Skip to main content
James Mwangi K

James Mwangi K

✦✦♔❀════════════════════════❀♔✦✦

           Someone who
           works hard ... 
           Can never beat
           someone who 
           enjoys himself."                       
             – Keisuke Itagaki

✦✦♔❀════════════════════════❀♔✦✦

Recent

Visualizing TCP/IP and OSI Models In Action
2457 words·12 mins· loading · loading
Networking Fundamentals Cisco Labs Network Communication Tcp-Ip Osi-Model Network-Simulation Protocol-Analysis
Step-by-step analysis of OSI model and TCP- IP model using Cisco Packet Tracer. Gain practical knowledge of networking fundamentals while visualizing real-world communication processes.
Use Wireshark to View Network Traffic
1442 words·7 mins· loading · loading
Network Troubleshooting Cybersecurity Labs Wireshark Network-Analysis ICMP Packet-Sniffing MAC-Address ARP
Step-by-step tutorial on using Wireshark for network analysis. Capture ICMP packets, compare local and remote traffic behavior, and explore Layer 2/Layer 3 addressing in practical scenarios.
Navigating Global Data Protection Compliance: Frameworks, Regulations, and Implementation Strategies
2865 words·14 mins· loading · loading
Cybersecurity & Compliance Data Privacy Laws Professional Certification Data-Protection Compliance GDPR HIPAA PCI-DSS Kenya-DPA Cybersecurity Financial-Regulations Healthcare-Compliance Legal-Frameworks
Explore essential data protection regulations including GDPR, HIPAA, PCI DSS, and Kenya’s Data Protection Act. Learn compliance strategies, sector-specific requirements, and legal considerations for penetration testing and audits.