Skip to main content

WELCOME POST


Source: https://static.vecteezy.com/system/resources/previews/000/371/208/original/vector-welcome-hand-drawn-text.jpg

Welcome to my blog! My name is Perfect Bamidele and I am from one of the central parts of Nigeria, Kwara State. In this blog, I will share my insights and discoveries on various computing topics. Let me tell you a bit about myself.


Some of my hobbies are playing football, reading, playing chess and listening to Afrobeat music. I have always been passionate about computing because I enjoy creating things in the tech space like websites, apps and scripts. I am also curious about how technology works and how I can innovate with it.


I am currently studying at DMUIC and I have had a good experience so far. I have made friends with people from different cultures and backgrounds. The tutors have also been supportive and helpful to me. I have learned a lot of things during my time here.

Comments

Popular posts from this blog

Case Study - Method

Source: https://www.google.co.uk/url?sa=i&url=https%3A%2F%2Fwww.facebook.com%2Fmethoduk%2F&psig=AOvVaw1TjPOsSrMz-Vs9czJ_mxRc&ust=1685998095949000&source=images&cd=vfe&ved=0CBAQjRxqFwoTCJCq48K-qv8CFQAAAAAdAAAAABAj Method The methodology employed in the case study described in the book "Cyber Security: Case Study" reflects a systematic and meticulous approach to ethical hacking. This section outlines the key steps and processes undertaken by the ethical hacking team to assess the organization's cybersecurity measures. The first step in the methodology involved the selection of a qualified and experienced ethical hacking team. The team's expertise in various aspects of cybersecurity, such as network security, web application security, and social engineering, ensured a comprehensive assessment across different attack vectors. Careful consideration was given to the team's certifications, qualifications, and track record of successful engagements...

Initial Project Plan(Gantt Chart Update)

 BEFORE CONTINOUS ASSESSMENT AFTER CONTINOUS ASSESSMENT I used the Gantt chart above to plan and monitor all the blogs I had to write for this module. It was a rewarding experience to explore these topics and share my insights with you. The chart also helped me stay focused and motivated by showing me my progress and achievements. REFERENCE https://online.officetimeline.com/app/#/file/5cacb847-5749-4e92-9d55-25480acdc8b4/gantt-view [Accessed Date: 4th June 2023]

ESSAY (MAIN BODY)

Hi, in this blog I would be showing you my essay's main body. The body talks more about AI in endpoint security and its functionalities/application in endpoint security. It also touches on the benefits of AI in endpoint security.