Cert Week – A Career in Computer Forensics

This interview is from eForensics Magazine.

Interview with Gerard Johansen

Gerard Johansen is an incident response professional with over 15 years’ experience in areas like penetration testing, vulnerability management, threat assessment modeling, and incident response. Beginning his information security career as a cybercrime investigator, he has built on that experience while working as a consultant and security analyst for clients and organizations ranging from healthcare to finance.

Please tell us a bit more about yourself. What are your background and current job responsibilities?

I ...

Continue Reading →
0

Cert Week – Keyboard Shortcuts

Two weeks ago we discussed the purpose of the Function Keys.  Here is a collection of other keyboard shortcuts using the ALT and CTRL keys.

These keyboard combinations were created in the times before mice and drop-down menus, and are popular with experienced computer users.  Find a few for your own use.  You can ...

Continue Reading →
0

Cert Week – Logs

Most cybersecurity certifications focus heavily on the purpose and importance of log files.  Log files are often aggregated and analyzed using tools and appliances such as SIEMs.  Here is an infographic that I think is useful to help understand log files.


 

Continue Reading →
0

Cert Week – Using the DIR Command

This is an example of a Performance Based Question that you might find in an A+ certification exam.  These images a screen captures of the explanation that was given in a practice exam from Boson.  I like the Boson practice exams and recommend them to my students.

Here is the scenario based question

The very first thing you should do ...

Continue Reading →
0

Cert Week – IPv4 Subnetting and Supernetting

I have just finished teaching a couple of CompTIA  Network+ classes.  One of the subject matter areas that most students struggle with is the concepts around Subnetting, Supernetting, Variable Length Subnet Masking (VSLM), Fixed Length Subnet Masking (FLSM), Classless Interdomain Routing (CIDR),

I recently found this collection of ten videos presented by 

Continue Reading →
0

Cert Week – 4 Types of Cyber Security Training

An effective cybersecurity training program can protect your organization from most forms of threat.

Awareness training provides employees with basic cyber hygiene knowledge; technical security training helps prevent malware and hacking attacks; while compliance training ensures they adhere to industry standards.

Effective cybersecurity training integrates security into the culture of your organization and addresses ...

Continue Reading →
0
Page 1 of 2 12