As I move towards my goals of becoming a CISO, I realize the path that I have taken to become a Sr. Cyber Security Specialist is not like everyone else’s. As a matter of fact, everyone else’s path is different from every other path — and it should be.

The story about my path is for another day, however, I do want to address the struggles that people are facing when trying to break into Cybersecurity; the more you read about it, the more overwhelming and daunting it can become.

Definition: The practice of protecting internet-connected systems and data from…


Back in November 2020, I wrote a blog titled, “Cybersecurity: The Starting line”, and focused on where an individual should start when trying to enter the Cybersecurity field. The blog touched aspects of the different areas/roles one can choose from when entering cyber security, as well as how to get started by learning the basics.

I’m happy to share with you all that Try Hack Me (THM) has launched a new and FREE learning path called Pre-Security. …


The words, “Ransomware Attack” have become a regular occurrence in headlines across many fields such as Health Care, Government, Police Agencies, big techs, and even the smaller folks. It has become one of the most active and profound threats that an organization can face today:

January 2021 recorded a total of 19 attacks. Amongst these attacks:

  • Apex Laboratory which had to disclose after stolen data was leaked online
  • Hackney Council in London were subjected to a double extortion style attack on significant amount of PII(where you pay once to decrypt your encrypted data, and another payment to ensure the data…


By now you should have a clear idea on how your course will flow, but it’s a good idea to write it down and present it in a way that your students will be able to understand, and know what is to come throughout your course. This is called “Course Section Information” or CSI (not to be confused with my favourite show).

The CSI provides guidance on measurable Weekly or Module Learning Objectives, and aligning them with weekly assessments, activities and resources.

The CSI complements the Course Outline you previously created by providing the following:

This section indicates the instructor…


The first phase of developing a course is creating the course outline; the purpose is to document the curriculum at the course level and to support the learning process by identifying course learning requirements. It will also be used to highlight evaluation methods, learning activities (lectures, demonstrations, etc.), and learning resources (books, blogs, newsletters, etc.).

A course outline is also a legal contract between a school and the students; a teacher is obligated to give the student various opportunities and methods to learning the skills defined within the outline, and the student will be expected to complete the course requirements…


At the beginning of this new year, January 2021, I was asked to help develop the Digital Forensics course for my local college’s newest program: Cyber Security Analysis Graduate Certificate. I found it very flattering and validating to have been asked to take on this opportunity, especially at a college I where I was once a student myself. I immediately started to think about all the neat projects, labs, tools and images the students will be able to tinker with; with that came a feeling of being overwhelmed and not knowing where to start. …


When I ask people how they feel about the idea of working in a SOC, I get a lot of mixed feelings. Depending on what kind of SOC they worked in, they had different experiences that ranged from horror stories to the best decision ever.

I’m not going to lie, there were some aspects of the job that I disliked such as the shift work, but most of it was wonderful and I learnt a great deal of skills: network security, application security, vulnerability assessment, good analysis habits, scripting and reporting— also, the people made all the difference. …


Just like an employee performance review, its tradition that we sit and review the year; we take note of the ups and downs, the lessons learnt, make predictions for the next year, and make a plan. However, unlike an employee that really wants to keep their job or bonus, a year is unpredictable. Sometimes we are right, and sometimes we get blindsided like the sudden death of beloved Grant Imahara (I spent that week watching Myth Busters).

Moving on from the trauma, we are here to talk about Cyber Security in 2021! …


I have been working in the Information Technology field for the past 12 years, discovering new things everyday. The world of IT is changing rapidly, and it is almost impossible to know everything. In fact, sometimes the more you know, the less you know. Technology is both getting more simple and more complicated at the same time which can make is difficult for new members to get a good grasp on core concepts.

So if you wanted to jump into IT, or just know where to improve and elevate your game, here is where I would start.


Banner displaying the Whonix logo (combination dial lock), Tails logo (USB interface), and Qubes logo (large blue Q).
Whonix logo, Tails logo, and Qubes logo.

The demand for user privacy and anonymity is at its highest than ever, and appears to be here to stay. In my last blog, I talked about the difference of using VPN and TOR, or VPN over TOR, and vice versa, and we looked at the different use cases for each.

This usage of TOR and VPN typically runs on the host machine, and grants user’s privacy and anonymity, but what about the user’s security? That’s where an anonymity focused OS can also be used to increase the security of the host.

I will be focusing on Tails, Qubes, and…

4n6lady

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store