cyber security guides
Cyber Security Guides
Find Out how or what
Welcome to our guides section full of what is and how to guides to help you!
Cybersecurity and Information Technology are vast and ever-expanding areas. I can see a time where anyone knows everything about Cyber Security.
As a result of this, there are many times each week when I will come across issues, questions or situations that I have not encountered before. In these situations, I always try to take notes and document what I have done to help others who may encounter the same problems.
So In this section, I will be documenting the two types of guides that I generally keep How to and What is.

SC-200 Exam Guide
Sc-200 This article will share how I successfully prepared for and passed the SC-200: Microsoft Security Operations Analyst certification exam. Introduction Microsoft is continually updating

Blocking Users By Country Using Azure Conditional Access
As many of us will have been reading about and hearing about in the news, online and in our feeds. Due to the situation in

What is SSO?
Single sign-on (SSO) allows users to sign on with a single set of credentials to access multiple applications and services. SSO provides increased security and

Best Cyber security certifications for beginners
Best Cyber security certifications for beginners “What are the best beginners cyber security certifications” is probably the question that most people I have spoken to

How Can I Fix an 0x0 0x0 Error Permanently?
If you have found this article, it probably means that you have encountered the 0x0 0x0 error code and are looking to fix it. In that is the case, you’ve found the right place as we’ll cover everything you need to know about how to fix the 0x0

types of hackers & what i should know
Different types of hackers can pose cyber threats for businesses and government agencies in today’s modern and digital world. These hackers can gain unauthorized access to your computer system. If you want to learn more about the hacking industry, this article is for you.

What Is A Dynamic Web Page?
Most web applications nowadays are a combination of dynamic and static web pages. A static web page consists of simple HTML pages together with supporting
Different Types of USB Port and USB Cables
The Universal Serial Bus (USB) is a standard that is nowadays used to connect all types of devices. Although the name says “universal” this is
How To Become a Cyber Security Engineer
Security engineers, also known as information security engineers, fulfill a technical role within an organization. The primary function of security engineering jobs is to monitor

What is a Pineapple wifi?
A lot of you love pineapples for their many health benefits. But, it is the case with wifi Pineapple. A wifi Pineapple is one of
Ways to Check A Website is Legit
Ways to Check if a Website is Legit The internet, like many other technological advances, has made the way we lead our lives much easier.
Small Business Cyber Security
What You Need To Know About Small Business Cyber Security It’s critically important for you to protect your business against cyber-attacks, irrespective of whether you’re
How to Spot A Fake Email
Coming Soon 7 Essential Tips to Spot a Fake Email Along with the advent of new technologies today, online threats such as cybercrime became prominent.

What Is Spear Phishing
Coming Soon Spear Phishing With the advanced technology that many people use, hackers and scammers tend to use advanced techniques to invade people’s privacy, steal

9 Most Common Types Of Malware And How to Prevent Them
The most common types of malware infections are caused by keyloggers, rootkits, viruses, trojans, worms, logic bombs, ransomware / crypto-malware, spyware & adware, and bots/botnets.

Cyber Security glossary
Cyber Security Glossary Cybersecurity terminology is explained in plain English. I’ve not met anyone yet, who can keep up with all the cybersecurity terms, jargon,

What is Torrenting and How Does It Work?
You’ll probably already know what is torrenting if you used the Internet streaming sites made their appearance. You may even have used torrent sites to

Red Team vs Blue Team vs Purple Team
Irrespective of the industry an organisation is in or its size, a very effective way to prevent possible cyber threats and discover infrastructure vulnerabilities is

What Is smishing
What is Smishing? One of the many types of phishing attacks is smashing, and it targets mobile devices. Rather than sending phishing messages via email,

What Is Spoofing
What is Spoofing? A Definition of Spoofing Spoofing is when someone disguises a communication, such as an email, that comes from a source that is
What Is Vishing
Coming soon What is Vishing? Series of cybercrime are done in different ways on many platforms. Since many people prominently use technology and online transactions,

What is Data Classification?
In the world of Information Security, it is clearly understood that different types of data are not all treated the same. A data classification system

Multi-Factor Authentication (MFA Meaning)
What Does MFA Stand For? Multi-factor Authentication (MFA), also known as two-factor authentication (2FA), does not only use a simple username and password combination to

What does Hashing, Encoding and Encryption Mean?
The terms encoding encryption and hashing are often misused and interchanged. It is essential to know the differences between them and why and when each