Passing Certification Exams

I recently read a couple of questions on Reddit about knowing if you are prepared for the certification exam.  I wrote the following responses.  The first question is from a tester who failed the 220-1101 exam for A+


Posted by u/Character_Writing825

failed 1101 today

I studied the material 3 months Finally took the exam today and I failed I feel so useless I don’t know how to go back home and explain why I failed Got a 638

My reply:

From ...

Continue Reading →
1

Networking Protocols for Certification

By Bob Weiss and ChatGPT

Learning about networking protocols, and their importance and uses in the communications between two computers across some sort of network media, is at the center of many IT and cybersecurity certifications.  The goal of this article is to provide a list of networking protocols that you need to know for your exam and for a future career in ...

Continue Reading →
0

URL Encoding, SQL Injection, and Directory Traversal for Cybersecurity Certification – Part 3

URL (%) Percent Encoding , Base64 Encoding, and SQL Injection

By Bob Weiss

As we discussed in our first two articles, many of the cybersecurity certifications that I teach have content that involves the uses of encoding, code injection, directory transversal, and scripting.  These concepts can be difficult to grasp, and the exam questions can be challenging to answer correctly.  This series of articles is designed to help you understand the basic concepts, and how these get used both securely and maliciously.  ...

Continue Reading →
5

URL Encoding, SQL Injection, and Directory Traversal for Cybersecurity Certification – Part 2

Character Encoding

by Bob Weiss

Happy Pi Day.  It is also Albert Einstein’s birthday.

As we discussed in our first article, many of the cybersecurity certifications that I teach have content that involves the uses of encoding, code injection, directory transversal, and scripting.  These concepts can be difficult to grasp, and the exam questions can be challenging to answer correctly.  This series of articles is designed to help you understand the basic concepts, and how these get used both securely and maliciously.  I ...

Continue Reading →
0

URL Encoding, SQL Injection, and Directory Traversal for Cybersecurity Certification – Part 1

Numbering Systems

By Bob Weiss

Many of the cybersecurity certifications that I teach have content that involves the uses of encoding, code injection, directory transversal, and scripting.  These concepts can be difficult to grasp, and the exam questions can be challenging to answer correctly.  This series of articles is designed to help you understand the basic concepts, and how these get used both securely and maliciously.  I am planning to show examples to help you identify these types of use cases or ...

Continue Reading →
2

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


CISA and FBI Release ESXiArgs Ransomware Recovery Guidance

Original release date: February 8, 2023

Today, CISA and the Federal Bureau of Investigation (FBI) released a joint Cybersecurity Advisory, ESXiArgs Ransomware Virtual Machine Recovery Guidance. This advisory describes ...

Continue Reading →
0
Page 2 of 8 12345...»