Welcome to cyberhub.dev

Recent Posts

Naveen's Avatar'

Operational Policy

Security policies are a collection of documents that starts with a set of principles that communicate standard rules across the organization. The implementation of the principles is detailed in the policy documents. These policy documents also outline the controls, actions, and processes to be performed by an organization. The security policy will discuss the type of controls that need to be in...

Security policies are a collection of documents that starts with a set of principles that communicate standard rules across the organization. The implementation of the principles is detailed in the policy documents. These policy documents also outline the controls, actions, and processes to be pe...

Naveen's Avatar'

Network Visualization and Vulnerability Detection

Network visualization and vulnerability detection is a process and tool that security professional utilize to help them understand network tra!c data or log entries to identify security threats and vulnerabilities within the network. By understanding what’s happening on the network will help detect intrusion and prevent or mitigate an attack. There are several open-source and commercial tools a...

Network visualization and vulnerability detection is a process and tool that security professional utilize to help them understand network tra!c data or log entries to identify security threats and vulnerabilities within the network. By understanding what’s happening on the network will help dete...

Naveen's Avatar'

Management and Cyber Security

The purpose of the Information System Security Plan (ISSP) is to help the business determine the ideal path for achieving their business objectives. It outlines the responsibilities and accepted behavior of all individuals who access the system. The system security plan should be regarded as documentation of the structured process of planning adequate, cost- e!ective security protection for a s...

The purpose of the Information System Security Plan (ISSP) is to help the business determine the ideal path for achieving their business objectives. It outlines the responsibilities and accepted behavior of all individuals who access the system. The system security plan should be regarded as docu...

Naveen's Avatar'

Incident Response and Computer Network Forensics

Every organization in today’s digital world experiences cyber incidents such as network intrusion, information leaks, and data breaches. The response to these incidents needs a structured process and security tools to quickly and safely extract evidence to identify how the intruders gained access to the system and what information they accessed. This course helped me to understand the challenge...

Every organization in today’s digital world experiences cyber incidents such as network intrusion, information leaks, and data breaches. The response to these incidents needs a structured process and security tools to quickly and safely extract evidence to identify how the intruders gained access...