Skip to main content

Recently Updated Pages

code for the home page

Naru's work

<div class="image-container"> <div class="socials"> <h2><a title="My Discord Server" hr...

Updated 1 year ago by naruzkurai

splines plugin code default

naru logs splines plugin

using System; using System.Collections.Generic; using System.Linq; using Unity.Collections; u...

Updated 1 year ago by naruzkurai

Preface

Naru's work

HI! im the owner of this site, I'm going to drop things that aren't related my my game idea here!

Updated 1 year ago by naruzkurai

the dream, a western

Naru's work

I reckon I dozed off for a good two hours and found myself in the wildest dream, somethin' I'd ne...

Updated 1 year ago by naruzkurai

Kuroik blood

Blood Witch Diary Entries

I have something bugging me. And it's why not everything can use magic. Especially the invading h...

Updated 1 year ago by naruzkurai

Components of network layer communication

[Completed] Professional Google Cyberse... Network Communication

Components of network layer communication In the reading about the OSI model, you learned about ...

Updated 2 years ago by naruzkurai

The OSI model

[Completed] Professional Google Cyberse... Network Communication

So far in this section of the course, you learned about the components of a network, network devi...

Updated 2 years ago by naruzkurai

Learn more about the TCP/IP model

[Completed] Professional Google Cyberse... Network Communication

In this reading, you will build on what you have learned about the Transmission Control Protocol/...

Updated 2 years ago by naruzkurai

1.1.4 Threat Actors

[FORGOTTEN] CISCO DIVD Academy Ethical ...

Before you can understand how an ethical hacker or penetration tester can mim...

Updated 2 years ago by naruzkurai

1.1.3 Lab - Researching PenTesting Careers

[FORGOTTEN] CISCO DIVD Academy Ethical ...

Protego Security Solutions I think i...

Updated 2 years ago by naruzkurai

1.1.1 Overview

[FORGOTTEN] CISCO DIVD Academy Ethical ...

1.1.1 Overview ...

Updated 2 years ago by naruzkurai

1.0.1-1.0.2 Why Should I Take This Module and what will i learn?

[FORGOTTEN] CISCO DIVD Academy Ethical ...

1.0.1 Why Should I Take This Module? ...

Updated 2 years ago by naruzkurai

overview

[FORGOTTEN] CISCO DIVD Academy Ethical ...

i started ripping this course on August 30th of 2023  so some things may be a bit ...

Updated 2 years ago by naruzkurai

Welcome to the Ethical Hacker Course

[FORGOTTEN] CISCO DIVD Academy Ethical ...

i started ripping this course on August 30th of 2023  so some things may be a bit different ...

Updated 2 years ago by naruzkurai

Course wrap-up

[Completed] Professional Google Cyberse...

Congratulations on making it through the end of this course! I can hardly believe...

Updated 2 years ago by naruzkurai

Terms and definitions from Course 5

[Completed] Professional Google Cyberse...

Cybersecurity Glossary A Access controls: Security controls that manage access, authorization, ...

Updated 2 years ago by naruzkurai

Wrap-up; terms and definitions from course 5, week 1

[Completed] Professional Google Cyberse...

Well done! You made it to the end of this section! Being a security practitioner takes co...

Updated 2 years ago by naruzkurai

Wrap-up; terms and definitions from course 5, week 4

[Completed] Professional Google Cyberse...

Managing threats is a major part of what security professionals do. In this part of the cou...

Updated 2 years ago by naruzkurai

Traits of an effective threat model

[Completed] Professional Google Cyberse...

Threat modeling is the process of identifying assets, their vulnerabilities, and how each is expo...

Updated 2 years ago by naruzkurai

PASTA: The Process for Attack Simulation and Threat Analysis

[Completed] Professional Google Cyberse...

Let's finish exploring threat modelling by taking a look at real-world scenarios. This ti...

Updated 2 years ago by naruzkurai