:/JenninDark Roast SecurityApplying Attention Restoration Theory to Your Digital WorkspaceIt’s no secret that working remotely can sometimes feel like trying to be productive in the midst of a bustling coffee shop, where every…Apr 16Apr 16
:/JenninDark Roast SecurityAuthentication and Authorization: Where Does SSO Fit In?Secure environments follow a set of steps to separate the users who have access to network resources from those who do not. Identification…Oct 17, 2022Oct 17, 2022
:/JenninDark Roast SecurityThreat Modeling — The Short VersionThreat Modeling is the structured practice of identifying and prioritizing potential threats and vulnerabilities, and the prioritization…Jan 28, 20225Jan 28, 20225
:/JenninDark Roast SecurityContinue to Capture…The Skills?Capture the flag with TryHackMe and HackTheBoxFeb 28, 20211Feb 28, 20211
:/JenninDark Roast SecurityPreparing for a TraceLabs OSINT CTFAre you a first time contestant?Feb 25, 2021Feb 25, 2021
:/JenninDark Roast SecurityPowerful, Flexible, Easy, Free: NmapPort scanning, ping sweeps, OS detection, version detection…Feb 17, 2021Feb 17, 2021
:/JenninDark Roast SecurityPreparing for CompTIA Security+ Certification ExamIt worked for me, it might work for you too.Aug 4, 2020Aug 4, 2020
:/JenninDark Roast SecurityOSINT for Good: Trace Labs Missing Person CTFAn Experience worth repeating!Apr 16, 2020Apr 16, 2020