Amazon AWS-Getting Started with Elastic Load Balancing

Posted filed under Amazon AWS.

Source By: <> Getting Started with Elastic Load Balancing This tutorial provides a hands-on introduction to Application Load Balancers through the AWS Management Console, a web-based interface. To create your first Application Load Balancer, complete the following steps.     Tasks Before You Begin Step 1: Select a Load Balancer Type Step 2: Configure Your… Read more »

Amazon AWS-What Is Elastic Load Balancing?

Posted filed under Amazon AWS.

Source By: <>   What Is Elastic Load Balancing? Elastic Load Balancing distributes incoming application traffic across multiple EC2 instances, in multiple Availability Zones. This increases the fault tolerance of your applications. The load balancer serves as a single point of contact for clients, which increases the availability of your application. You can add and… Read more »

CompTIA Network+ OSI model

Posted filed under CompTIA Network+.

The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology.

CompTIA Network+ Install components of Wiring Distribution

Posted filed under CompTIA Network+.

Vertical Cross Connect – is a location within a building where cables originate and / or are terminated, reconnected using jumpers or pass throughs or are connected to patch panels or other similar devices where the locations are from upper or lower floors in the building.

CompTIA Security+ Email and Application Security

Posted filed under CompTIA Security+.

Some of the Security+ exam will test you on your knowledge of some basic email, Internet, and application security issues. Although the amount of detail of knowledge that is required is quite minimal, you must still have a working knowledge of some simple email and application security concepts.

CompTIA Security+ Organizational Security

Posted filed under CompTIA Security+.

The Security Life Cycle

Physical Security Physical security refers to the aspects of information security that are related to physical threats, such as fire or natural disasters. We will cover some basic physical security threats below:

CompTIA Security+ Symmetric Key Cryptography

Posted filed under CompTIA Security+.

In here we will learn about different symmetric key algorithms and their key features. More importantly, we will learn about some more key concepts related to cryptography as it applies to both symmetric and asymmetric algorithms.

CISSP LANs and Their Components

Posted filed under CISSP.

A local area network (LAN) is a critical component of a modern data network. A LAN is comprised of one or more computers, a communication protocol, a network topology, and cabling or a wireless network to connect the systems.

CISSP System Validation

Posted filed under CISSP.

No system or architecture will ever be completely secure; there will always be a certain level of risk.

CISSP Security Models of Control

Posted filed under CISSP.

Security Models of Control Security models of control are used to determine how security will be implemented, what subjects can access the system, and what objects they will have access to. Simply stated, they are a way to formalize security policy.

CISSP Security Mechanisms

Posted filed under CISSP.

Although a robust architecture is a good start, real security requires that you have security mechanisms in place to control processes and applications. Some good security mechanisms are described in the following sections.

CompTIA A+ Bluetooth

Posted filed under CompTIA A+.

Bluetooth is a short-range technology aimed at simplifying communications and synchronization among network devices. Bluetooth is divided into three classes: