Blog

  • Python Email Automation Project

    Python Email Automation Project

    (So Time Spent Checking My Emails are More Productive) I was recently thinking of ways that I could make time spent on my phone more productive. I recently deleted apps like YouTube and Instagram limiting myself to only view on my laptop for my own good (which seems to be reducing my time spent on Read more

  • My Guide to The Microsoft Azure Associate (AZ-104)

    My Guide to The Microsoft Azure Associate (AZ-104)

    It’s no secret that the world of technology moves at light speed when it comes to adopting new tools, platforms, and innovations. Much like how “AI” has become the buzz word of these past couple years, “Cloud” is probably up there as another hyped up term in the current state of tech. This past summer Read more

  • Linux Backdoor With A SOC Perspective

    Linux Backdoor With A SOC Perspective

    Hi everyone! I have been incredibly lucky to stumble upon the online content posted by Black Hills Information Security Owner and Security Analyst, John Strand. All credit to John Strand and his online documentation for the lab that I was able to complete this past weekend! The goal and learning from this lab highlights how Read more

  • Creating Ransomware With Python (For Educational Purposes)

    Creating Ransomware With Python (For Educational Purposes)

    Hello! This past weekend I checked out NetworkChuck’s video on creating malware using python and created my own ransomware. This is a cool demo that I tried within my VMs to understand some of the basics of how ransomware works (for learning purposes only). It’s scary how simple this lab was! If you plan on Read more

  • My Experience as a Palo Alto Networks “Secure the Future” Top 10 Finalist

    My Experience as a Palo Alto Networks “Secure the Future” Top 10 Finalist

    In an ever-evolving digitally-connected world, the frequency of cyberattacks targeting business systems is surging at an alarming rate. This obviously poses a significant threat to companies of all sizes, from small enterprises to large corporations, jeopardizing both their operational capabilities and their reputation. According to Cybersecurity Ventures, cybercrime costs are on a trajectory to hit Read more