Adio UsmanHands-on Practical on Forensic Tool Kit AnalysisThis practical was an assessment of the CYB 105 Week 2 class on digital forensics by Dr. Nasir B. A. via the IDEAS program through Baze…Jul 31Jul 31
Adio UsmanMilestones in the Historical Development of Enterprise Network Security — Network Perimeter…1969 — Dr. Howard Frank designs the ARPAnet and some of the first network topologiesJan 18Jan 18
Adio UsmanJOURNALISM IN A RAPIDLY — CHANGING WORLDJournalism is as old as the earth itself as ancient scribes often write things in tablets for record and reference purpose.Jan 15Jan 15
Adio UsmanWeb and Email SecurityWeb browsing and email are the top ways computers can get infected with malware, information is stolen and data gets breached. In this…Jan 9Jan 9
Adio UsmanJill & Roy’s Accounting — Case Study: Applying CIS Benchmark for Maximum SecurityYou should be familiar with this case study from an earlier lesson. We’ll be reusing it throughout this one. Jill and Roy provide…Jan 6Jan 6
Adio UsmanProject- Using CIS Controls for the Security of Jill & Roy’s AccountingJill & Roy’s Accounting — Case StudyDec 31, 2023Dec 31, 2023
Adio UsmanISO 22301: 2019-Business Continuity Management System (BCMS) FoundationWhat is BCMS?Nov 25, 2023Nov 25, 2023
Adio UsmanSAMPLE PRIVACY POLICY TEMPLATE FROM NITDA FOR PUBLIC INSTITUTIONS IN NIGERIANITDA Privacy PolicyOct 1, 2023Oct 1, 2023
Adio UsmanCOVID-19: 5G NETWORK — CORONAVIRUS CONSPIRACY THEORY: TRUE OR FALSE? — AFROTUNITYThe momentum coronavirus (COVID-19) has created in every part of the work can not be overemphasized. While some faction in the world…Apr 9, 2020Apr 9, 2020
Adio UsmanHOW I STARTED GOKADA IN NIGERIA — FAHIM TELLS HIS STORY TO ENTREPRENEURS WITH BURNING BUSINESS…Your business idea is just the starting point.Apr 7, 2020Apr 7, 2020