Celestin NtemngwaWhy is it crucial to protect AWS EC2 Metadata Endpoint?One powerful feature of AWS is that EC2 can interact with other services, such as DynamoDB, S3, etc., depending on the use case. EC2 server…May 26, 2023May 26, 2023
Celestin NtemngwaHow an Extended Detection and Response (XDR) WorksIt’s a busy shopping day, and your critical system, such as the billing system, is down. Everything you’ve worked for is going up in smoke…Dec 28, 2022Dec 28, 2022
Celestin NtemngwaInstructional Design in the Metaverse: Using the ADDIE Model to Create Engaging Learning…Designing a learning experience in the metaverse does not mean abandoning traditional instructional design principles but embracing them…Dec 24, 2022Dec 24, 2022
Celestin NtemngwaUnleashing the Full Potential of the Metaverse: How Virtual Reality is Revolutionizing Learning…Welcome to the wild and wonderful metaverse world — the virtual realm that has captivated science fiction fans and tech geeks for decades.Dec 24, 2022Dec 24, 2022
Celestin NtemngwaIT Security Audit Series: How to perform Infrastructure Security Audit: Guiding QuestionsIn this post, I briefly explain how USGEBS audits infrastructure security. The USGEBS team usually works with an organization’s information…Sep 29, 2022Sep 29, 2022
Celestin NtemngwaHow to build an ISO 27001-Compliant Cybersecurity ProgramIntroductionJul 10, 20221Jul 10, 20221
Celestin NtemngwaWireless Hacking with WifiPhisherSuppose you need to get a Wi-Fi password but don’t have the time to crack it if you need to clone a wireless access point and trick users…Oct 29, 2021Oct 29, 2021
Celestin NtemngwaHow to Assess and Audit DevOps Security to Improve Business ValueHow to Assess and Audit DevOps Security to Improve Business ValueAug 24, 2021Aug 24, 2021
Celestin NtemngwaSupervised Machine Learning with Python Scikit Learn(sklearn) in Four Lines of CodeMachine Learning(ML) consists of developing a mathematical model from an experimental dataset. Three techniques are used to create a model…Jun 19, 2021Jun 19, 2021