CISSP Single sign-on

Posted by & filed under CISSP.

Single sign-on is an attempt to address a problem that is common for all users and administrators.

CISSP Access Control Models

Posted by & filed under CISSP.

Data access controls are established to control how subjects can access data, what they can access with it, and what they can do with it once accessed. Three primary types of access control are discussed in this section.   [bs_icon name=”glyphicon glyphicon-chevron-right”]   Mandatory Access Control (MAC)

CISSP Legal Systems

Posted by & filed under CISSP.

The two law systems that form the basis of legal systems in most countries are:

CISSP Kerberos

Posted by & filed under CISSP.

Kerberos is a network authentication protocol created by the Massachusetts Institute of Technology (MIT) that uses secret-key cryptography. Kerberos has three parts: a client, server, and trusted third party (KDC) to mediate between them.

CISSP Attacks

Posted by & filed under CISSP.

[bs_icon name=”glyphicon glyphicon-chevron-right”] Types of Attacks Denial of Service (DoS) Smurf Fraggle SYN Flood Teardrop Distributed Denial of Service (DDoS) Ping Sweep Port Scan Salami attack Man-in-the-Middle Session or TCP Hijacking Replay Buffer Overflow Scareware and Ransomeware Password attack Covert channels [bs_icon name=”glyphicon glyphicon-chevron-right”]  Web Attacks SQL Injection – An injection of SQL query through input… Read more »

CISSP Asymmetric Systems

Posted by & filed under CISSP.

CISSP algorithms

Asymmetric Systems –Uses a pair of keys (private and public) for encryption and decryption

CompTIA A+ | Microsoft MTA O/S: Malicious Software (Malware)

Posted by & filed under CompTIA A+, MICROSOFT MTA O/S.

Definition – What does Malicious Software (Malware) mean? Malicious software, commonly known as malware, is any software that brings harm to a computer system. Malware can be in the form of worms, viruses, trojans, spyware, adware and rootkits, etc., which steal protected data, delete documents or add software not approved by a user.

CISSP Intrusion-Detection Systems (IDS)

Posted by & filed under CISSP.

An IDS is designed to function as an access-control monitor. It can monitor network or host activity and record which users attempt to access specific network resources.

CompTIA A+ | Microsoft MTA O/S: ATX

Posted by & filed under CompTIA A+, MICROSOFT MTA O/S.

ATX 12V 2.x Power Supplies connect to the motherboard by way of 24-pin cable + 4-pin for CPU and 6 or 8-pin for video.     Advantages of the ATX motherboard The ATX motherboard includes advanced control facilities, where the BIOS program continually checks the CPU temperature and voltages, the cooling fans RPM, etc. If… Read more »

Cisco CCNA Basic Router Configuration

Posted by & filed under Cisco CCNA.

Cisco Basic Router configuration

Follow @ASM_Educational Here are the configuration for Basic Router Configuration   When You Open a new router you will see Router>   This is called user mode; then you type en=enable to get to enable mode Router#   This is called privilege mode

9 Cisco CCNA Router Tips

Posted by & filed under Cisco CCNA.

Cisco CCNA Router

Follow @ASM_Educational   Get our complete tutorial in PDF     To Find out if link is up and has Ip address  Router#show ip int brief  

Cisco CCNA Extended Access List

Posted by & filed under Cisco CCNA.

Cisco extended Access list

Follow @ASM_Educational Cisco CCNA-Extended access list In this Lab we will cover the concept of Extended ACL , make sure read another blogs about Standard ACL .

Cisco CCNA Video Training- DHCP Server

Posted by & filed under Cisco CCNA.

Follow @ASM_Educational In this lab we are trying to make our Cisco Router Act as a DHCP server , that is R1 will give ip address 10.10.10.0/24 to left side Pc and it will give the IP address 20.20.20.0/24 to right side of PC. The Goal is Prepare you for your Cisco CCNA Certification exam.

CompTIA A+ | Microsoft MTA O/S: RAID

Posted by & filed under CompTIA A+, MICROSOFT MTA O/S.

RAID stands for Redundant Array of Inexpensive Disks. RAID 0  is striping, RAID 1  is mirroring , RAID 5  is striping with parity, RAID 10  is mirrored sets in a striped set. [bs_icon name=”glyphicon glyphicon-arrow-right”] RAID 0  is not fault-tolerant. If RAID 1 uses two disk controllers, it is disk duplexing.        … Read more »

CompTIA A+ | Microsoft MTA O/S: Sound cards

Posted by & filed under CompTIA A+, MICROSOFT MTA O/S.

sound-card

Sound cards connect as x1 PCIe or PCI cards and normally have PC 99 color-coded 1/8” mini-jacks for I/O and speakers, and optical I/Os known as S/PDIF (example: TOSLINK).   Alternatively referred to as an audio output device, sound board, or audio card. A sound card is an expansion card or IC for producing sound… Read more »

ASM Student’s Practical Video Lab

Posted by & filed under Students Testimonials.

[bs_icon name=”glyphicon glyphicon-expand”] Here is ASM’s A+ Bootcamp Students practical video lab. They are building a brand new PC as a part of  their training program (Computer Cost is included in tuition). To Become Certified For CompTIA A+ Please Visit This Link ;          

CCNP Port Security

Posted by & filed under Cisco CCNP.

  In order to Prevent Man-In-Middle Attack we will use Port Security (for Example to secure Port f0/3)