Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Boring Cybersecurity Theory Series' Articles
Back to Dzmitry Harbachou's Series
Boring Cybersecurity Theory: Where it all began
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Where it all began
#
cybersecurity
#
beginners
#
security
#
theory
1
reaction
Comments
Add Comment
5 min read
Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)
#
cybersecurity
#
beginners
#
basic
#
theory
1
reaction
Comments
Add Comment
3 min read
Boring Cybersecurity Theory: Hats (Understand Attackers)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Hats (Understand Attackers)
#
cybersecurity
#
beginners
#
theory
#
hacker
1
reaction
Comments
Add Comment
5 min read
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)
#
cybersecurity
#
beginners
#
theory
#
security
2
reactions
Comments
Add Comment
13 min read
Boring Cybersecurity Theory: Risk Management
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Risk Management
#
cybersecurity
#
beginners
#
theory
1
reaction
Comments
Add Comment
8 min read
Boring Cybersecurity Theory: Security Domains From CISSP
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 14 '25
Boring Cybersecurity Theory: Security Domains From CISSP
#
cybersecurity
#
beginners
#
theory
1
reaction
Comments
Add Comment
5 min read
Boring Cybersecurity Theory: Controls, Frameworks, and Compliance
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 15 '25
Boring Cybersecurity Theory: Controls, Frameworks, and Compliance
#
cybersecurity
#
theory
#
beginners
1
reaction
Comments
Add Comment
6 min read
Boring Cybersecurity Theory: Frameworks (NIST)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 18 '25
Boring Cybersecurity Theory: Frameworks (NIST)
#
cybersecurity
#
theory
#
beginners
1
reaction
Comments
Add Comment
3 min read
Boring Cybersecurity Theory: Playbook and Zero-day attack
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 19 '25
Boring Cybersecurity Theory: Playbook and Zero-day attack
#
cybersecurity
#
beginners
#
theory
1
reaction
Comments
Add Comment
11 min read
Boring Cybersecurity Theory: Ethics (Make Your Choice)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 20 '25
Boring Cybersecurity Theory: Ethics (Make Your Choice)
#
cybersecurity
#
ethics
#
beginners
1
reaction
Comments
Add Comment
5 min read
Boring Cybersecurity Theory: Main disciplines (Time to select your own way)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 21 '25
Boring Cybersecurity Theory: Main disciplines (Time to select your own way)
#
cybersecurity
#
beginners
#
roadmap
1
reaction
Comments
Add Comment
8 min read
Cybersecurity tools: SIEM or are companies really spying on us
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Dec 15 '25
Cybersecurity tools: SIEM or are companies really spying on us
#
cybersecurity
#
tooling
#
beginners
#
analytics
Comments
1
comment
7 min read
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account