Search Results for "CISSP"


  • Its A Software-Defined Virtualized World
    One of the trends that I am seeing, at least as it applies to the curriculum used in most cybersecurity certifications, such as the CISSP, CASP+, and CySA+, is that technology is moving to a software-defined, virtualized everything.  The latest issue of the Internet Protocol Journal, Volume 24, Is...
  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. 3 ways the CI/CD approach to software has made work better for developers The software industry has gotten much better at breaking big projects down into smaller chunks, according to one CTO.  (CISSP Domain 8) When cryptog...
  • Comments on the CySA CS0-002 Exam and PBQs
    As an instructor for the CompTIA CySA+ CS0-002 exam, I like to receive feedback from students who have taken the test, and I collect those comments here, for other students to use a preparatory material.  I have done this previously for the CISSP exam.  This one is dedicated to the Cybersecurity A...
  • Cybersecurity Certification Tip – The Archive Bit and Backups
    Although I am featuring the CISSP logo in this article, the information that follows could be useful for students pursuing a number of cybersecurity certifications (CASP+, CySA+), as well as IT fundaments courses such as the CompTIA A+ This article is the result of a longer email string that passed ...
  • Guidance for Guest Writers
    I accept relevant guest articles for the WyzGuys Cybersecurity blog. Here are a few guidelines. My publication schedule I publish one or two original articles per week on on Tuesday (1 article that week) or Monday and Wednesday (two articles that week). The week day slots are where I publish most g...
  • Student Comments on the CompTIA CySA+ Exam
    As an instructor, I teach a number of different cybersecurity courses, and one of them is CompTIA’s CySA+.  If you are pursuing this certification, there are a few things to know about preparing for, taking, and passing the exam.  As I did for the CISSP exam, I am going to let the people who...
  • Keeping Your Certifications
    Getting certified in an information technology, networking, cybersecurity, or other professional credential is hard work.  Nobody wants to have to do them over.  Hopefully you are earning the Continuing Education Units (CEU or CPE) you need to maintain your certification status.  Industry certifi...
  • Can Your Wireless Keyboard Be Hacked?
    Keyboard – Enter key replace with a RED HELP Key Did you know that wireless devices almost always present a security vulnerability?  Wireless signals pass through the air and can be intercepted and read by a savvy attacker.  To protect wireless communication sessions, usually the wireless ...
  • Let Jobs Find You With LinkedIn – Part 2
    Having trouble finding a job in Information Technology or Cybersecurity?  You may be doing it wrong.  Once you have a fully developed LinkedIn profile, jobs should be finding you. On Monday we kicked off part 1 of our two part series on how to get LinkedIn to find jobs you will love.  Lets look a...
Page 4 of 6 «...23456