Uncategorized

CompTIA S+

I have Studying alone and watching presentations is difficult especially when you are a mature student. Found it more useful and it supported my style of learning to have that variety and knowledge from different people so I could adapt a couple of ways that suited me best. I found after I increased my knowledge …

CompTIA S+ Read More »

Antisyphon Training

Defence & Cyber Deception – 4 day course with John Strand Active Defences have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is …

Antisyphon Training Read More »

ISO/IEC 27001:2013

ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the context of the organisation. It sets out the specification for an information security management system (ISMS) Passed my BSI ISO 27001 exam last week, this is what I learned – What is information security management (ISM)? …

ISO/IEC 27001:2013 Read More »

CISMP

Information Security Management Principles – including definitions, meanings and use of concepts and terms across information security management. It will continue by explaining the need for and the benefits of information security. Information Risk –  including outlining threats to and vulnerabilities of information systems and the process for understanding and managing risk relating to information …

CISMP Read More »

TryHackMe Journey

What a journey. Time scale – 47 hours, Ha! took me just under 3 months, fitting it around work, personal study and family life. The pathway and how TryHackMe lay their learning out is always top class. With this you where eased in with Active Reconnaissance, Vulnerability Scanning, and Web Application attacks. The 1st deploy …

TryHackMe Journey Read More »

cyber, attack, encryption-5338472.jpg

Top 3 Cyber attacks

Phishing – Manipulate targets into voluntarily giving up personal info. Can be disguised as malicious email or text where you click on a link. Brute Force – Using software, attacker try’s millions of different combinations of letters and numbers. Dictionary – Common word combinations usually from a pre compiled list of passwords. Cyber security is …

Top 3 Cyber attacks Read More »