Open in app

Sign In

Write

Sign In

Sean Byrne
Sean Byrne

34 Followers

Home

About

Apr 7

Name That OSI Model Layer: An Exercise in Cybersecurity

Do you want to be a cybersecurity professional? Learn this vocab and connect it to the OSI Model — Intro Studying is important to becoming a cybersecurity pro. So, try this exercise on your own once you get the gist of it. IaaS Definition: Infrastructure as a Service (IaaS). A marketing term used to describe cloud-based systems that are delivered as a virtual solution for computing. OSI Layer: Layers 1–3 (Physical, Data, Network Layers)

Model

4 min read

Name That OSI Model Layer: An Exercise in Cybersecurity
Name That OSI Model Layer: An Exercise in Cybersecurity
Model

4 min read


Apr 5

Name That OSI Model Layer: Know Your Layers and Cybersecurity Vocab

Relating all things to the OSI Model Layers is a handy exercise, not a ‘handsy exercise’ as the photo would suggest. Intro This article is pretty straightforward. We have a list of vocabulary terms and then we define these terms. …

Cybersecurity

5 min read

Name That OSI Model Layer: Know Your Layers and Cybersecurity Vocab
Name That OSI Model Layer: Know Your Layers and Cybersecurity Vocab
Cybersecurity

5 min read


Apr 4

IT Security Assessments: A Proactive Approach to Cybersecurity

Assess your network to ensure you have the best security. This Is The Way. — Intro In today’s digital age, the importance of IT security assessments cannot be overstated. Businesses face an ever-evolving threat landscape that puts their sensitive data at risk. A proactive approach to cybersecurity can help identify vulnerabilities and threats that lurk inside a network. …

Threat Hunting

3 min read

IT Security Assessments: A Proactive Approach to Cybersecurity
IT Security Assessments: A Proactive Approach to Cybersecurity
Threat Hunting

3 min read


Apr 3

Hey man! What’s a WAN?

Some IT networking fundamentals you should know for cybersecurity! A quick article for your learning pleasure. — What’s a WAN, man!? A Wide Area Network (WAN) is a type of computer network that connects Local Area Networks (LANs) over a large geographic area. The internet is the ultimate WAN, connecting every LAN to every other LAN across the entire globe. Facilitating communication between geographically dispersed sites requires a WAN, which is…

3 min read

Hey man! What’s a WAN?
Hey man! What’s a WAN?

3 min read


Mar 28

Using an Attacker’s Tools to Stop Network Attacks

“Our enemies are our greatest teachers” — Dalai Lama — Intro Network attacks can cause significant damage to an organization’s reputation, financial loss, and, in some cases, even the loss of life. As technology continues to advance, so do the tools that attackers use to compromise network security. …

Ethical Hacking

3 min read

Using an Attacker’s Tools to Stop Network Attacks
Using an Attacker’s Tools to Stop Network Attacks
Ethical Hacking

3 min read


Mar 27

For the Budding Cybersecurity Student: An Exercise You Must Endure!

A list of IT vocab and how it relates to the OSI Model. Basically, everything in IT and cybersecurity hinges on the OSI Model. So relating any new vocab you encounter to the OSI Model will help you get closer to your cybersecurity career! — Intro This article is going to throw a bunch of random IT vocab at you. Then for each vocab word or phrase, there will be a quick explanation under which OSI layer that vocab term falls. Let’s dive in!

Osi Model

6 min read

For the Budding Cybersecurity Student: An Exercise You Must Endure!
For the Budding Cybersecurity Student: An Exercise You Must Endure!
Osi Model

6 min read


Mar 27

Securing Physical Access to the Network

This is about literally having physical barriers to protect your network from being physically touched by bad people. Network security must consider the digital realm, as well as the physical realm! — Intro Network security is a crucial aspect of any organization that uses information technology. The network is the backbone of most businesses, and it is essential to protect it from unauthorized access, hacking, and other security threats. While there are various aspects of network security, securing physical access to the network…

Physical Security

3 min read

Securing Physical Access to the Network
Securing Physical Access to the Network
Physical Security

3 min read


Mar 27

An Overview of Network Security and Policies for the Aspiring Cybersecurity Professional

The basics of network security within the realm of network fundamentals. Lots of lists in this article, easy to consume info and very skim-able — In today’s technology-driven world, network security has become a critical concern for businesses of all sizes. Cyberattacks are on the rise, and businesses need to ensure that their sensitive information remains protected from unauthorized access. …

It

4 min read

An Overview of Network Security and Policies for the Aspiring Cybersecurity Professional
An Overview of Network Security and Policies for the Aspiring Cybersecurity Professional
It

4 min read


Mar 19

Routing Protocols: The Rules Governing Your Router

Routers follow rules just like us. These rules make it possible for you to watch your naughty things on the Internet while you’re on your lunch break at work. — Intro In today’s fast-paced world, the ability to connect to various networks has become a fundamental requirement for most businesses. Networks are made up of various interconnected devices, and the efficient flow of information between these devices is critical for businesses to operate effectively. To ensure the proper functioning of a…

It

3 min read

Routing Protocols: The Rules Governing Your Router
Routing Protocols: The Rules Governing Your Router
It

3 min read


Mar 17

Routing Tables: Something Your IT Person Pretends to Know About

This is not about the table that your router is sitting on — In computer networking, a routing table is a database that’s used by routers to determine the best path for forwarding network traffic to its destination. Essentially, a routing table contains information about different networks and the routes that can be taken to reach them. …

Network

2 min read

Routing Tables: Something Your IT Person Pretends to Know About
Routing Tables: Something Your IT Person Pretends to Know About
Network

2 min read

Sean Byrne

Sean Byrne

34 Followers

I’m a data scientist

Following
  • Canx1

    Canx1

  • John Au-Yeung

    John Au-Yeung

  • Tim Denning

    Tim Denning

  • Maya Sayvanova

    Maya Sayvanova

  • Gala Games

    Gala Games

See all (37)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech