Cert Week – A Career in Computer Forensics

This interview is from eForensics Magazine.

Interview with Gerard Johansen

Gerard Johansen is an incident response professional with over 15 years’ experience in areas like penetration testing, vulnerability management, threat assessment modeling, and incident response. Beginning his information security career as a cybercrime investigator, he has built on that experience while working as a consultant and security analyst for clients and organizations ranging from healthcare to finance.

Please tell us a bit more about yourself. What are your background and current job responsibilities?

I ...

Continue Reading →

Cert Week – Using the DIR Command

This is an example of a Performance Based Question that you might find in an A+ certification exam.  These images a screen captures of the explanation that was given in a practice exam from Boson.  I like the Boson practice exams and recommend them to my students.

Here is the scenario based question

The very first thing you should do ...

Continue Reading →

February 2024 ISC2 Twin Cities Meeting Announcement – Tales from the Time of COVID

Thursday February February 15 from 3:00 to 5:00 pm. The room will be available starting at 2:00 pm

Register Here

Scroll down to bottom of the event page

Metro State University
St John’s Hall Room 153

This live, in-person meeting is hosted by the Minnesota IT Center of Excellence and ISC2 Twin Cities.

Starting in 2020, our profession had to deal with issues from the pandemic, and we faced business closures, ...

Continue Reading →

Cert Week – IPv4 Subnetting and Supernetting

I have just finished teaching a couple of CompTIA  Network+ classes.  One of the subject matter areas that most students struggle with is the concepts around Subnetting, Supernetting, Variable Length Subnet Masking (VSLM), Fixed Length Subnet Masking (FLSM), Classless Interdomain Routing (CIDR),

I recently found this collection of ten videos presented by 

Continue Reading →

Cert Week – 4 Types of Cyber Security Training

An effective cybersecurity training program can protect your organization from most forms of threat.

Awareness training provides employees with basic cyber hygiene knowledge; technical security training helps prevent malware and hacking attacks; while compliance training ensures they adhere to industry standards.

Effective cybersecurity training integrates security into the culture of your organization and addresses ...

Continue Reading →
Page 1 of 12 12345...»