setting up intentionally vulnerable applications in your home lab for ethical hacking practice.
Essential, actionable security requirements to ensure secure coding practices are integrated throughout the software development lifecycle.
Create your own secure password manager using modern encryption techniques and best security practices.
A comprehensive Python-based network scanning and security assessment tool with advanced features for security analysis and network mapping.
How mentorship and collaboration led to the creation of CyberSecHub, a free cybersecurity awareness site for students and communities. Lessons learned, tech stack, and impact.
A practical, in-depth guide to how Cloudflare works as a security layer — covering WAF, DDoS protection, DNS, TLS, rate limiting, and how to verify your configuration is actually working.
Why AI risk management matters, an overview of NIST’s AI RMF v1.0, and a breakdown of its first two core functions: Govern and Map.