Networking Protocols for Certification

By Bob Weiss and ChatGPT

Learning about networking protocols, and their importance and uses in the communications between two computers across some sort of network media, is at the center of many IT and cybersecurity certifications.  The goal of this article is to provide a list of networking protocols that you need to know for your exam and for a future career in ...

Continue Reading →
0

Linux Commands for Certification

By Bob Weiss and Google Bard

Many of the certification classes that I teach are requiring a deeper understand of Linux, especially Linux commands at the terminal window.  As a cybersecurity certification instructor, I know that understanding Linux commands in the terminal window is essential for anyone who wants to work in this field.

The command line is a powerful tool that can be used to perform a variety of tasks, from ...

Continue Reading →
0

URL Encoding, SQL Injection, and Directory Traversal for Cybersecurity Certification – Part 3

URL (%) Percent Encoding , Base64 Encoding, and SQL Injection

By Bob Weiss

As we discussed in our first two articles, many of the cybersecurity certifications that I teach have content that involves the uses of encoding, code injection, directory transversal, and scripting.  These concepts can be difficult to grasp, and the exam questions can be challenging to ...

Continue Reading →
3
Page 1 of 9 12345...»