Information Security

Defensive Programming with Python

By Noah Caldwell / February 4, 2023 / 0 Comments

A high-level overview of defensive programming with python.

Read More

What is the TCP/IP Model?

By Noah Caldwell / February 4, 2023 / 0 Comments

This is a high level overview of the TCP/IP model.

Read More

Cloud Security: An Overview

By Noah Caldwell / January 9, 2023 / 0 Comments

As a cybersecurity student, I’ve seen firsthand the many benefits that cloud computing can offer. From cost savings to scalability to flexibility, the cloud has revolutionized the way that businesses operate. And while it’s true that there are security concerns to be aware of, with the right precautions in place, you can enjoy all the […]

Read More

Threats to the Security of the Cloud

By ncaldwell / August 7, 2022 / 0 Comments

You may hear the term “cloud security” frequently, but what does “cloud security” mean? In this post I will discuss the security challenges facing the cloud.

Read More

Ethical Hacking, What’s the Deal?

By ncaldwell / June 13, 2022 / 0 Comments

Ethical hacking is the process of breaking into networks to test their security. Ethical hackers (a.k.a. white-hat hackers or penetration testers) are hired by a companies to try to break into their network.

Read More

What was Y2K and why was it significant?

By ncaldwell / April 18, 2022 / 0 Comments

What was Y2K and why was it significant?

Read More

What in the world is authenticated encryption?

By ncaldwell / March 5, 2022 / 0 Comments

Okay. authenticated encryption, what is it? Well, first you need to understand a little something in Information Security known as the CIA triad.

Read More

What Is a Computer Network?

By ncaldwell / November 12, 2021 / 1 Comment

This is a high level over view of what a computer network is.

Read More

How to install Kali Linux

By ncaldwell / September 26, 2021 / 0 Comments

Ever been curious about how to install Kali Linux? Well then this post is for you!

Read More