Passing Certification Exams

I recently read a couple of questions on Reddit about knowing if you are prepared for the certification exam.  I wrote the following responses.  The first question is from a tester who failed the 220-1101 exam for A+


Posted by u/Character_Writing825

failed 1101 today

I studied the material 3 months Finally took the exam today and I failed I feel so useless I don’t know how to go back home and explain why I failed Got a 638

My reply:

From ...

Continue Reading →
1

Networking Protocols for Certification

By Bob Weiss and ChatGPT

Learning about networking protocols, and their importance and uses in the communications between two computers across some sort of network media, is at the center of many IT and cybersecurity certifications.  The goal of this article is to provide a list of networking protocols that you need to know for your exam and for a future career in ...

Continue Reading →
0

Linux Commands for Certification

By Bob Weiss and Google Bard

Many of the certification classes that I teach are requiring a deeper understand of Linux, especially Linux commands at the terminal window.  As a cybersecurity certification instructor, I know that understanding Linux commands in the terminal window is essential for anyone who wants to work in this field.

The command line is a powerful tool that can be used to perform a variety of tasks, from ...

Continue Reading →
0

URL Encoding, SQL Injection, and Directory Traversal for Cybersecurity Certification – Part 3

URL (%) Percent Encoding , Base64 Encoding, and SQL Injection

By Bob Weiss

As we discussed in our first two articles, many of the cybersecurity certifications that I teach have content that involves the uses of encoding, code injection, directory transversal, and scripting.  These concepts can be difficult to grasp, and the exam questions can be challenging to answer correctly.  This series of articles is designed to help you understand the basic concepts, and how these get used both securely and maliciously.  ...

Continue Reading →
5

URL Encoding, SQL Injection, and Directory Traversal for Cybersecurity Certification – Part 2

Character Encoding

by Bob Weiss

Happy Pi Day.  It is also Albert Einstein’s birthday.

As we discussed in our first article, many of the cybersecurity certifications that I teach have content that involves the uses of encoding, code injection, directory transversal, and scripting.  These concepts can be difficult to grasp, and the exam questions can be challenging to answer correctly.  This series of articles is designed to help you understand the basic concepts, and how these get used both securely and maliciously.  I ...

Continue Reading →
0

SQL Injection

This post is for my cybersecurity students, and anyone else taking a cybersecurity class or studying for a certification exam.

From Jason Dion: “The most common type of code injection is SQL injection. An SQL injection attempts to modify one or more of an SQL query’s four basic functions: select, insert, delete, or update. Two common methods of performing an SQL injection are either using a single apostrophe (‘) or submitting an always true statement like 1=1.  As a penetration tester, you ...

Continue Reading →
0
Page 4 of 12 «...23456...»