Skip to main content

About me

About Me:


Welcome to my blog! I'm Toukee Vang, and I'm thrilled to have you here. As an enthusiastic newcomer to the cybersecurity world, my journey began as a recent graduate from Flatiron Cybersecurity Analyst, where I honed my skills and expertise in the fascinating realm of information security. This blog is my way of sharing my experiences and knowledge as I continue to learn and grow in this ever-evolving field.


My Skills:


My focus in cybersecurity revolves around the fundamentals of both Linux and Windows operating systems. I'm passionate about helping individuals, especially those at the entry-level, navigate the intricacies of these platforms to bolster their digital defenses and protect their valuable data.


Moreover, my educational background has given me a strong foundation in the intricacies of Governance, Risk, and Compliance (GRC). I believe that understanding the policies, procedures, and standards that govern cybersecurity is essential for success in this field. I'll be sharing insights, tips, and best practices related to GRC to demystify this vital aspect of cybersecurity.


In addition, I'm well-versed in industry standards such as NIST (National Institute of Standards and Technology) and PCI-DSS (Payment Card Industry Data Security Standard). These frameworks are crucial for maintaining robust security measures, and I'm eager to guide you through their principles, ensuring you have a solid grasp of their implications.


My Mission:


This blog is not just about me; it's about building a community of learners who are as passionate about cybersecurity as I am. I'm here to provide you with educational resources, tutorials, and insights to help you navigate the exciting and ever-changing world of information security.


So, whether you're a cybersecurity enthusiast looking to enhance your knowledge or someone just starting their journey into this field, this blog is a place where you can find valuable information, insights, and tips. Let's embark on this cybersecurity adventure together and bolster our digital defenses while staying up-to-date with the latest trends and best practices.


Thank you for joining me on this journey, and I look forward to connecting with you and sharing our experiences in the world of cybersecurity.

Comments

Popular posts from this blog

Virtual Machine Set-up

  Virtual Machine Set-Up with Kali Linux To start working in a test environment, we will need to set up a virtual machine. This requires some minimum specification of hardware to run this virtual machine. Please reference the virtual box for more information.  https://www.virtualbox.org/wiki/End-user_documentation   Once you have the minimum hardware requirements we can move on to the next steps. Virtual Box installation Kali installation Virtual Box Installation: In the browser go to https://www.virtualbox.org/ to download the file for your operation system. If you have Windows, download the Windows hosts, and if you have macOS download macOS. You can install the application once you have the file downloaded to your host system.  Run the VirtualBox installer and follow the default installation Once installing is complete you can search for the application in your system and open the application. Once VirtualBox is open it should look something like this. Downloadin...

Nmap Scan

  Nmap scan Youtube If you missed the first part of setting up the virtual machines and ping, do this part first before attempting to scan the devices on the network. https://toukeevang.blogspot.com/2023/10/3-vm-ping-connection-in-this-project-we.html We first going to start with an ARP scan to get the device's IP address. On your Kali virtual machine, open the terminal and type the following command. > nmap -PR -sn 10.0.2.0/24 nmap = is the tool we are using followed by some options within the tool. -PR = P is for ping, R is for randomize  -sn = ping scan no port x.x.x.x = your target IP address This next scan is to test websites and get the known IP address for the website. For this scan, you need to use the escalated privilege “ sudo “.  > sudo nmap -PE -sn scanme.nmap.org sudo = escalated privilege nmap = tool use -PE = sends ICMP packet only to get responses back -sn = ping scan no ports Scanme.nmap.org = target We are going to copy the IP addresses of the virt...