Tag cybersecurity

Cloud Deployment Models

This post features different types of clouds. This post is part of the introduction to cloud computing. Virtual Private Cloud (VPC) Featured Cloud Deployment Models Cloud Deployment Models: Private Cloud: A private cloud, also known as internal or corporate cloud,…

Types of Wi-Fi Connections

Encryption algorithms: Encryption protocols: Wi-Fi security modes: Authentication options supported by WPA, WPA2 and WPA3: PSK is the use of a static fixed password or authentication. ENT enables the leveraging of and existing AAA (Authentication, Authorization and Accounting) service to…

Cybersecurity Attack Phases

According to EC-Council EC-Council identify in the CEH course 5 hacking phases: Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks According to ISACA ISACA identify 8 phases in a cybersecurity generalized attack processs: Perform reconnaissance Create attack tools Deliver malicious…

ISACA Cybersecurity Nexus

Cybersecurity Nexus (CSX) is a training and credentialing program related to cybersecurity and develop by the professional association ISACA. It consists of a series of certificates: CSX Fundamentals (CSX-F) Certificate CSX Foundations Certificate, is awarded automatically when the candidate achieves:…