Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

651 total results found

CompTIA

A collection of notes surrounding the certification ecosystem of CompTIA.

CompTIA Security+

A collection of notes taken while studying for the Security+ certification.

Introduction

CompTIA Security+

Welcome to Security+. Let's grind this out before its graduation day. Challenges Sophisticated Attacks Proliferation of Attack Software Attack Scale and Velocity Control Types Employs the CIA triad. Controls are organized in three main ways: the way they're...

Unit 1

CompTIA Security+

Unit 2

CompTIA Security+

Threat Actors

CompTIA Security+ Unit 2

We need to create profiles of the different types of attacks we see. Historically, cybersecurity techniques relied on the identification of static known threats, like viruses, rootkits, trojans, botnets, and other software-specific exploits. However, we also n...

General Attack Strategies

CompTIA Security+ Unit 2

What are the most common methods attackers use to conduct an exploit? Attack Strategy Description Reconnaissance Gathering information about an organization. Includes system hardware info, network configurations, and individual user information. Socia...

General Defense Strategies

CompTIA Security+ Unit 2

What are the common methods organizations use to defend their systems from attacks? Methodology Description Layering Layering involves implementing multiple security strategies to protect the same asset. Defense in depth or security in depth is based on...

Attack Surfaces

CompTIA Security+ Unit 2

All the points at which a malicious actor could try to exploit a vulnerability. Any location or method where a threat actor can interact with a network port, app, computer, or user is part of a potential attack surface. To reduce the surface, one needs to rest...

Sophisticated Attacks

CompTIA Security+ Unit 1

Complex attacks that are difficult to detect and thwart. Sophisticated attacks use common internet tools and protocols, making it difficult to distinguish an attack from real traffic. They also vary their behavior, making each attack look a little different ea...

Proliferation of Attack Software

CompTIA Security+ Unit 1

A wide variety of attack tools that are freely available on the Internet, making any reasonably knowledgeable person able to execute highly complex attacks.

Attack Scale and Velocity

CompTIA Security+ Unit 1

Modern attacks spread very quickly, up to millions of computers in a matter of minutes or even days.

Social Engineering

CompTIA Security+ Unit 2

Use Loki's tactics to convince unsuspecting users to provide sensitive data or to violate security guidelines. The social engineering process can be divided into three main phases: reasearch, development, and exploitation. Research In this phase, the attacker ...

Malware

CompTIA Security+ Unit 2

Software that serves a malicious purpose, typically installed without the user's consent (or knowledge). There are multiple types of malware: Computer Viruses Spyware & Keyloggers Backdoors & Remote Access Trojans (RATs) Rootkits Ransomware Logic Bombs Virus...

Linux IP Address Config Example

Documentation

Step-by-step tutorial for Linux static IP configuration. View the current state of the network card in the IT-Laptop computer. From the Favorites bar, select Terminal. At the prompt, type ip addr show and press Enter to view the current state of the network...

Address Resolution Protocol

Documentation

A Layer 2 protocol that enables hosts to map IP addresses to MAC addresses in their local network. Since all devices on a network are identified by their IP addresses, but NICs use MAC addresses instead, hosts need a way to associate their neighbors in the loc...

Virtual Private Network

Documentation

A type of network that uses encryption to forward IP traffic over a TCP/IP network. Tunneling protocols are used to encrypt packet contents and wraps them in an unencrypted packet. Tunnel endpoints are allowed to encrypt and decrypt VPN packets. Two endpoints...

Network Interface Card

Documentation

aliases: NIC A hardware device responsible for managing the communication between a PC system and it's connected network. It does this by converting a digital data stream that can be sent along the transmission medium. Physical Addressing Each network inte...