Skip to main content

About me

About Me:


Welcome to my blog! I'm Toukee Vang, and I'm thrilled to have you here. As an enthusiastic newcomer to the cybersecurity world, my journey began as a recent graduate from Flatiron Cybersecurity Analyst, where I honed my skills and expertise in the fascinating realm of information security. This blog is my way of sharing my experiences and knowledge as I continue to learn and grow in this ever-evolving field.


My Skills:


My focus in cybersecurity revolves around the fundamentals of both Linux and Windows operating systems. I'm passionate about helping individuals, especially those at the entry-level, navigate the intricacies of these platforms to bolster their digital defenses and protect their valuable data.


Moreover, my educational background has given me a strong foundation in the intricacies of Governance, Risk, and Compliance (GRC). I believe that understanding the policies, procedures, and standards that govern cybersecurity is essential for success in this field. I'll be sharing insights, tips, and best practices related to GRC to demystify this vital aspect of cybersecurity.


In addition, I'm well-versed in industry standards such as NIST (National Institute of Standards and Technology) and PCI-DSS (Payment Card Industry Data Security Standard). These frameworks are crucial for maintaining robust security measures, and I'm eager to guide you through their principles, ensuring you have a solid grasp of their implications.


My Mission:


This blog is not just about me; it's about building a community of learners who are as passionate about cybersecurity as I am. I'm here to provide you with educational resources, tutorials, and insights to help you navigate the exciting and ever-changing world of information security.


So, whether you're a cybersecurity enthusiast looking to enhance your knowledge or someone just starting their journey into this field, this blog is a place where you can find valuable information, insights, and tips. Let's embark on this cybersecurity adventure together and bolster our digital defenses while staying up-to-date with the latest trends and best practices.


Thank you for joining me on this journey, and I look forward to connecting with you and sharing our experiences in the world of cybersecurity.

Comments

Popular posts from this blog

Virtual Machine Set-up

  Virtual Machine Set-Up with Kali Linux To start working in a test environment, we will need to set up a virtual machine. This requires some minimum specification of hardware to run this virtual machine. Please reference the virtual box for more information.  https://www.virtualbox.org/wiki/End-user_documentation   Once you have the minimum hardware requirements we can move on to the next steps. Virtual Box installation Kali installation Virtual Box Installation: In the browser go to https://www.virtualbox.org/ to download the file for your operation system. If you have Windows, download the Windows hosts, and if you have macOS download macOS. You can install the application once you have the file downloaded to your host system.  Run the VirtualBox installer and follow the default installation Once installing is complete you can search for the application in your system and open the application. Once VirtualBox is open it should look something like this. Downloadin...

Kali Installation

  Kali Installation Youtube In this blog, we are going how to install Kali on to virtual box. The first step is to go to the Kali website and download the ISO for installation.  https://www.kali.org/get-kali/#kali-virtual-machines Once you have downloaded the ISO, make sure you have a tool to unzip the compressed file. You down download 7-zip for free. https://www.7-zip.org/ Download the version for your operating system and install 7-zip. Once you have finished installing 7-zip you will be able to unzip the compressed file. Find the file you downloaded from Kali and right-click choose more option if you do not see 7-zip. You can choose where you would like your extracted file to be stored. In this case, I choose to extract the file in this location. Once you extract the compressed file you will see another file called kali-linux-XXX.Xvirtualbox-amd.ova Double-click on that file and it will import the Kali operating system into the virtual box.  Choose the RAM and CPU set...

3 VM - Ping Connection

  3 VM - Ping Connection Youtube In this project, we will install 3 virtual machines to communicate with each other. We already installed the Kali machine so we just need to install the other 2.  If you missed the installation of Kali, follow this blog.  https://toukeevang.blogspot.com/2023/10/virtual-machine-set-up.html   Installation Windows and Cloning the Kali machine.  Windows Ensure you have the minimum hardware requirement before starting or the lab will utilize many of your hardware resources. https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn303418(v=ws.11)   Go to the Windows website, download the Windows Server 2012 R2, and follow the instructions. https://www.microsoft.com/en-us/evalcenter/download-windows-server-2012-r2   Once you have downloaded the ISO open VirtualBox and click “New” Give your virtual machine a name and search for the ISO Image where you download the file. Name Folder - ...