back to top

programming

HAL – Data Recovery Basics

When in a working environment, what's the best way for new employees to learn? By shadowing current employees. You will do even better than just shoulder surf on noted expert, Ali Hadi. You'll get...

UC – Penetration Testing Methodology

A penetration testing methodology can be thought of as a recipe or blueprint, providing the steps required to conduct a penetration test. Methodologies are helpful and, in some cases, required to provide a repeatable...

UC – Vulnerability Management

All Roads Lead to VulnMan! Eric Johnson is passionate about Vulnerability Management and for good reason. VulnMan is the crucial operation within a comprehensive cybersecurity strategy that aims at discovering, evaluating, and eliminating vulnerabilities,...

HAL – M!$#’s geoINT Challenge 1

I'm Mishaal Khan, and I'm excited to bring you geoINT Challenge 1, "Finding a QR code in China". I've been wanting to do this for a very long time. As part of my work...