Learning Portal @T9

  • Cryptography:  Key Exchange

    Key exchange is a fundamental concept in cryptography that allows two parties to securely exchange keys over an insecure communication channel. These keys are…


  • Cryptography: Public Key Infrastructure

    Public Key Infrastructure (PKI) is a framework used to secure communications and manage digital certificates in a network. It involves the use of both…


  • Cryptography: Obfuscation

    Obfuscation is a technique used in cryptography and software security to hide the true purpose or meaning of code, making it harder for attackers…


  • Diamond Model

    The Diamond Model is a popular framework used in cybersecurity to analyze and understand adversary behavior during cyberattacks. Developed by the Mitre Corporation, it…


  • Cryptography: Private Key Infrastructure

    Private Key Infrastructure (PKI) is a crucial system that underpins the security of digital communication. It relies on public key cryptography, where pairs of…


  • Cryptography: Hashing

    Hashing is a fundamental concept in cryptography that plays a critical role in securing data, ensuring integrity, and supporting various cryptographic protocols. A hash…


  • SOAR

    Security Orchestration, Automation, and Response (SOAR) is a critical aspect of modern cybersecurity. It refers to the combination of tools, technologies, and processes used…


  • SIEM

    Security Information and Event Management (SIEM) is a critical technology used by organizations to manage and analyze security data in real-time. SIEM platforms combine…


  • Kill Chain Framework

    The Kill Chain Framework is a widely used concept in cybersecurity that helps organizations understand the different stages of a cyberattack, allowing them to…


  • ATT&CK Framework

    The ATT&CK Framework (Adversarial Tactics, Techniques, and Common Knowledge) is a globally recognized knowledge base designed by MITRE to help organizations understand, detect, and…


  • Cyber Attacks: Dumpster Diving

    Dumpster Diving, a low-tech yet effective cyberattack method, involves retrieving sensitive information discarded carelessly in trash bins or dumpsters. Attackers exploit improperly disposed of…


  • Cyber Attacks : Zero Days

    A Zero-Day Attack is one of the most sophisticated and dangerous forms of cyber exploitation. It occurs when hackers exploit a previously unknown vulnerability…


  • Cyber Attack : Brute Force

    A brute force attack is a trial-and-error method used by cybercriminals to crack passwords, encryption keys, or login credentials. This attack relies on the…


  • Cyber Attack : CFRS

    Cross-Site Request Forgery (CSRF) is a cyberattack that exploits the trust a web application has in a user’s browser. Also known as a “one-click…


  • Cyber attacks : Buffer Overflow

    Buffer overflow is one of the most infamous and longstanding vulnerabilities in computer security. It occurs when a program writes more data to a…


  • Cyber Attacks: DNS poisoning

    DNS (Domain Name System) poisoning, also known as DNS spoofing, is a type of cyberattack that compromises the DNS resolution process, redirecting users to…


  • Cyber Attacks : Whaling

    Whaling is a highly targeted phishing attack that focuses on high-ranking executives, such as CEOs, CFOs, or other influential individuals within an organization. Unlike…


  • Cyber Attack : Tailgating

    Tailgating, also known as “piggybacking,” is a physical security breach where an unauthorized individual gains access to restricted areas by following an authorized person.…


  • Cyber security Attacks : Phising

    Phishing is a deceptive cyberattack in which attackers impersonate legitimate entities to steal sensitive data, such as usernames, passwords, credit card details, or other…


  • Cyber security Attacks: DDOS

    A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by…


  • Big Thetha

    Big Θ (Theta) notation is a mathematical concept used to describe the tight bound of an algorithm’s performance. Unlike Big O, which focuses on…