Recently Updated Pages
code for the home page
<div class="image-container"> <div class="socials"> <h2><a title="My Discord Server" hr...
splines plugin code default
using System; using System.Collections.Generic; using System.Linq; using Unity.Collections; u...
Preface
HI! im the owner of this site, I'm going to drop things that aren't related my my game idea here!
the dream, a western
I reckon I dozed off for a good two hours and found myself in the wildest dream, somethin' I'd ne...
Kuroik blood
I have something bugging me. And it's why not everything can use magic. Especially the invading h...
Components of network layer communication
Components of network layer communication In the reading about the OSI model, you learned about ...
The OSI model
So far in this section of the course, you learned about the components of a network, network devi...
Learn more about the TCP/IP model
In this reading, you will build on what you have learned about the Transmission Control Protocol/...
1.1.4 Threat Actors
Before you can understand how an ethical hacker or penetration tester can mim...
1.1.3 Lab - Researching PenTesting Careers
Protego Security Solutions I think i...
1.1.1 Overview
1.1.1 Overview ...
1.0.1-1.0.2 Why Should I Take This Module and what will i learn?
1.0.1 Why Should I Take This Module? ...
overview
i started ripping this course on August 30th of 2023 so some things may be a bit ...
Welcome to the Ethical Hacker Course
i started ripping this course on August 30th of 2023 so some things may be a bit different ...
Course wrap-up
Congratulations on making it through the end of this course! I can hardly believe...
Terms and definitions from Course 5
Cybersecurity Glossary A Access controls: Security controls that manage access, authorization, ...
Wrap-up; terms and definitions from course 5, week 1
Well done! You made it to the end of this section! Being a security practitioner takes co...
Wrap-up; terms and definitions from course 5, week 4
Managing threats is a major part of what security professionals do. In this part of the cou...
Traits of an effective threat model
Threat modeling is the process of identifying assets, their vulnerabilities, and how each is expo...
PASTA: The Process for Attack Simulation and Threat Analysis
Let's finish exploring threat modelling by taking a look at real-world scenarios. This ti...