Ports Cheat Sheet Poster
This poster has the basics on ports and what the most important ports are used for.
Features of MDE Poster
This poster that dictates the main tabs and what they do on MDE when investigating a device.
A Look Into IPv6 & IPSEC
This is a report that showcases the majority of the IPv6 and IPSec results and their analysis today.
Is a University Degree Enough to Secure a Job in IT Security?
This blog discusses if having a university degree is sufficient to secure a job in IT nowadays.
Brief Overview on Cyber Attacks
This blog explains briefly the types of cyber attacks and the differences between host-based attacks and network-based attacks.
Different Types of Security
This blog explains some of the different types of security and builds upon what threats are and the challenges faced in trying to implement information security.
Podcast: An introduction into Information Security
This podcast will explain simple keywords and key concepts in information security.
“I fell for the HMRC scam and Lost £460”
This blog highlights how I fell victim to a social engineering scam, hopefully my anecdote sheds light on the issue and helps with any questions.
Analysis of the Equifax Breach (2017)
This report showcases my analysis of the Equifax breach for an information security point of view. This includes elements such as a risk assessment, asset register etc.
Intelligent Traffic Light Design Proposal
This report details my proposal for a new intelligent traffic light system which I have created using Arduino.
Networking Analysis
Report that details different important cmd commands and how wireshark can be applied as part of packet capture - part of lab work.
Poisonous Batch of Cookies?
This is a report that addresses whether web cookies are harmful or beneficial.