Skip to content

Birhane Fitwi

Cybersecurity

  • Home
  • About me
    • Resume
    • Academic Transcript
    • Certifications
  • Technical Courses
    • Cryptography
      • CRYPTOCURRENCY, CRYPTOGRAPHY AND BLOCK- CHAIN
      • CRYPTOGRAPHIC AND OTHER MECHANISMS THAT PREVENTS DATA TEMPERING.
    • Cybersecurity Fundamentals
      • Autonomous Vehicles and Hackings
      • Types of Cookies and How It Actually Works:
      • CYBER ATTACK vs CYBER EXPLOITATION
      • PROTECT, DEFEND, DETER &ATTACK
      • FIXES & MITIGATION OF COMMON ATTACKS.
      • CYBER_KILL CHAIN:
      • CYBER WAR AND OTHER WARFARES
      • CYBER OPERATION _RANSOM ATTACK _UK’S RETAIL MARKET
      • PEGASUS SYPWARE
      • #651 (no title)
      • CORRECT RESPONSE TO POP-UPS
      • WHICH THREE OF THE NICE- FRAMEWORK IS APPEALING TO ME.
    • Cyber Prog & Networking -CYSE 250
      • Internet of Things: Cybersecurity and Networking
      • DESIGNING THE NETWORK TOPOLOGY OF HARRISON AND ASSOCIATES
      • CORRECT RESPONSE TO POP-UPS
      • FEW NOTES AND PRACTICES _CYSE_250
  • Non-Technical Courses
    • CYSE-250- cyber War
      • CHINA, RUSSIA DIFFRENCE ON HACKING STRATEGY
      •  Russian Sponsored Cyber Threat 
      • CYBER WAR AND OTHER WARFARES
    • CYSE 200T Cybersecurity-tech and society
      • Three ways computers have made the world safer and less safe.
      • Three ways computers have made the world safer and less safe.
      • Three ways computers have made the world safer and less safe.
      •       Costs and Benefits of Developing Cybersecurity Programs in Business
      •     How has cyber technology created opportunities for workplace deviance?
      • CYBER POLICY AND INFRASTRUCTURE GIVEN THE “SHORT ARM” OF PREDICTIVE KNWOLEDGE
      •  MALICIOS CODE and DENIAL of SERVICE ATTACK
      • VICTIM PRECIPITATION
      • CYSE200T COURSE NOTES
    • CYSE-201S Cybersecurity and Social science
      • VICTIM PRECIPITATION
      • Cybersecurity Career: Cybercrime Researcher and Cybersecurity Analysts
      • WHICH THREE OF THE NICE- FRAMEWORK IS APPEALING TO ME.
      • Four Majors Related to Cybersecurity
      • Reason For Interest In Cybersecurity
      • How does cyber technology impact interactions between offenders and victims?
      • FOUR ETHICAL ISSUES ARISING FROM STORING ELECTRONIC DATA
    • CYSE 406 Cyber-Law
      • Summary of Gained Insights on Cyber-Law course!
      • Cybersecurity Policy Proposal for an Ideal US Representative
      • DATA PROTECTION AND PRIVACY ISSUES
    • PHIL 355E- Cyber ethics
      • Case Analysis on Users Data
      • Case Analysis on Professional Ethics
    • Literature 112L
  • E-PORTFOLIO
    • Job-Ad Analysis Essay
    • Reflective Essay
    • Forensic_Lab_Midterm
    • Skills and Artifacts
      • RESEARCH
        • DATA PROTECTION AND PRIVACY ISSUES
        • Case Analysis on Users Data
        • CS-120 -Research Skills on Sleep Deprivation
      • TECHNICAL
        • CRYPTOCURRENCY, CRYPTOGRAPHY AND BLOCK- CHAIN
        • Internet of Things: Cybersecurity and Networking
        • Python_Prog
      • PROBLEM SOLVING
        • FIXES & MITIGATION OF COMMON ATTACKS.
        • CYBER_KILL CHAIN:
        • CYBER OPERATION _RANSOM ATTACK _UK’S RETAIL MARKET
  • Contact
    • bfitw001@odu.edu

THINK SECURITY!

Proudly ODU Student!

Proudly powered by WordPress | Theme: Dyad by WordPress.com.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept