As I move towards my goals of becoming a CISO, I realize the path that I have taken to become a Sr. Cyber Security Specialist is not like everyone else’s. As a matter of fact, everyone else’s path is different from every other path — and it should be.

The story about my path is for another day, however, I do want to address the struggles that people are facing when trying to break into Cybersecurity; the more you read about it, the more overwhelming and daunting it can become.

Cybersecurity: What is it?

Definition: The practice of protecting internet-connected systems and data from…

By now you should have a clear idea on how your course will flow, but it’s a good idea to write it down and present it in a way that your students will be able to understand, and know what is to come throughout your course. This is called “Course Section Information” or CSI (not to be confused with my favourite show).

The CSI provides guidance on measurable Weekly or Module Learning Objectives, and aligning them with weekly assessments, activities and resources.

The CSI complements the Course Outline you previously created by providing the following:

Section Information

This section indicates the instructor…

The first phase of developing a course is creating the course outline; the purpose is to document the curriculum at the course level and to support the learning process by identifying course learning requirements. It will also be used to highlight evaluation methods, learning activities (lectures, demonstrations, etc.), and learning resources (books, blogs, newsletters, etc.).

A course outline is also a legal contract between a school and the students; a teacher is obligated to give the student various opportunities and methods to learning the skills defined within the outline, and the student will be expected to complete the course requirements…

At the beginning of this new year, January 2021, I was asked to help develop the Digital Forensics course for my local college’s newest program: Cyber Security Analysis Graduate Certificate. I found it very flattering and validating to have been asked to take on this opportunity, especially at a college I where I was once a student myself. I immediately started to think about all the neat projects, labs, tools and images the students will be able to tinker with; with that came a feeling of being overwhelmed and not knowing where to start. …

When I ask people how they feel about the idea of working in a SOC, I get a lot of mixed feelings. Depending on what kind of SOC they worked in, they had different experiences that ranged from horror stories to the best decision ever.

I’m not going to lie, there were some aspects of the job that I disliked such as the shift work, but most of it was wonderful and I learnt a great deal of skills: network security, application security, vulnerability assessment, good analysis habits, scripting and reporting— also, the people made all the difference. …

Just like an employee performance review, its tradition that we sit and review the year; we take note of the ups and downs, the lessons learnt, make predictions for the next year, and make a plan. However, unlike an employee that really wants to keep their job or bonus, a year is unpredictable. Sometimes we are right, and sometimes we get blindsided like the sudden death of beloved Grant Imahara (I spent that week watching Myth Busters).

Moving on from the trauma, we are here to talk about Cyber Security in 2021! …

I have been working in the Information Technology field for the past 12 years, discovering new things everyday. The world of IT is changing rapidly, and it is almost impossible to know everything. In fact, sometimes the more you know, the less you know. Technology is both getting more simple and more complicated at the same time which can make is difficult for new members to get a good grasp on core concepts.

So if you wanted to jump into IT, or just know where to improve and elevate your game, here is where I would start.

Banner displaying the Whonix logo (combination dial lock), Tails logo (USB interface), and Qubes logo (large blue Q).
Banner displaying the Whonix logo (combination dial lock), Tails logo (USB interface), and Qubes logo (large blue Q).
Whonix logo, Tails logo, and Qubes logo.

The demand for user privacy and anonymity is at its highest than ever, and appears to be here to stay. In my last blog, I talked about the difference of using VPN and TOR, or VPN over TOR, and vice versa, and we looked at the different use cases for each.

This usage of TOR and VPN typically runs on the host machine, and grants user’s privacy and anonymity, but what about the user’s security? That’s where an anonymity focused OS can also be used to increase the security of the host.

I will be focusing on Tails, Qubes, and…

There are many security best practices that a Cyber Security professional will implement at work to ensure proper Cyber Hygiene is kept on all systems and environments — but what about at home?

Cyber Hygiene You Say?

Cyber Hygiene is just as important to upkeep as your regular day personal hygiene to ward off natural weakening; it refers to the practices and steps that owners of computers and other devices take to maintain the system’s health and improve online security. Following these best practices and steps help improve the safety of credentials and confidential data that is at risk of corruption or theft.

Poor Cyber Hygiene Outcomes


There is always the debate about which tool is better, VPN or Tor; and for a short answer: it depends.

However, I want to talk about increasing anonymity over the Internet and improving security of web traffic by using a combination of these tools. There are benefits and drawbacks of doing so, and the order makes a difference.

Tor for Anonymity

Tor has always been considered providing stronger anonymity than VPN; your data first arrives at the network through a random node around the world. …


Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store