Skip to main content

Recently Updated Pages

Twisted Pair Cable

Documentation

A type of network cable that twists the wires in order to achieve better performance. There are t...

Updated 1 month ago by table!

RJ11 Connector

Documentation

A deprecated type of connector used to connect devices to twisted pair cables. RJ11 Connectors: ...

Updated 1 month ago by table!

Cable

Documentation

An enumeration every single cable type listed in the A+ course. Network Cables Copper Cabling C...

Updated 1 month ago by table!

Cat 5 Enhanced

Documentation

The better version of Cat-5, since it provides better EMI protection. Description RJ45-Connector...

Updated 1 month ago by table!

Small Computer System Interface Port

Documentation

aliases: SCSI A type of port used to connect internal hard drives to the computer system. It'...

Updated 1 month ago by table!

Linux

Documentation

An operating system. The grandfather of the Big Three. An open-source, Unix-like OS. Anyone is fr...

Updated 1 month ago by table!

Peripheral Component Interconnect

Documentation

aliases: PCI The most common expansion bus type, with three generations, PCIe x16 being the f...

Updated 1 month ago by table!

Network Rack

Documentation

#I Component Visualization A = Ethernet routerB = Ethernet switchC = Ethernet patch panelD...

Updated 1 month ago by table!

Optical Time Domain Reflectometer

Documentation

A type of time domain reflectometer that is used with optical fiber. #II

Updated 1 month ago by table!

Onboarding

Documentation

The process that is followed when an organization enters a partnership with a new employee. This ...

Updated 1 month ago by table!

Network Interface Card

Documentation

aliases: NIC A hardware device responsible for managing the communication between a PC system...

Updated 1 month ago by table!

Spear Phishing

Documentation

A type of phishing where the attacker researches the target extensively to craft a personalized m...

Updated 1 month ago by table!

Whaling

Documentation

A specific type of phishing that targets high-value individuals within an organization, such as t...

Updated 1 month ago by table!

Phishing

Documentation

The act of sending malicious messages intended to fool and/or manipulate a victim into giving up ...

Updated 1 month ago by table!

Port

Documentation

A hardware piece on a computer where an electrical connector can be used to link the device to ot...

Updated 1 month ago by table!

Gramm Leach Bliley Act of 1999

Documentation

A Congressional act that forces companies that offer loans, investment advice, or loans to adhere...

Updated 1 month ago by table!

Sarbanes Oxley Act of 2002

Documentation

A congressional act that forces public companies to be transparent in regards to creating and mai...

Updated 1 month ago by table!

Payment Card Industry Data Security Standards

Documentation

aliases: PCI DSS The legal standards for financial data storage at enterprise levels. There a...

Updated 1 month ago by table!

Chain of Custody

Documentation

A set of procedures defining how evidence is handled after a security breach in an enterprise set...

Updated 1 month ago by table!

Network Medium

Documentation

The physical channel through which data communications travel; the connecting method between netw...

Updated 1 month ago by table!