CYBER SECURITY & DIGITAL FORENSICS
Regardless of your educational or professional background, you can become a cyber security professional! With the right attitude, hard work and attention to detail, you also can make it in this field.
Why wait any longer?
Security Operations
The ultimate purpose of cyber security is to defend individuals, corporations and nation states against the rising threat of cyber crime and cyber warfare.
Digital Forensics
Major incidents often require a forensic examination of the suspect device, network traffic logs, or the cloud environment to determine what has happened.
Incident Response
When a major incident is detected, rapid remediation actions are needed to contain the breach. Incident Responders are key players in this crucial task.
START LEARNING NOW!
Cyber Security Misconceptions
CYBER SECURITY MISCONCEPTIONSCyber Security is a fascinating field and an excellent career choice. Professionals are in high demand, the work is highly significant in protecting society, and they are paid a substantial salary. But hold your horses! Isn’t cyber...
Malware Analysis with ChatGPT
CHATGPT POWERED MALWARE ANALYSISDuring late 2022 and early 2023, ChatGPT made headlines in the tech industry and everyone caught scent of the excitement! ChatGPT is a truly intriguing example of the capabilities of Artificial Intelligence, and how it can be used in...
Triage
TRIAGEWhen you deal with cyber security incidents, the first course of action to be taken is known as Triage. While better known in the medical field, the concept of Triage still holds the same for cyber security. The aim is to prioritize and sort incidents based on...
Endpoint Isolation – The Ultimate Remediation Action
ENDPOINT ISOLATION THE ULTIMATE REMEDIATION ACTIONAs a Cyber Security Analyst, one of the most critical decisions you will have to make is when to isolate an endpoint. This powerful remediation action can halt the spread of malware and prevent data exfiltration from...
Is coding required for Cyber Security?
IS CODING A REQUIREMENT FOR CYBER SECURITYWere you ever under the impression that a cyber security practitioner must know how to code? It is a common misconception. Nevertheless, the notion is not entirely false as the fact of the matter is that certain cyber security...
Do I need a college degree for Cyber Security?
DO I NEED A COLLEGE DEGREE FOR CYBER SECURITY?Have you ever been told that you cannot get into the cyber security field without a college or university degree? If you have, you are not alone! Lametably, this is one of the most common false assumption that permeates...
IACIS Windows Forensic Examiner review
IACIS WINDOWS FORENSIC EXAMINER (WFE)Digital Forensics is a subfield of cyber security that specializes in the in-depth investigation of computer systems and networks. The Windows operating system is still the predominant operating system for desktop and laptop...
Unable to Boot into Linux? Try this!
UNABLE TO BOOT LINUX - INTEL TXTYou have just installed a Linux distribution on your computer. You may have installed it as the primary operating system and wiped out your OEM Windows installation. Now however, your system refuses to boot into Linux and is spinning in...
How many times was a USB storage device connected to a computer?
HOW MANY TIMES WAS A USB STORAGE DEVICE CONNECTED TO A COMPUTER?The Windows operating system stores valuable information about connected Universal Serial Bus (USB) storage devices in the Windows Event Logs which are located in the following file...
WATCHMAN
Watchman is a passionate cyber security professional specializing in Security Operations as well as Digital Forensics & Incident Response. He advocates that anyone who is willing can work their way into the fascinating field of cyber security.
Having a keen eye for detail, Watchman seeks to produce high quality content that will benefit newcomers as well as seasoned professionals.
Watchman’s foundation is his Christian faith.