Category Archives: Cyber Security Articles

nmap scanning | Learn Nmap

In this blog, I will teach you different types of Nmap scanning techniques and how to use each Nmap scanning technique one by one with examples. This is a detailed article on Nmap scanning and how to defend it. Nmap ping scan: Nmap ping scan is used to check whether the target host is up… Read More »

Digital Forensics | Learn Digital Forensics

What is Digital Forensics? Digital Forensics also called network forensics and has many definitions. In general, it is considered the application of science to the identification, collection, examination, and analysis of data while information integrity is preserved and a strict chain of custody is maintained for the data. Types of Data: While in the first… Read More »

Penetration Testing

Penetration testing also called pen test is a real attack against your network, app or other resources with a proper permission in order to find vulnerabilities that can be exploited. In other words it is a security testing of systems to find loopholes and to exploit it in a safe way with a proper permission… Read More »