Is CompTIA Security+ Worth it?

Posted filed under CompTIA Security+.

What do CCNA Security, CCNP Security, CEH, ISA, Infosec CISSP and Amazon AWS Certified Security have in common? They are all part of the large grouping of cybersecurity certifications currently available. Each of these certifications is valuable and serves a valid purpose. But what about the CompTIA Security+ certification? If you’ve got questions, we’ve got… Read more »

Remote Access vs Site-To-Site VPN

Posted filed under CompTIA Security+.

Remote Access VPN What is a Remote Access VPN? A remote access VPN gives employees access to secure connection with a remote computer network and they can access resources on the network as if they were directly plugged into the network’s servers. How Remote Access VPN Works? A remote-access VPN works by creating a virtual… Read more »

Protocols and Encryption

Posted filed under CompTIA A+, CompTIA Security+.

CompTIA A+ Core 2 -Chap 2.2 | Security+ Chap 6.3 Protocols and Encryption WEP WEP – (wired equivalent privacy) is a standard network protocol that adds security to Wi-Fi and other 802.11 wireless networks. WEP was designed to give wireless networks the same level of privacy protection as a comparable wired network, but technical flaws… Read more »

How to Sanitize your Data?

Posted filed under CompTIA Security+.

Data Sanitization For the general user, the delete or format command appears to be the logical method of removing unwanted data files. These methods, however, are like sweeping something under the carpet: you may not be able to see it, but it’s still there. When you delete files and then empty the Recycle Bin, you… Read more »

Passively Test Security Controls

Posted filed under CompTIA Security+.

Security+ Objectives 1.5 The passive approach uses devices to watch the traffic as it passes by. These devices can be special purpose devices such as a Sniffer or they can be built into other devices such as routers, switches or end node hosts. Administrators can scan specific systems or an entire network. For example, many… Read more »

Penetration Testing Vs Vulnerability Scanning

Posted filed under CompTIA Security+, Sec+.

Security+ Objectives 1.4 Penetration Testing & Vulnerability Scanning, What’s the Difference? What is Penetration Testing? Penetration testing is a way to “stress test” your IT infrastructure security. Penetration techniques are used to evaluate the safety and security of the network in a controlled manner. Operating systems, services, applications, and even the behavior of the end… Read more »

Black Box, Grey Box, White Box Testing

Posted filed under CompTIA Security+.

Security+ Objectives 1.4 Black Box, Grey Box, White Box testing: What Differences? There are several ways to conduct penetration tests. If you’re considering penetration testing for your network, you’ll likely choose either black, white, or gray box testing. Each method has merits, so it’s helpful to understand the difference between these tests in order to… Read more »

CompTIA Security+|MTA Security – Load Balancing

Posted filed under CompTIA Security+, MICROSOFT MTA SECURITY.

Load Balancing CompTIA Security+ Section 2.0   Load BalancerDefinition: “Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm.” A load balancer works in-between client devices and back end servers, and it receives then distributes incoming requests to any available server capable of… Read more »

Active Vs Passive Reconnaissance

Posted filed under CompTIA Security+, MICROSOFT MTA SECURITY.

Penetration Testing Concepts 1 CompTIA Sec+ Section 1.4 Active Reconnaissance Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities. This may be through automated scanning or manual testing using various tools like ping, traceroute, netcat etc. This type of recon requires that… Read more »


Posted filed under CompTIA Security+.

Ransomware CompTIA Sec+ Objectives 1.1 Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it. Ransomware variants have been observed for several years and often attempt to extort money from victims by displaying an on-screen alert. Typically, these alerts state… Read more »

Multi-factor authentication

Posted filed under CompTIA Network+, CompTIA Security+.

Two-Factor or Multi-Factor Authentication (2FA or MFA) CompTIA Security+ Objective 4.1 and CompTIA Network+ Objective 4.2 What is two-factor or multi-factor authentication (2FA or MFA)? Multifactor authentication ensures that a user is who they say they are. The more factors are used to determine the identity of a person, the greater the reliability of the authenticity…. Read more »


Posted filed under CompTIA Security+.

Phishing What is Phishing and How to Detect Phishing Attacks? Part of CompTIA Security+ Objectives 1.2 Phishing is an email scam designed that appears to be from a legitimate company and ask you to provide sensitive information. Cybercriminals use phishing to attempt to obtain sensitive information such as credit card details and login credentials, by… Read more »

Benefits of CompTIA Security+ Certification for Cyber Security Professionals

Posted filed under ABOUT IT, CompTIA Security+, Sec+.

One of the fastest growing areas of the enterprise is cybersecurity. Every year, more attacks are carried out meaning more of the IT budget is allocated for bolstering security, ultimately leading to the need to hire more cybersecurity experts to protect the organization.   According to cybersecurity company CrowdStrike, which recently published a casebook with takeaways and insights… Read more »

CompTIA Sec+ | Microsoft MTA Security: Types of Wireless Attacks Part 2

Posted filed under CompTIA Security+, MICROSOFT MTA SECURITY.

The Types of Wireless Attacks Part 2 CompTIA Security+ Objective 1.2 WPS Attacks Wi-Fi Protected Setup (WPS) allows users to configure a wireless network without typing in the passphrase. Instead, users can configure devices by pressing buttons or by entering a short personal identification number (PIN). For example, a user can configure a new wireless… Read more »

CompTIA and Immersive Labs Issue A Pen Test Challenge

Posted filed under CompTIA Security+, MICROSOFT MTA SECURITY.

CompTIA and Immersive Labs are challenging cybersecurity professionals in the United States and United Kingdom to test their penetration testing skills this month. The two organizations launched the pen test challenge on the opening day of RSA® Conference 2019. “Penetration testing, if done right, is a proven and valuable activity that all organizations should engage… Read more »

CompTIA Sec+ | Microsoft MTA Security: Most Common Application/Service Attacks Part 2

Posted filed under CompTIA Security+, MICROSOFT MTA SECURITY.

   The nature of cyberattacks is constantly in flux, always evolving to keep pace with the times. Hacking of websites, theft of credit card information and other personal information has become an almost daily occurrence, along with illegal remittances via Internet banking. Recent years have witnessed the accelerating dissemination of new technologies such as IoT… Read more »