abrenordonezresume.azurewebsites.net
Open in
urlscan Pro
20.119.16.12
Public Scan
Submitted URL: http://abrenordonezresume.azurewebsites.net/
Effective URL: https://abrenordonezresume.azurewebsites.net/
Submission: On January 17 via api from US — Scanned from DE
Effective URL: https://abrenordonezresume.azurewebsites.net/
Submission: On January 17 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
ABREN ORDONEZ'S CYBER BLOG Send Email HELLO, I'M ABREN! I'm a 20 year old student attending the University of Toronto cybersecurity bootcamp to obtain my security+. I'd say problem solving is one of my best qualities and Linux is my favourite coding language. BLOG POSTS FIREWALLS FIREWALL-CMD Firewalls are one of the most important tools to the cybersecurity world.It helps protect valuable information and filters the network traffic to ensure safety.More specifically, Firewall-cmd is a great tool that you can use to help install firewalls into your network architecture.Firewall-cmd can help manage firewall rules and can add or remove interfaces from specific zones. It also can black specific services such as HTTP and ports. With more complex configuration you can even block traffic coming from specific ip adresses.If you are looking towards upgrading your tools of arsenal this would be a great utensil to add if you would like to venture out into the cybersecurity world. NETWORK FUNDAMENTALS WIRESHARK AND HTTP REQUESTS HTTP request are very important signals you should consider understanding.HTTP reqeuests are what helps us understand what is being sent through the network and specifically what request is being demanded. However, hackers also can be seen using HTTP request like any other users. Wireshark is an amazing tool in the cybersecurity world that can help differentiate HTTP requests from actual users versus threats. Learning how to use wireshark is a very useful tool to see the trrafic going through your network even if you are not a cybersecurity analyst. Having a better understanding of what kind of information is being passed through your network can help relieve some tension on whether or not you are being infiltrated.