Recently Updated Pages
Twisted Pair Cable
A type of network cable that twists the wires in order to achieve better performance. There are t...
RJ11 Connector
A deprecated type of connector used to connect devices to twisted pair cables. RJ11 Connectors: ...
Cable
An enumeration every single cable type listed in the A+ course. Network Cables Copper Cabling C...
Cat 5 Enhanced
The better version of Cat-5, since it provides better EMI protection. Description RJ45-Connector...
Small Computer System Interface Port
aliases: SCSI A type of port used to connect internal hard drives to the computer system. It'...
Linux
An operating system. The grandfather of the Big Three. An open-source, Unix-like OS. Anyone is fr...
Peripheral Component Interconnect
aliases: PCI The most common expansion bus type, with three generations, PCIe x16 being the f...
Network Rack
#I Component Visualization A = Ethernet routerB = Ethernet switchC = Ethernet patch panelD...
Optical Time Domain Reflectometer
A type of time domain reflectometer that is used with optical fiber. #II
Onboarding
The process that is followed when an organization enters a partnership with a new employee. This ...
Network Interface Card
aliases: NIC A hardware device responsible for managing the communication between a PC system...
Spear Phishing
A type of phishing where the attacker researches the target extensively to craft a personalized m...
Whaling
A specific type of phishing that targets high-value individuals within an organization, such as t...
Phishing
The act of sending malicious messages intended to fool and/or manipulate a victim into giving up ...
Port
A hardware piece on a computer where an electrical connector can be used to link the device to ot...
Gramm Leach Bliley Act of 1999
A Congressional act that forces companies that offer loans, investment advice, or loans to adhere...
Sarbanes Oxley Act of 2002
A congressional act that forces public companies to be transparent in regards to creating and mai...
Payment Card Industry Data Security Standards
aliases: PCI DSS The legal standards for financial data storage at enterprise levels. There a...
Chain of Custody
A set of procedures defining how evidence is handled after a security breach in an enterprise set...
Network Medium
The physical channel through which data communications travel; the connecting method between netw...