You have completed your A/L exams and are interested in pursuing an IT or Computer Science degree. However, since you were not selected for a Sri Lankan state university, or
Subaharan
An IT professional who has primarily worked with and has Expertise in planning, designing implementing, and supporting cyber security solutions such as IAM, PAM, SIEM, SOAR, SAST, DAST and Azure DevOps with product customization and development which includes PowerShell, Python, SQL, KQL, Bash, JSON, YAML, Regex, XML.
Having an in-depth understanding and hands-on experience in IP-based networking devices, operating systems, databases
A self-signed certificate is a certificate that is signed by the same entity that created it, using its private key, without the involvement of a trusted certificate authority. This guide
let's dive into how you can check if port 8211 on your computer or a remote server is open. This is an essential task for troubleshooting network issues or verifying
Privileged Access Management (PAM) is a crucial aspect of cybersecurity that focuses on safeguarding and controlling access to an organization's most sensitive information and resources. At its core, PAM is
Are you looking for best for the Best Smartwatches under $200. you have reached the correct place. These smartwatches are picked based on experience and are unbiased. 1. Amazfit GTR
HTTP is an application layer protocol used to access web content from and push web content to a web server which is stateless in nature. HTTP flood attack is a
Load More