Rachel Jasurda

Demystifying the Complex

Providing IT and Cybersecurity Services. Mentorship and Help to Make Learning IT and Cybersecurity Easy.

Simplifying the Complex.

Endpoint Security and Incident Response

Vulnerability and Risk Management

Gap Analysis and Regulatory Compliance

Technology Optimization

IT and Cybersecurity Mentorship.

Home Lab Setup

References and Documentations

Mentorship and Support When You Need It

Step-by-Step Guide to Help You

Some of the Technology, Tools, and Frameworks Taught.

Topics I Discuss

01.

Vulnerability Management

The process of identifying, evaluating, prioritizing, and mitigating security vulnerabilities within an organization’s IT infrastructure.

02.

Secure Network Design

The process of designing and implementing a network infrastructure to ensure confidentiality, integrity, and availability of data and resources within the network.

03.

Web application security

The practice of securing and protecting web applications from potential threats and vulnerabilities. Also referred to as Web AppSec.

04.

Cryptographic Algorithm

Set of rules used to encrypt and decrypt data in order to secure its transmission or storage.

05.

Information Security

The practice of protecting sensitive information from disclosure, unauthorized access, alteration, or destruction.

06.

Network Security

The practice of implementing measures, policies, and technologies to protect computer networks from unauthorized access, misuse, modification, or denial of service.

07.

Data Management

Data management refers to the process of acquiring, storing, organizing, accessing, and maintaining data in a structured and efficient manner throughout its lifecycle.

08.

User Management in cybersecurity

The process of controlling and managing user access to computer systems, networks, applications, and data in order to protect against unauthorized access, misuse, and security breaches.

09.

Patch Management

The process of ensuring that systems and software are up-to-date with the latest security fixes and updates to protect against known vulnerabilities and minimize the risk of security breaches or exploitation by attackers.
.

10.

Cloud Security

As organizations increasingly adopt cloud computing services for storing, processing, and accessing data and applications, ensuring the security of cloud environments becomes paramount to safeguarding sensitive information and maintaining regulatory compliance.

11.

Mobile Security

With the widespread use of smartphones, tablets, and other mobile devices for personal and business purposes, mobile security has become increasingly important to safeguard sensitive information and ensure the privacy and integrity of mobile communications and transactions.

12.

Incident Response Plan in Cybersecurity

A structured set of procedures and processes designed to guide an organization’s response to security incidents effectively and efficiently.

About Me

I’m Rachel Jasurda. I Provide IT and Cybersecurity Services. Mentorship and Help to Make Learning IT and Cybersecurity Easy.

Let the Learning Begin!

Open To Work

Looking to hire a Cyber Security Professional? Connect with me.

CHAT