What are tagged and untagged ports?

| | General Security
Introduction Back in the old days, there were no such things as managed switches. Instead, modern Ethernet connections were handled by simple devices called hubs. There were many older standards that... Go on to the site to read the full article ... Read More

5 legitimate tools commonly used for malicious purposes

| | General Security
Introduction It should come as no surprise that there is quite a lot of malicious activity that can be accomplished with seemingly harmless tools. You could make the analogy of a workshop tool, such... Go on to the site to read the full article ... Read More

Transitioning from DevOps to DevSecOps

| | General Security
Introduction DevOps is essentially the combination of software development and IT operations, and it is found in many enterprise environments. DevOps initially started as a process that fostered an... Go on to the site to read the full article ... Read More

CySA+ domain #8: Incident response process

Introduction CompTIA has identified a need in the market for cybersecurity professionals that want to certify their knowledge and earn a cybersecurity analyst qualification. The CySA+ certification... Go on to the site to read the full article ... Read More

CySA+ domain #10: Digital forensic tools and investigation techniques

Introduction As is the case with all CompTIA certifications, the CySA+ is a vendor-neutral exam. It is aimed at the intermediate cybersecurity professional. There are no real prerequisites for the... Go on to the site to read the full article ... Read More

CySA+ domain #9: Analyzing common symptoms

Introduction Trying to secure a network without the right skills and tools is not possible, especially when you’re dealing with cybercriminals that make a living from breaching networks and... Go on to the site to read the full article ... Read More

Cybersecurity analyst interview questions and answers

Introduction Cybersecurity analysts are a highly sought-after type of information security specialist that help to analyze and interpret the current security stance of an organization. They are... Go on to the site to read the full article ... Read More

Cybersecurity engineer interview questions and answers

Introduction Sitting down in a room full of strangers under stressful conditions isn’t anyone’s idea of a good time. Very few people enjoy job interviews because of the pressure and formal atmosphere... Go on to the site to read the full article ... Read More

Cybersecurity engineer job description

Introduction We often hear about cybersecurity engineer roles and how desirable it is to work as one, but what does the position actually entail? What are the job responsibilities and functions that... Go on to the site to read the full article ... Read More

Don’t let recruiters hold you back from the IT job of your dreams

Introduction Finding the right cybersecurity job is difficult. It requires the right balance between certification and experience. Sometimes you have the skills, certification and experience for a... Go on to the site to read the full article ... Read More