Open in app

Sign In

Write

Sign In

Celestin Ntemngwa
Celestin Ntemngwa

19 Followers

Home

About

May 26

Why is it crucial to protect AWS EC2 Metadata Endpoint?

One powerful feature of AWS is that EC2 can interact with other services, such as DynamoDB, S3, etc., depending on the use case. EC2 server uses a token service to send authentication tokens to a service. That service, in turn, grants EC2 access. …

AWS

2 min read

Why is it crucial to protect AWS EC2 Metadata Endpoint?
Why is it crucial to protect AWS EC2 Metadata Endpoint?
AWS

2 min read


Dec 28, 2022

How an Extended Detection and Response (XDR) Works

It’s a busy shopping day, and your critical system, such as the billing system, is down. Everything you’ve worked for is going up in smoke because the business has shut down due to an attack. This is happening when you least can afford it. You’ve been hacked. That’s a simple…

Cybersecurity

5 min read

How an Extended Detection and Response (XDR) Works
How an Extended Detection and Response (XDR) Works
Cybersecurity

5 min read


Dec 24, 2022

Instructional Design in the Metaverse: Using the ADDIE Model to Create Engaging Learning Experiences

Designing a learning experience in the metaverse does not mean abandoning traditional instructional design principles but embracing them (Morrison, Ross, & Kemp, 2014). One model that can be particularly useful in this context is ADDIE (Analysis, Design, Development, Implementation, and Evaluation) (Clark & Mayer, 2011). …

Metaverse

3 min read

Instructional Design in the Metaverse: Using the ADDIE Model to Create Engaging Learning…
Instructional Design in the Metaverse: Using the ADDIE Model to Create Engaging Learning…
Metaverse

3 min read


Dec 24, 2022

Unleashing the Full Potential of the Metaverse: How Virtual Reality is Revolutionizing Learning and Development

Welcome to the wild and wonderful metaverse world — the virtual realm that has captivated science fiction fans and tech geeks for decades. For those who may be new to the concept, the metaverse is a computer-generated three-dimensional world where users can create and interact with each other using digital…

Metaverse

3 min read

Unleashing the Full Potential of the Metaverse: How Virtual Reality is Revolutionizing Learning…
Unleashing the Full Potential of the Metaverse: How Virtual Reality is Revolutionizing Learning…
Metaverse

3 min read


Sep 29, 2022

IT Security Audit Series: How to perform Infrastructure Security Audit: Guiding Questions

In this post, I briefly explain how USGEBS audits infrastructure security. The USGEBS team usually works with an organization’s information technology personnel, including management. The USGEBS begins by explaining why and how they will audit infrastructure security. They also allow the organization to ask questions. …

3 min read

IT Security Audit Series: How to perform Infrastructure Security Audit: Guiding Questions
IT Security Audit Series: How to perform Infrastructure Security Audit: Guiding Questions

3 min read


Jul 10, 2022

How to build an ISO 27001-Compliant Cybersecurity Program

Introduction ISO 27001 is a standard on how to manage an information security program. It’s divided into two main parts, clauses 4 through 10, which describe the foundational requirements of the standard, and Annex A, which is called reference control objectives and controls. The term clauses are sections of the…

Cybersecurity

12 min read

How to build an ISO 27001-Compliant Cybersecurity Program
How to build an ISO 27001-Compliant Cybersecurity Program
Cybersecurity

12 min read


Oct 29, 2021

Wireless Hacking with WifiPhisher

Suppose you need to get a Wi-Fi password but don’t have the time to crack it if you need to clone a wireless access point and trick users into connecting to your rogue network. …

Hacking

6 min read

Wireless Hacking with WifiPhisher
Wireless Hacking with WifiPhisher
Hacking

6 min read


Aug 24, 2021

How to Assess and Audit DevOps Security to Improve Business Value

How to Assess and Audit DevOps Security to Improve Business Value The ISACA guidelines for auditing DevOps recognize the potential business value of DevOps, but they stress that there are assurance, governance, and security factors to consider. “ This guidance outlines these considerations: the risks associated with DevOps (in both…

DevOps

20 min read

How to Assess and Audit DevOps Security to Improve Business Value
How to Assess and Audit DevOps Security to Improve Business Value
DevOps

20 min read


Aug 24, 2021

The Business Value of DevOps

The Business Value of DevOps As the Agile Manifesto states, “We are uncovering better ways of developing software by doing it and helping others do it.” By using DevOps practices, you can measure the impact on business performance. …

6 min read

The Business Value of DevOps
The Business Value of DevOps

6 min read


Jun 19, 2021

Supervised Machine Learning with Python Scikit Learn(sklearn) in Four Lines of Code

Supervised Machine Learning with Python Scikit Learn(sklearn) in Four Lines of Code Machine Learning(ML) consists of developing a mathematical model from an experimental dataset. Three techniques are used to create a model: supervised learning, unsupervised learning, and reinforcement learning. This article focuses on supervised learning, which is the most common…

Machine Learning

5 min read

Supervised Machine Learning with Python Scikit Learn(sklearn) in Four Lines of Code
Supervised Machine Learning with Python Scikit Learn(sklearn) in Four Lines of Code
Machine Learning

5 min read

Celestin Ntemngwa

Celestin Ntemngwa

19 Followers
Following
  • Santiago Valdarrama

    Santiago Valdarrama

  • World Economic Forum

    World Economic Forum

  • Tenable

    Tenable

  • freeCodeCamp

    freeCodeCamp

  • Google Cloud

    Google Cloud

See all (10)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams