I saw this post by Prabnair1 on Reddit, and just had to share it with my CISSP students.
- P – Policy & Strategy Level
- R – Risk-Based Decisions
- O – ...
OCT
I saw this post by Prabnair1 on Reddit, and just had to share it with my CISSP students.
This interview is from eForensics Magazine.
Gerard Johansen is an incident response professional with over 15 years’ experience in areas like penetration testing, vulnerability management, threat assessment modeling, and incident response. Beginning his information security career as a cybercrime investigator, he has built on that experience while working as a consultant and security analyst for clients and organizations ranging from healthcare to finance.
Please tell us a bit more about yourself. What are your background and current job responsibilities?
I ...
Continue Reading →Many people wonder what the top row of buttons on a keyboard are all about. These are the Function Keys. These have origins in the earliest days of computers.
My experience with computers goes back to the early 1980’s on a time-shared mainframe accessed on 64K telco data circuits and dumb terminals. This was ...
Continue Reading →This is an example of a Performance Based Question that you might find in an A+ certification exam. These images a screen captures of the explanation that was given in a practice exam from Boson. I like the Boson practice exams and recommend them to my students.
Here is the scenario based question
The very first thing you should do ...
Continue Reading →Scroll down to bottom of the event page
Starting in 2020, our profession had to deal with issues from the pandemic, and we faced business closures, ...
Continue Reading →Here are some images of the computer and networking cables and connections that will turn up on a certification exam.
When I am teaching about risk assessment, we eventually get to a couple of different ways to calculate risk.
The first formula is: Risk = Threat x Vulnerability x Likelihood. This is a probabilistic.. This approach that looks at how likely a certainly risk is to occur.
The second formula is : Risk = ...
Continue Reading →I have just finished teaching a couple of CompTIA Network+ classes. One of the subject matter areas that most students struggle with is the concepts around Subnetting, Supernetting, Variable Length Subnet Masking (VSLM), Fixed Length Subnet Masking (FLSM), Classless Interdomain Routing (CIDR),
I recently found this collection of ten videos presented by
Continue Reading →October 30, 2023 the Wall street Journal broke news that the United States Security and Exchange Commission sued Solarwinds. Here are the first ...
Continue Reading →An effective cybersecurity training program can protect your organization from most forms of threat.
Awareness training provides employees with basic cyber hygiene knowledge; technical security training helps prevent malware and hacking attacks; while compliance training ensures they adhere to industry standards.
Effective cybersecurity training integrates security into the culture of your organization and addresses ...
Continue Reading →