:/JennFrom Chaos to Calm: Applying Attention Restoration Theory to Your Digital WorkspaceIt’s no secret that working remotely can sometimes feel like trying to be productive in the midst of a bustling coffee shop, where every…·3 min read·Apr 16, 2024----
:/JennAuthentication and Authorization: Where Does SSO Fit In?Secure environments follow a set of steps to separate the users who have access to network resources from those who do not. Identification…·2 min read·Oct 17, 2022----
:/JennThreat Modeling — The Short VersionThreat Modeling is the structured practice of identifying and prioritizing potential threats and vulnerabilities, and the prioritization…·4 min read·Jan 28, 2022--5--5
:/JenninDark Roast SecurityContinue to Capture…The Skills?Capture the flag with TryHackMe and HackTheBox·7 min read·Feb 28, 2021--1--1
:/JenninDark Roast SecurityPreparing for a TraceLabs OSINT CTFAre you a first time contestant?·4 min read·Feb 25, 2021----
:/JenninDark Roast SecurityPowerful, Flexible, Easy, Free: NmapPort scanning, ping sweeps, OS detection, version detection…·3 min read·Feb 17, 2021----
:/JennTryHackMe: ICE Walk-throughExploiting Windows and Privilege Escalation·5 min read·Nov 25, 2020----
:/JenninDark Roast SecurityPreparing for CompTIA Security+ Certification ExamIt worked for me, it might work for you too.·5 min read·Aug 4, 2020----
:/JenninDark Roast SecurityOSINT for Good: Trace Labs Missing Person CTFAn Experience worth repeating!·3 min read·Apr 16, 2020----