You have completed your A/L exams and are interested in pursuing an IT or Computer Science degree. However, since you were not selected for a Sri Lankan state university, or
Subaharan
An IT professional who has primarily worked with and has Expertise in planning, designing implementing, and supporting cyber security solutions such as IAM, PAM, SIEM, SOAR, SAST, DAST and Azure DevOps with product customization and development which includes PowerShell, Python, SQL, KQL, Bash, JSON, YAML, Regex, XML.
Having an in-depth understanding and hands-on experience in IP-based networking devices, operating systems, databases
A self-signed certificate is a certificate that is signed by the same entity that created it, using its private key, without the involvement of a trusted certificate authority. This guide
Privileged Access Management (PAM) is a crucial aspect of cybersecurity that focuses on safeguarding and controlling access to an organization's most sensitive information and resources. At its core, PAM is
HTTP is an application layer protocol used to access web content from and push web content to a web server which is stateless in nature. HTTP flood attack is a
Everything in the world has advantages and disadvantages. It is not an exception for email usage in the workplace because it could help and encourage employees to abusive things. Thus,
Hackers are fast, 'invisible’ and the damage that they cause cannot be undone. They can search your website within no time and get crucial information that may even compromise your
Load More