- π₯ Looking for Entry-level roles in Cybersecurity or IT
- βοΈ I hold the PJPT and ISC2 CC certification
- π― Iβm looking to collaborate on open-source projects
- β‘ Fun fact: I'm an avid FiFa & Call of Duty gamer π€£
- Unmasking Cyber Threats An Offensive Security Approach for Nigerian Businesses: Demonstrated and explained how limit overrun race condition can be exploited in web applications in the fintech space in Nigeria.
- Active Directory Explained: Part 3 β Kerberos Authentication Protocol
- Steganography: Hiding Messages in Plain Sight
- Social Engineering #2: Recognizing and Defending against common Phishing attacks
- Social Engineering #1: The Sneaky Tactics Targeting Everyday People
- OSI Model
- Hack Your Way into Cybersecurity
- Mastering Active Directory Part 2
- Mastering Active Directory Part 1
β‘οΈ more blog posts...