Boolean Math using NOT logic

Boolean Math (NOT Logic) – CISSP Domain 3

Hello everyone.  We’ve got another Boolean math session lined up for you today.  This time we’re going to take a quick look at the NOT logic and examine how this one differs from the other operations. To review, Boolean math is based on a binary system where only two values ... Read More
Boolean Math using XOR Logic

Boolean Math (XOR Logic) – CISSP Domain 3

Hello everyone.  We’ve got another Boolean math session to look over today.  Our focus this time will be on the XOR logic.  The XOR stands for exclusive OR, and we will go over the details of what that means in just a moment. For those who are less familiar with ... Read More
Introduction to Boolean Math, the OR Logic

Boolean Math (OR Logic) – CISSP Domain 3

Today we are going to take another look at some Boolean mathematics.  In particular, we’re going to focus on the OR operational logic, as covered in Domain 3 of the CISSP common body of knowledge (CBK).  As a brief recap, Boolean math is based on a binary system.  As such, ... Read More
Introduction to Boolean Math, the AND logic

Boolean Math (AND Logic) – CISSP Domain 3

Today we’re going to take a quick look at the AND Boolean logic, which is covered in Domain 3 of the CISSP common body of knowledge (CBK).  To begin with, Boolean math is used to define the rules on how computer systems evaluate data. Because Boolean is based on a ... Read More
Professionally Evil Fundamentals - Encryption

Encryption – CISSP Domain 3

We’re circling back to some more CISSP-related materials. Today’s topic will be encryption, which can be found in CISSP Domain 3. By its very nature, encryption is meant to hide the meaning or intent of a communication from unintended recipients. This process takes place when a message is converted from ... Read More
Professionally Evil Fundamentals Encoding

Encoding – CISSP Domain 3

Today we’re going to take a quick look at encoding, as covered in Domain 3 of the CISSP common body of knowledge (CBK). There is often some confusion between encoding and encryption, so one of the purposes of this article is to look at how the CBK defines encoding. Encoding ... Read More
Hashing functions

Hashing Functions – CISSP Domain 3

Today we’re going to take a quick look at hashing functions, as covered in Domain 3 of the CISSP common body of knowledge (CBK). There is often some confusion between hashing, encryption, and encoding, so one of the purposes of this article is to help differentiate between them. To start ... Read More

My Experience in the CISSP Mentorship Program

A little while back, I was talking with a friend of mine about the different services that Secure Ideas offered, and one of the topics that came up was training and certifications. Since I just finished taking the CISSP Mentorship class, and it was the first thing that came to ... Read More
File Encryption Using VHD and BitLocker

File Encryption Using VHD and BitLocker

When I was thinking of topics to write about, the idea of protecting the data we work with came to mind. There’s always some sort of data that we want to keep safe such as, personal information, customer data, super-secret-squirrel project files…and the list goes on. For example, when working ... Read More
Cracking WPA Pre Shared Keys

Cracking WPA Pre Shared Keys

Cracking WPA Pre Shared Keys This is intended to be part 2 of a previous blog (Intro to Wireless Security), which was designed to introduce people to the realm of wireless security testing. One of the best ways I’ve found to learn about something new is to walk through various ... Read More