Post

Blog Introduction

Introduction to mikeywhiston.dev - what will be covered and the ethical expectations of this blog.

Blog Introduction

mikeywhiston.dev

Hey there!

My name is Mikey Whiston, and I am a student security researcher with a focus on finding and responsibly reporting vulnerabilities to improve systems and ensure that systems are well-equipped against Cybersecurity threats.

My certifications are the following:

  • Cisco Networking Academy: CyberOps Associate
  • Springpod: Virtual Work Experience with Drax Cybersecurity
  • Cisco Certified Support Technician (Networking)
  • National Centre for Computing Education: Knowledge in KS3 and GCSE Computer Science
  • Security Blue Team: Introduction to Threat Hunting
  • Security Blue Team: Introduction to Python
  • Security Blue Team: Introduction to Dark Web Investigations
  • Cisco Networking Academy: Introduction to Cybersecurity

In this blog, we will not be committing any illicit activity in order to follow the Computer Misuse Act of 2010, and other relevant computing legislature. It is always necessary to perform good-faith penetration testing and always report vulnerabilities to the relevant organisations.

In this blog, we will be covering:

  • my vulnerability discoveries and walking through my thought process in identifying security exploits;
  • my progress in enhancing my knowledge within cybersecurity;
  • what I learn from studying for cybersecurity certifications;
  • how cybersecurity skills can be applied for the greater good;
This post is licensed under CC BY 4.0 by the author.