Skip to main content

About me

About Me:


Welcome to my blog! I'm Toukee Vang, and I'm thrilled to have you here. As an enthusiastic newcomer to the cybersecurity world, my journey began as a recent graduate from Flatiron Cybersecurity Analyst, where I honed my skills and expertise in the fascinating realm of information security. This blog is my way of sharing my experiences and knowledge as I continue to learn and grow in this ever-evolving field.


My Skills:


My focus in cybersecurity revolves around the fundamentals of both Linux and Windows operating systems. I'm passionate about helping individuals, especially those at the entry-level, navigate the intricacies of these platforms to bolster their digital defenses and protect their valuable data.


Moreover, my educational background has given me a strong foundation in the intricacies of Governance, Risk, and Compliance (GRC). I believe that understanding the policies, procedures, and standards that govern cybersecurity is essential for success in this field. I'll be sharing insights, tips, and best practices related to GRC to demystify this vital aspect of cybersecurity.


In addition, I'm well-versed in industry standards such as NIST (National Institute of Standards and Technology) and PCI-DSS (Payment Card Industry Data Security Standard). These frameworks are crucial for maintaining robust security measures, and I'm eager to guide you through their principles, ensuring you have a solid grasp of their implications.


My Mission:


This blog is not just about me; it's about building a community of learners who are as passionate about cybersecurity as I am. I'm here to provide you with educational resources, tutorials, and insights to help you navigate the exciting and ever-changing world of information security.


So, whether you're a cybersecurity enthusiast looking to enhance your knowledge or someone just starting their journey into this field, this blog is a place where you can find valuable information, insights, and tips. Let's embark on this cybersecurity adventure together and bolster our digital defenses while staying up-to-date with the latest trends and best practices.


Thank you for joining me on this journey, and I look forward to connecting with you and sharing our experiences in the world of cybersecurity.

Comments

Popular posts from this blog

Nmap Scan

  Nmap scan Youtube If you missed the first part of setting up the virtual machines and ping, do this part first before attempting to scan the devices on the network. https://toukeevang.blogspot.com/2023/10/3-vm-ping-connection-in-this-project-we.html We first going to start with an ARP scan to get the device's IP address. On your Kali virtual machine, open the terminal and type the following command. > nmap -PR -sn 10.0.2.0/24 nmap = is the tool we are using followed by some options within the tool. -PR = P is for ping, R is for randomize  -sn = ping scan no port x.x.x.x = your target IP address This next scan is to test websites and get the known IP address for the website. For this scan, you need to use the escalated privilege “ sudo “.  > sudo nmap -PE -sn scanme.nmap.org sudo = escalated privilege nmap = tool use -PE = sends ICMP packet only to get responses back -sn = ping scan no ports Scanme.nmap.org = target We are going to copy the IP addresses of the virt...