Category Archives: Cyber Security Articles

nmap scanning | Learn Nmap

In this blog, I will teach you different types of Nmap scanning techniques and how to use each Nmap scanning technique one by one with examples. This is a detailed article on Nmap scanning and how to defend it. Nmap ping scan: Nmap ping scan is used to check whether the target host is up… Read More »

Digital Forensics | Learn Digital Forensics

What is Digital Forensics? Digital Forensics also called network forensics and has many definitions. In general, it is considered the application of science to the identification, collection, examination, and analysis of data while information integrity is preserved and a strict chain of custody is maintained for the data. Types of Data: While in the first… Read More »

Penetration Testing

Penetration testing also called pentest is a real attack against your network, app, or other resources with proper permission in order to find vulnerabilities that can be exploited. In other words, it is a security testing of systems to find loopholes and exploit them in a safe way with a proper permission of an organization… Read More »