I saw this post by Prabnair1 on Reddit, and just had to share it with my CISSP students.
- P – Policy & Strategy Level
- R – Risk-Based Decisions
- O – ...
OCT
I saw this post by Prabnair1 on Reddit, and just had to share it with my CISSP students.
This interview is from eForensics Magazine.
Gerard Johansen is an incident response professional with over 15 years’ experience in areas like penetration testing, vulnerability management, threat assessment modeling, and incident response. Beginning his information security career as a cybercrime investigator, he has built on that experience while working as a consultant and security analyst for clients and organizations ranging from healthcare to finance.
Please tell us a bit more about yourself. What are your background and current job responsibilities?
I ...
Continue Reading →Two weeks ago we discussed the purpose of the Function Keys. Here is a collection of other keyboard shortcuts using the ALT and CTRL keys.
These keyboard combinations were created in the times before mice and drop-down menus, and are popular with experienced computer users. Find a few for your own use. You ...
Continue Reading →Most cybersecurity certifications focus heavily on the purpose and importance of log files. Log files are often aggregated and analyzed using tools and appliances such as SIEMs. Here is an infographic that I think is useful to help understand log files.
Continue Reading →
Many people wonder what the top row of buttons on a keyboard are all about. These are the Function Keys. These have origins in the earliest days of computers.
My experience with computers goes back to the early 1980’s on a time-shared mainframe accessed on 64K telco data circuits and dumb terminals. This ...
Continue Reading →This is an example of a Performance Based Question that you might find in an A+ certification exam. These images a screen captures of the explanation that was given in a practice exam from Boson. I like the Boson practice exams and recommend them to my students.
Here is the scenario based question
The very first thing you should do ...
Continue Reading →Posted on Linked in and Reddit
“Think like a manager” – a phrase synonymous with the CISSP
For those who come from a technical background, cultivating the appropriate mindset is crucial when tackling the CISSP. Answering the exam questions solely from a technical standpoint, delving too ...
Continue Reading →Here are some images of the computer and networking cables and connections that will turn up on a certification exam.
When I am teaching about risk assessment, we eventually get to a couple of different ways to calculate risk.
The first formula is: Risk = Threat x Vulnerability x Likelihood. This is a probabilistic.. This approach that looks at how likely a certainly risk is to occur.
The second formula is : Risk = ...
Continue Reading →