In our journey to be security practitioners, we must understand basic network-based techniques from both attackers and defender perspectives. Continuing on that track, let’s talk more about network scanning and its tools and techniques today.
Srot Sinha

Recent Posts
How to Preform Network Scanning and Forensics with Nmap
As a cybersecurity professional, knowledge of network and security tools is critically important. To help jumpstart this knowledge, we will focus on Nmap and introduce you to beginner's content.
Nmap has always been the security engineer's tool of choice for a wide variety of tasks. You can use it to see which machines are up, if a machine has blocked pings, or if the firewall blocks ICMP packets. It also helps determine if a machine is switched on and connected to the network through performance scans. In the previous article: How to Use Netcat for Cybersecurity, we had covered netcat, also used for connectivity testing.
Topics: Nmap, Network Scanning
What is Natural Language Processing? A Beginners Guide
In this blog we will answer the most common questions asked by beginners in NLP.
Question: What is Natural Language Processing?
Answer: Natural Language Processing (NLP) is a programming technique by which computers can understand the language spoken or transcribed, based on the intent. It sounds very trivial, but it is not! Understanding a language is very difficult, as people can have conversations in many different ways, and based on tone and connotation, can change the meaning of the conversation.
Topics: Artificial Intelligence, Natural Language Processing, NLP