Skip to main content

About me

About Me:


Welcome to my blog! I'm Toukee Vang, and I'm thrilled to have you here. As an enthusiastic newcomer to the cybersecurity world, my journey began as a recent graduate from Flatiron Cybersecurity Analyst, where I honed my skills and expertise in the fascinating realm of information security. This blog is my way of sharing my experiences and knowledge as I continue to learn and grow in this ever-evolving field.


My Skills:


My focus in cybersecurity revolves around the fundamentals of both Linux and Windows operating systems. I'm passionate about helping individuals, especially those at the entry-level, navigate the intricacies of these platforms to bolster their digital defenses and protect their valuable data.


Moreover, my educational background has given me a strong foundation in the intricacies of Governance, Risk, and Compliance (GRC). I believe that understanding the policies, procedures, and standards that govern cybersecurity is essential for success in this field. I'll be sharing insights, tips, and best practices related to GRC to demystify this vital aspect of cybersecurity.


In addition, I'm well-versed in industry standards such as NIST (National Institute of Standards and Technology) and PCI-DSS (Payment Card Industry Data Security Standard). These frameworks are crucial for maintaining robust security measures, and I'm eager to guide you through their principles, ensuring you have a solid grasp of their implications.


My Mission:


This blog is not just about me; it's about building a community of learners who are as passionate about cybersecurity as I am. I'm here to provide you with educational resources, tutorials, and insights to help you navigate the exciting and ever-changing world of information security.


So, whether you're a cybersecurity enthusiast looking to enhance your knowledge or someone just starting their journey into this field, this blog is a place where you can find valuable information, insights, and tips. Let's embark on this cybersecurity adventure together and bolster our digital defenses while staying up-to-date with the latest trends and best practices.


Thank you for joining me on this journey, and I look forward to connecting with you and sharing our experiences in the world of cybersecurity.

Comments

Popular posts from this blog

Linux Server Installation

Linux Server Installation Youtube In the lab, we are going to install a Linux Server on a virtual box. Go to the Linux site and download the ISO for installation. https://ubuntu.com/download/server Once you have downloaded the ISO, go to the virtual box and start a new virtual machine. Name your machine and choose the ISO you downloading for installation. Choose your RAM and CPU settings. Change your network to “ NAT NETWORK”. Launch your new machine and follow the installation. Choose the first option. Install Ubuntu Server. Once you finish installation it will restart. Make sure to remove the ISO disk so you do not go through the installation process again. You will be prompted to log in with the username and password you created during the installation.  This completes the Linux Server installation.  

Virtual Machine Set-up

  Virtual Machine Set-Up with Kali Linux To start working in a test environment, we will need to set up a virtual machine. This requires some minimum specification of hardware to run this virtual machine. Please reference the virtual box for more information.  https://www.virtualbox.org/wiki/End-user_documentation   Once you have the minimum hardware requirements we can move on to the next steps. Virtual Box installation Kali installation Virtual Box Installation: In the browser go to https://www.virtualbox.org/ to download the file for your operation system. If you have Windows, download the Windows hosts, and if you have macOS download macOS. You can install the application once you have the file downloaded to your host system.  Run the VirtualBox installer and follow the default installation Once installing is complete you can search for the application in your system and open the application. Once VirtualBox is open it should look something like this. Downloadin...

3 VM - Ping Connection

  3 VM - Ping Connection Youtube In this project, we will install 3 virtual machines to communicate with each other. We already installed the Kali machine so we just need to install the other 2.  If you missed the installation of Kali, follow this blog.  https://toukeevang.blogspot.com/2023/10/virtual-machine-set-up.html   Installation Windows and Cloning the Kali machine.  Windows Ensure you have the minimum hardware requirement before starting or the lab will utilize many of your hardware resources. https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn303418(v=ws.11)   Go to the Windows website, download the Windows Server 2012 R2, and follow the instructions. https://www.microsoft.com/en-us/evalcenter/download-windows-server-2012-r2   Once you have downloaded the ISO open VirtualBox and click “New” Give your virtual machine a name and search for the ISO Image where you download the file. Name Folder - ...