top of page
LATEST ARTICLES
Search
ayeshazamankhan
Apr 3, 20202 min read
How 6 IT Visionaries Lead Security Transformation
NETWORKING & SECURITYÂ /Â April 30, 2019Â /Â Blakely Thomas-Aguilar CIOs everywhere say IT security is a top 2019 priority. This focus on...
6 views0 comments
ayeshazamankhan
Apr 3, 20201 min read
What is National Cyber Security Awareness Month?
With an increasing number of children now surfing the Web, there’s never been a better time to educate your kids about the ins and outs...
12 views0 comments
ayeshazamankhan
Apr 3, 202033 min read
A Complete Machine Learning Project Walk-Through in Python
By Dylan Iqbal A Complete Machine Learning Project Walk-Through in Python (Part One): Putting the machine learning pieces together...
24 views0 comments
ayeshazamankhan
Apr 3, 20203 min read
Why Data Science And Data Analytics Skill You Really Need?
WHO IS DATA SCIENTIST AND DATA ANALYST?
14 views0 comments
ayeshazamankhan
Apr 3, 20208 min read
Machine learning algorithms explained
Machine learning uses algorithms to turn a data set into a predictive model. Which algorithm works best depends on the problem.
2 views0 comments
ayeshazamankhan
Apr 3, 20203 min read
Good cyber hygiene
Have you heard of something called cyber hygiene? Surely brushing teeth and taking showers isn’t something we traditionally associate...
0 views0 comments
ayeshazamankhan
Apr 3, 20204 min read
How can we protect ourselves from cyber attacks?
La Trobe University After 2017’s Wannacry attack, it’s not surprising that cybersecurity has become the growth industry of the decade,...
2 views0 comments
ayeshazamankhan
Apr 3, 20204 min read
Principles of Social Engineering – CompTIA Security+ SY0-501 – 1.2
Professor Messor | October 30,2017 Someone who’s well-versed in social engineering can easily talk their way into your network. In this...
4 views0 comments
bottom of page