API Security

The OWASP API Security Top 10

API security Refers to the measures and practices employed to protect APIs (Application Programming Interfaces) from security threats and vulnerabilities. APIs act as a bridge between different software systems, allowing them to communicate and share data. However, they can also become targets for attackers seeking to exploit vulnerabilities and gain unauthorized access to sensitive information …

The OWASP API Security Top 10 Read More »

What is Phishing? – How to Protect Yourself

Phishing: What It Is and How to Protect Yourself In today’s digital age, we rely heavily on the internet and technology to go about our daily lives. We use email to communicate with friends and colleagues, shop online for products and services, and conduct banking transactions from the comfort of our own homes. While these …

What is Phishing? – How to Protect Yourself Read More »

confidentiality, integrity and availability

What is Confidentiality, Integrity and Availability – CIA Triad

Confidentiality, Integrity and Availability – What is it? You may have heard information security specialists referring to the “CIA” — but they’re usually not talking about the Central Intelligence Agency. CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information. Data confidentiality …

What is Confidentiality, Integrity and Availability – CIA Triad Read More »

What is Cross-Site Scripting (XSS)?

What is Cross-Site Scripting (XSS)?

What is Cross-Site Scripting (XSS)? Cross-site scripting (XSS) is a vulnerability in web applications that allows a third party to execute scripts in a user’s browser on behalf of the web application. Cross-site scripting is one of the most prevalent vulnerabilities on the web today. Exploiting XSS against users can lead to various consequences, such as account …

What is Cross-Site Scripting (XSS)? Read More »

Cloud Security Compliance

Six Steps to Automate Cloud Security Compliance

Cloud security compliance Once a company is in the cloud, it should be concerned with how the cloud provider will help the company remain in compliance with the laws, such as Europe’s General Data Protection Regulation (GDPR) or HIPAA in the U.S. This discussion should start from the very beginning rather than after the cloud …

Six Steps to Automate Cloud Security Compliance Read More »

Nmap Cheat Sheet

Nmap Cheat Sheet

  Here are simple nmap commands that will make your penetration testing easier. Nmap is a free and open-source network scanner. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing Computer Networks, including Host Discovery and Services …

Nmap Cheat Sheet Read More »


What Is Vulnerability Responsible Disclosure?

  Vulnerability Responsible Disclosure refers to the best practice followed by most security researchers of not disclosing a critical vulnerability in a software product until a vendor patch or fix has been made readily available. The reason that the security analysts and researchers aren’t able to share the information publicly is that hackers and cyber …

What Is Vulnerability Responsible Disclosure? Read More »

what is Sql injection

What is SQL injection?

SQL injection, also known as SQLi, is a common database attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed. This information may include any number of items, including sensitive data, user details or private customer information. SQL (pronounced “ess-que-el”) stands for Structured Query …

What is SQL injection? Read More »

error: Content is protected !!

Our training courses are designed to help businesses develop the workforce with the vital skills any organization requires.

The #1 cyber security and data science training provider in Africa.

Our Courses


Sign up to our newsletter