Posts

Showing posts from May, 2025

Malware Analysis Overview

Image
  🦠 Malware Analysis: Techniques, Tools, and Types In this project, I explore Malware Analysis , a vital skill in cybersecurity that helps identify, study, and mitigate threats posed by malicious software. This guide covers everything from understanding different types of malwares to using various tools for in-depth analysis. A Practical Guide to Malware Analysis Want to learn how to identify and analyze malware effectively? This presentation will guide you through: ✅ What Malware is – The definition, types, and common characteristics of malware ✅ The Malware Analysis Process – Step-by-step analysis methods ✅ Types of Malwares – Viruses, Trojans, Worms, Ransomware, and more ✅ Tools for Malware Analysis – How to use powerful tools like: Virus Total – Scans malware with multiple antivirus engines to detect known threats. PE View – Views the structure and details of Windows executable files. PEiD – Detects packers, cryptos, and compilers protecting the malware. ...

Vulnerability Analysis using NESSUS and OPENVAS

Image
  🔍 Vulnerability Analysis using NESSUS and OPENVAS In this project, I dive into Vulnerability Analysis using two powerful tools: NESSUS and OPENVAS . These tools are widely used in cybersecurity for identifying security flaws in systems and networks. Whether you're new to vulnerability scanning or looking to improve your analysis skills, this guide will walk you through how to use these tools effectively. A Practical Guide from My Cybersecurity Training Want to learn how to perform vulnerability assessments like a pro? Check out my PowerPoint presentation that covers: ✅ What NESSUS & OPENVAS are ✅ How to conduct vulnerability scans ✅ How to analyze the results for potential risks 💡 Whether you're starting out in vulnerability analysis or looking to enhance your skills, this guide is beginner-friendly and hands-on! Click here to view full presentation:  Cybersecurity_Project2.pdf   Helpful Sources: You Tube Channel: GetCyber and Jon Good Sources:  Nes...

Scanning using NMAP and Wireshark Overview

Image
 🔍 Explore Nmap & Wireshark: From Basics to Practical Scanning Techniques I've created a PowerPoint presentation that walks you through the fundamentals of Nmap and Wireshark , two essential tools in cybersecurity. Whether you're just getting started or looking to brush up on your network scanning and packet analysis skills, this guide covers everything from installation to hands-on usage.  A Practical Guide from My Cybersecurity Training at Oeson Want to learn how to scan networks and analyze packets like a pro? Check out my PowerPoint presentation that covers: ✅ What Nmap & Wireshark are ✅ Scanning techniques & packet inspection ✅ Real-world examples 💡 Whether you're starting out in cybersecurity or sharpening your skills, this guide is beginner-friendly and hands-on! Click the link below to view the full presentation Oeson project1.pdf Helpful Source :  You Tube Channel: Plain Text Packets  sources: InterviewBit – Network Security , accessed...