Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

681 total results found

Linux Distro Installs

What if we tried out a bunch of Linux distributions?

Arch Linux

Linux Distro Installs

megachad simulator Create a File System Wipe Partitions The goal of this section is to create 3 partitions: efi (boot), swap, and root. Search for partitions using fdisk -l. wipefs <path_to_partition> for whatever partitions you decide to nuke. fdisk to ...

Software Defined Networking

CompTIA Network+

A technology that allows network and security professionals to manage, control, and make changes to a network. SDN is basically a giant UI wrapper for the many different text-based configuration files scattered across the many services and machines that compo...

Embedded and Specialized Devices

Documentation

An enumeration of the many types of embedded/IoT devices. Device Types Home Appliances Environment Controls (HVAC) Building/Facility Automation Lighting Controls Security Systems Door Locks Sprinkler Systems Garage Doors Smart Meters Wearabl...

Mainframe

Documentation

its actually real? A mainframe computer is a large, powerful computer that is capable of processing extremely large amounts of data, usually running proprietary operating systems that are rarely updated.

Unit 10

CompTIA Security+

Securing Embedded Systems

CompTIA Security+ Unit 10

lock them in a white room. Smart devices are popular, but they are a black box. The consumer usually has little ot no control over the technology being used within said smart devices, and vendors are known to be slow with rolling out security updates for thei...

Email Security

CompTIA Security+ Unit 10

who even still uses email anyway Email is cleartext by default. However, S/MIME and PGP are used to secure email. They both use certificates to provide authentication, message integrity, non-repudiation, and privacy. Secure Multipurpose Internet Mail Extensi...

Unit 11

CompTIA Security+

Governance and Accountability

CompTIA Security+ Unit 11

who in tel aviv can i blame for all my problems Governance practices ensure organizations abide by all applicable cybersecurity laws and regulations to protect them from legal liability. Governance oversees: regulatory compliance requirements contractual ...

Data Governance Roles

CompTIA Security+ Unit 11

role-based access control redux Role Description Role Owner A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity, and availability of an information asset. A high-ranking employee, li...

Unit 12

CompTIA Security+

Third Party Vendors

CompTIA Security+ Unit 12

just don't get third partied uhhh third parties are sometimes good and sometimes bad. choose the good ones to do business with. Third-Party Relationships (Raw Lesson Content) VendorĀ - A vendor is a company that sells an organization's goods or provides su...

Rules of Engagement

CompTIA Security+ Unit 12

the parameters and expectations for third-party relationships we need to expect a certain level to be met when partnering professionally with professed professionals The Expectations Roles and Responsibilities (who is responsible to do what in this partne...

Vendor Assessment

CompTIA Security+ Unit 12

how do we know which third-party vendors to do business with? uhhh just do a bunch of stuff on them. lowkey experiment on them. Penetration Testing Right to Audit Clause Proof of Internal Audits Independent Assessments Supply Chain Analysis Audits a...