Skip to content
techyengineer.com
Home
Consulting
Architecture
Techniques for Architecture evaluation
Architecture Tradeoff Analysis Method (ATAM)
Security
Module 01: Introduction to Ethical Hacking
Module 1.1 – Elements of information security
Module 01: Introduction to Search Functionality
Module 2: Foot printing and Reconnaissance
Module 3: Scanning Networks
Module 3.1: Scanning Networks with more real world examples and use cases
Module 3.2 : Scanning Networks
Module 03: Introduction to Search Functionality
Module 4: Enumeration with more real world examples and use cases
Module 2.1 : Foot printing and Reconnaissance with Real-World Examples
Module 5: Vulnerability Analysis with more real world examples and use cases
Module 6: System Hacking with more real world examples and use cases
Module 7: Malware Threats with Real-World Examples and Use Cases
Module 8: Sniffing with more real world examples and use cases
Module 9: Social Engineering with Real-World Examples and Use Cases
Module 10: Denial of Service with more real world examples and use cases
Module 11: Session Hijacking with more real world examples and use cases
Module 12: Evading IDS, Firewalls, and Honeypots with Real-World Examples and Use Cases
Module 12: Techniques in Evading Firewalls
Techniques in Evading Honeypots -Theory
Techniques in Evading Honeypots-v1
Techniques in Evading Honeypots-v2
Honeypots Demystified
Detecting a Kippo honeypot
Module 14: Hacking Web Applications with Real-World Examples and Use Cases
Module 15: SQL Injection with Real-World Examples and Use Cases
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking with Real-World Examples and Use Cases
Module 19: Cloud Computing
Module 20: Cryptography
A.I
AI Text Generators
Deepseek – Comparison of AI models with Human Brian
Data Center Consolidation
Downloads
Blogs
The Core Concepts of the Payments Domain
Test Cases for AXway Managed File Transfer (MFT)
Top 10 Plagarism checking tools online
TLS Encryption vs HTTPS encryption
Free Addins for Windows word for Gen AI and AI Detector
Top 10 Plagiarism checking tools online
Bitcoin Price Predictions
Retail Banking tools and process
Trends in (2025) the Technical Genre: Key Books and Themes
Quantum Integrated circuits
Top 10 Plagarism checking tools online
Retail Banking tools and process
Best open source cloud management tools
PHP Frameworks
Cryptocurrency Regulations
Taxation of Cryptocurrencies
AWS Platform Services – Tabular format
Interview Questions – AWS Network
Interview Questions – AWS Network Services Design and Implementation
Interview Questions – AWS Compute Services – Detailed Explanation
Canva’s Cost Optimization
Dropbox’s Reverse Migration, From Cloud to Own Data Centers
LinkedIn’s Infrastructure as Code at Scale
🌐Netflix’s Cloud Migration Journey
Spotify’s Gradual Cloud Migration
Data sync tools in AWS cloud
AWS Compute Services
AWS Storage Options
Hybrid connectivity to AWS Cloud
Cart
Checkout
About Us
techyengineer.com
cybersecurity delivery frameworks
1.1 Governance Systems Used for Cryptocurrencies
A sample OpenAPI spec with OAuth2 security
A.I
About Us
AI Text Generators
Architecture
Architecture Tradeoff Analysis Method (ATAM)
Automate security tasks to ensure secure continuous integration and continuous delivery (CI/CD) processes.
Best open source cloud management tools
Bitcoin Price Predictions
Blockchain Governance
Blockchain Interoperability
Blogs
Cart
CBDC- Benefits and impacts (Challenges and Opportunities)
Checkout
Comparison of API Gateway vs. Service Mesh (e.g., Istio) for AAA
Consulting
Crypto Currency Exchange Audit Factors
Crypto Taxation and Jurisdiction
Cryptocurrency Regulations
cybersecurity governance models
Data Center Consolidation
Deepseek – Comparison of AI models with Human Brian
Detecting a Kippo honeypot
Develop and implement risk management strategies to reduce vulnerabilities in development and operational environments.
Downloads
Elementor #31
Financial Action Task Force
Free Addins for Windows word for Gen AI and AI Detector
Home
Honeypots Demystified
How Cryptocurrency Exchanges Work
How to implement a custom authorizer?
Implement cybersecurity delivery frameworks, governance models, and best practices
Masternodes
Microsoft Sentinel
Microsoft Sentinel and Cribl play important roles in modern log onboarding
Module 1.1 – Elements of information security
Module 10: Denial of Service with more real world examples and use cases
Module 11: Session Hijacking with more real world examples and use cases
Module 12: Evading IDS, Firewalls, and Honeypots with Real-World Examples and Use Cases
Module 12: Techniques in Evading Firewalls
Module 14: Hacking Web Applications with Real-World Examples and Use Cases
Module 15: SQL Injection
Module 15: SQL Injection with Real-World Examples and Use Cases
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking with Real-World Examples and Use Cases
Module 19: Cloud Computing
Module 2: Foot printing and Reconnaissance
Module 2.1 : Foot printing and Reconnaissance with Real-World Examples
Module 20: Cryptography
Module 3: Scanning Networks
Module 3.1: Scanning Networks with more real world examples and use cases
Module 3.2 : Scanning Networks
Module 4: Enumeration with more real world examples and use cases
Module 5: Vulnerability Analysis with more real world examples and use cases
Module 6: System Hacking with more real world examples and use cases
Module 7: Malware Threats with Real-World Examples and Use Cases
Module 8: Sniffing with more real world examples and use cases
Module 9: Social Engineering with Real-World Examples and Use Cases
My account
Number Systems
On-Chain Governance in Cryptocurrency
OpenAPI Specifications, OAuth, SAML, and API Gateway security, including enforcing AAA (Authentication, Authorization, and Accounting)
OpenZiti
Penetration testing methodologies
PHP Frameworks
Quantum Integrated circuits
Retail Banking tools and process
Sample Page
second page
Securing your Network with Snort
Security
Security in Cryptocurrency Networks, Transactions, and Users
Security Testing Tools Burp Suite, SAST, DAST, IAST, and dynamic testing tools.
Shop
SIEM and UEBA platforms
Taxation of Cryptocurrencies
Techniques for Architecture evaluation
Techniques in Evading Honeypots -Theory
Techniques in Evading Honeypots-v1
Techniques in Evading Honeypots-v2
Test Cases for AXway Managed File Transfer (MFT)
The Core Concepts of the Payments Domain
TLS Encryption vs HTTPS encryption
Top 10 Plagarism checking tools online
Top 10 Plagiarism checking tools online
Trends in (2025) the Technical Genre: Key Books and Themes
Types of Accounts in Banking System
U.S. Sanctions
Data Center Consolidation
Scroll to Top