top of page


Notes: Linux Fundamentals Part 3 | THM
Handle files with text editors like Nano and Vim, download with the wget command securly transfer file between two machines using SSH and SC
31 dec. 20244 min läsning


Notes: Linux Fundamentals Part 2 | THM
Remotely execute commands by using the Secure Shell protocol to connect to the remote Linux machine. The SSH syntax require the IP address,
26 dec. 20242 min läsning


Notes: Linux Fundamentals Part 1 | THM
Linux is an open-source operating system based on UNIX. Interact with the system without a Graphical User Interface (GUI) using the text-bas
25 dec. 20242 min läsning


Notes: Putting it all together | THM
Other components who makes the web run efficiently and secure are load balancers, CDN, databases, WAF, virtual hosts, scripting and backend
25 dec. 20242 min läsning


Notes: How Websites Work | THM
A website is made up of a front end with the browser rendering the website and back end where the server process the request and return a re
25 dec. 20243 min läsning


Notes: HTTP in detail | THM
Protocols used to view websites are HyperText Transfer Protocol (HTTP) and HyperText Transfer Protocol Secure (HTTPS)
25 dec. 20244 min läsning


Notes: DNS in detail | THM
Domain Name System (DNS) makes it easier to communicate with devices online. There is a domain hierarchy which consists of Top-Level Domain
25 dec. 20243 min läsning


Notes: Extending Your Network | Pre Security | THM
Some technologies used to extend networks are port forwarding with firewalls accepting or denying traffic through the ports
24 dec. 20243 min läsning


Notes: Packets & Frames | Pre Security | THM
In networking data is divided into smaller pieces when transmitted to another device on the network
23 dec. 20244 min läsning


Notes: OSI Model | Pre Security | THM
The OSI Model (Open Systems Interconnection Model) is a framework for all networked devices and how they will send, receive and interpret da
22 dec. 20243 min läsning


Notes: Intro to LAN | Pre Security | THM
About LAN topologies like star, bus and ring topology, and their benefits and disadvantages. Switch, router, subnetting, ARP and DHCP
13 dec. 20243 min läsning


Notes: What is Networking | Pre Security | THM
Devices connected in a network, where the Internet is one big network made up of many small networks joined together. Small private networks
13 dec. 20242 min läsning


Notes: Careers in Cyber | Try Hack Me
There are many different jobs within the security industry, and cyber security careers are becoming more in demand
10 dec. 20242 min läsning


Notes: Defensive Security Intro | Try Hack Me
Defensive Security: preventing intrusions, detecting intrustions and responding accordingly, blue teamers
10 dec. 20243 min läsning


Notes: Offensive Security Intro | Try Hack Me
Offensive security: think like a hacker, be ahead. Break into systems, exploit bugs, find vulnerabilities and gain unauthorized access. Unde
10 dec. 20241 min läsning


Notes: Linux Shells | Cyber Security 101 | THM
When interacting with a shell, you must be in the directory where you want to perform operations.
10 dec. 20244 min läsning


Notes: Windows PowerShell | Cyber Security 101 | THM
PowerShell is a cross-platform task automation with command-line shell, scripting language and a configuration management framework
9 dec. 20245 min läsning


Notes: Windows Command Line | Cyber Security 101 | THM
Advantages of Command-Line Interface (CLI): speed, efficiency, lower resource usage, automation (batch file or script), remote management (S
29 nov. 20242 min läsning


Notes: Search Skills | Cyber Security 101 | THM
Make sure information is unbiased and comes from a reputable and authoritative source with claims made on solid evidence and logical reasoni
29 nov. 20242 min läsning
bottom of page


