CompTIA S+
I have Studying alone and watching presentations is difficult especially when you are a mature student. Found it more useful and it supported my style of learning to have that variety and knowledge from different people so I could adapt a couple of ways that suited me best. I found after I increased my knowledge …
Antisyphon Training
Defence & Cyber Deception – 4 day course with John Strand Active Defences have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is …
ISO/IEC 27001:2013
ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the context of the organisation. It sets out the specification for an information security management system (ISMS) Passed my BSI ISO 27001 exam last week, this is what I learned – What is information security management (ISM)? …
CISMP
Information Security Management Principles – including definitions, meanings and use of concepts and terms across information security management. It will continue by explaining the need for and the benefits of information security. Information Risk – including outlining threats to and vulnerabilities of information systems and the process for understanding and managing risk relating to information …
TryHackMe Journey
What a journey. Time scale – 47 hours, Ha! took me just under 3 months, fitting it around work, personal study and family life. The pathway and how TryHackMe lay their learning out is always top class. With this you where eased in with Active Reconnaissance, Vulnerability Scanning, and Web Application attacks. The 1st deploy …
What happened Facebook Yesterday?
Someone caused an update to be made on Facebook’s Boarder Gateway Protocol (BGP) records. Boarder Gateway Protocol – Is the post service of the internet. For example, when you post a letter into the post box, the post office then processes that letter and chooses a fast, efficient route to deliver the letter to its …
CompTIA A+ my 1st Cyber Security Exam
Learning Platforms – The Learning People.percipio.com. Jason Dion – CompTIA A+ (220-1001 + 220-1002) Test Prep, Exams and Simulations on Udemy.com Professor Messer YouTube videos and Study Group. CompTIA A+ Exam 220-1002 and 220-1002 & CompTIA A+ Pocket Prep apps for mobile. Most of the topics within the online platform was new to me. …
My 1st Trace Labs OSINT CTF
What is Open Source Intelligence (OSINT) ? OSINT is a collective term for intelligence collected from publicly available sources. That could be anything from the specific social media accounts of an individual, to a list of financial transactions performed by a company. The goal of OSINT is to collect non-personal data about someone or something, …
Top 3 Cyber attacks
Phishing – Manipulate targets into voluntarily giving up personal info. Can be disguised as malicious email or text where you click on a link. Brute Force – Using software, attacker try’s millions of different combinations of letters and numbers. Dictionary – Common word combinations usually from a pre compiled list of passwords. Cyber security is …