PinnedPublished inInfoSec Write-upsFinal Part: Automation with Shuffle SOARThis is the final part, where we will implement the Shuffle SOAR configuration and finalize the overall project. Let’s get started!Jun 1, 20241Jun 1, 20241
3 Mistakes to Avoid as a Beginner in CybersecurityGreetings, fellow digital adventurers! I am Ghostploit, and today I will share my cybersecurity journey and the mistakes I made when I…2d ago2d ago
Published inInfoSec Write-upsHow Spanning Tree Protocol (STP) WorksHello everyone. Today I will talk about the Spanning Tree Protocol (STP).6d ago6d ago
Published inInfoSec Write-upsA Step-by-Step Guide to Installing and Configuring Active DirectoryIn the world of modern IT infrastructure, Active Directory (AD) is more than just a directory service — it’s the backbone of identity and…Jan 1Jan 1
Published inThe Thought CollectionHow to Start Your Cybersecurity JourneyIn a world where technology drives nearly every aspect of our lives, cybersecurity stands as the invisible shield protecting our digital…Dec 29, 2024Dec 29, 2024
Published inInfoSec Write-upsHow to Send Windows Logs to IBM QRadar Using WinCollectOne of the most effective ways to forward Windows event logs to QRadar is by using WinCollect, a lightweight log collection agent developed…Dec 25, 2024Dec 25, 2024
Published inInfoSec Write-upsHow to install and configure IBM QradarIBM QRadar is a powerful Security Information and Event Management (SIEM) solution designed to provide advanced threat detection, log…Dec 20, 2024Dec 20, 2024
Published inThe Thought CollectionDifferent types of ProxyToday, we’ll dive into the concept of proxies, exploring what they are, the different types available, and their respective benefits. Let’s…Dec 12, 2024Dec 12, 2024