Word of the Day: Skullduggery (Wi-Fi Leapfroggery)

They don't even need to be in range of your network - just hacking an adjacent network is all that's needed

The Daisy Chain Attack
in many other references, they call it as the "nearest neighbor attack".


CIN Work Zone Ahead!! 🚧👷

After 8 months I finally got my password memorized, and now I'm going to have to change it? This just isn't fair!!! It's this kind of life challenge that could cause me to use a generic password - like "password". Oh well, no sense complaining. I'll just have to come up with a plan - something I'm not very good at :-(
change P@55w0rd1 into P@55w0rd2. Simple. :ROFLMAO:

CIN Sneak Peek - CloudNetX CNX-001

Dear CINners,

Due to overlapping engagements, I will be unable to attend the CIN Sneak Peek, on this coming Thursday, December 12, at 1pm CST. Is there anyone else planning to attend, whom I can trust, to take attendance in my absence? Let me know.

Thank you in advance!
I am hoping that the session will be recorded, so you should still be able to catch-up.

"Taking attendance in your absence" - have you asked AI for that? ;)

Common Exam Pitfalls and How to Overcome Them

CompTIA examinations can indeed be tough, particularly to those who are fresh. There are many students who are not good at managing time, while there are others who simply try too hard to figure out performance-based questions.

As instructors, let’s share tips to help our learners prepare effectively, control anxiety and have a go at the examination.

The first 10 questions include PBQs and the hard ones. Flag them for review, skip, then find the easier ones first.
This will help the student build their confidence and the momentum to continue on.

Got a question that you are unsure of? Or perhaps, the scenario is too long to read and comprehend. Flag it for review, then move on.
I typically advise my students not to spend a minute on 1 question alone.
There are 80+ questions with only 90 minutes or so.

Once they get to read all questions and answered the easy ones, spend the rest of the time to answer the remaining questions, and review all of their answers over and over again. They are given with the time. Use it fully.

I don't like it when students finish the exam with about an hour of time left, and they fail. Fortunately, none of my students had this experience. Co'z this means that they either rushed the exam, or they gave up. Sadly, I hear lots of stories like this.

The day before the exam, they should just relax. They have prepared for weeks or months. They now just have to trust that they are competent enough to pass. Sleep well. Eat well. In this way, their body and mind are prepared for the battle ahead.

I hope this helps.

Problem Based Question: Connect AP to Patch Panel?

Another point that I suggest talking with your class is about the cables.
The students need to be reminded of when to use a CAT5e vs CAT6 vs fiber vs coax.
In the same discussion, include conversations about straight-through cable, cross connect, or rollover / console cables.

Problem Based Question: Connect AP to Patch Panel?

Hey CIN-ners,

I took the A+ Core 1 220-1101 exam yesterday and wanted to "share" a question which I thought I was interesting. The problem based question showed an WAP and the back of a patch panel and the question was to select what cable you would use to connect the two. Looking at this question, I immediately thought to myself, "Who would connect an WAP directly to the back of the patch panel?" I saw my cable choices and went with an RJ-45 straight through to a stripped Cat 5e to punchdown in the back of the patch panel. Just wondering if the SMEs in here can shed a little light on this interesting question because if I'm teaching in my A+ class - you connect an AP to a switch and A+ is telling me otherwise..... this question could be the difference between someone passsing and failing.

Appreciate your insights, comments, etc.....

-Jason Perretta
IT Instructor (A+/Net+) Dunbar High School
Fort Myers, FL

Thanks for the query. The answer is YES, you can connect a WAP to a patch panel. This is an industry practice with structured cabling systems. The devices connect to wall ports which are connected to a patch panel. The patch panels are then linked to network devices e.g. switch, router, etc.

Here is a screenshot from a lab re: switch to copper patch panels and fiber.
I hope this helps answer the question.

1733963538705.png
  • Love
Reactions: precious

The Consequences of Being Stubborn

Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding!

Not only were you the first to respond, but you responded correctly! I mean, talk about hitting the
name squarely on the head!!!!

Tell me Gregory, what in the clue made this such a low-hanging fruit query - was the hat, or the stubborn character? :)
the hat, i guess. :ROFLMAO:

Email Attachments

When sending an email with an attachment, does anyone routinely encrypt the attachment?
If so, what do you use to peform the encryption?
Gmail uses TLS to encrypt email, and offers S/MIME for attachments.
Microsoft 365 has option for encryption, when composing an email.

Email Attachments

@Trevor Chandler

Yes, it is possible to encrypt an attachment when sending an email. Encrypting attachments ensures that only the intended recipient can access the content. Here are some common methods to encrypt email attachments:

  1. Password-Protected ZIP Files: You can compress your files into a ZIP archive and set a password. The recipient will need the password to extract the files.
    • Tools: WinRAR, 7-Zip, or built-in ZIP utilities on most operating systems.
  2. Encryption Software: Use dedicated encryption software to encrypt your files before attaching them to an email.
    • Tools: VeraCrypt, AxCrypt, or BitLocker (for Windows).
  3. Email Services with Built-in Encryption: Some email services offer built-in encryption for attachments.
    • Services: ProtonMail, Tutanota, or Gmail with third-party encryption plugins like FlowCrypt.
  4. Secure File Transfer Services: Use secure file transfer services that offer encryption.
    • Services: WeTransfer (with password protection), Dropbox (with shared link settings), or Google Drive (with link sharing settings).
  5. PGP/GPG Encryption: Use Pretty Good Privacy (PGP) or GNU Privacy Guard (GPG) to encrypt your files and emails.
    • Tools: Gpg4win (for Windows), GPG Suite (for macOS), or command-line tools for Linux.
When using any of these methods, ensure you share the decryption password or key securely with the recipient, preferably through a different communication channel.
So, the recipient isn't required to have the same encryption software to decrypt the attachment?

The Consequences of Being Stubborn

That's our own Rick Butler
Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding! Ding!

Not only were you the first to respond, but you responded correctly! I mean, talk about hitting the
name squarely on the head!!!!

Tell me Gregory, what in the clue made this such a low-hanging fruit query - was the hat, or the stubborn character? :)
  • Haha
Reactions: precious

Email Attachments

@Trevor Chandler

Yes, it is possible to encrypt an attachment when sending an email. Encrypting attachments ensures that only the intended recipient can access the content. Here are some common methods to encrypt email attachments:

  1. Password-Protected ZIP Files: You can compress your files into a ZIP archive and set a password. The recipient will need the password to extract the files.
    • Tools: WinRAR, 7-Zip, or built-in ZIP utilities on most operating systems.
  2. Encryption Software: Use dedicated encryption software to encrypt your files before attaching them to an email.
    • Tools: VeraCrypt, AxCrypt, or BitLocker (for Windows).
  3. Email Services with Built-in Encryption: Some email services offer built-in encryption for attachments.
    • Services: ProtonMail, Tutanota, or Gmail with third-party encryption plugins like FlowCrypt.
  4. Secure File Transfer Services: Use secure file transfer services that offer encryption.
    • Services: WeTransfer (with password protection), Dropbox (with shared link settings), or Google Drive (with link sharing settings).
  5. PGP/GPG Encryption: Use Pretty Good Privacy (PGP) or GNU Privacy Guard (GPG) to encrypt your files and emails.
    • Tools: Gpg4win (for Windows), GPG Suite (for macOS), or command-line tools for Linux.
When using any of these methods, ensure you share the decryption password or key securely with the recipient, preferably through a different communication channel.

Experienced Certified Trainers needed for multiple courses

We're looking for experienced trainers/mentors to join our team and teach a variety of CompTIA IT / Cyber / Cloud / PMP / CSM / Azure certification courses, including:
  • CompTIA A+
  • Network+
  • Security+
  • Cloud+
  • PenTest+
  • CySA+
  • PMP
  • CSM
  • CISSP/CISM
About Us
We are a well-established post-secondary tech training school located in Tampa, FL. Our mission is to empower students to achieve their tech career goals. With consistent cohorts throughout the year, we provide a supportive and flexible teaching environment providing consistent teaching gigs throughout the year.

What We're Looking For
  • Experienced Instructors: Prior hands on experience in the field as well as teaching, training, and mentoring experience in all of the above.
  • Certifications: Must hold current certifications in what you will be teaching.
  • Flexibility: In-person trainers are preferred, but we’re open to remote options for the right candidate and can work around your schedule as we have day and evening cohorts
  • Engaging Educators: Trainers who can inspire and guide students, ensuring strong engagement and high pass rates.
Why Join Us?
  • Flexible Scheduling: Work around your other gigs or commitments.
  • Competitive Pay: Starting at $30/hour with opportunities for increases/bonuses based on performance, student engagement, and pass rates.
  • Future Growth Opportunities: We’re expanding our course offerings in 2025 to include ITIL, Scrum, and PMP, AWS, Agile. If you’re certified in these areas, we’d love to chat!
Next Steps
If you’re interested in being part of our team or would like to learn more, please reply.

We look forward to hearing from you!
What is the duration of each course? What is the length of time for each class session? How do I reach you?
  • Like
Reactions: abiodun1991

Word of the Day: Skullduggery (Wi-Fi Leapfroggery)

How can I be sure that this video file isn't contaminated with something malicious???????
Don't worry, YouTube videos don't bite... yet! But if your antivirus starts humming along to the video, maybe call for backup 😂😂

CIN Sneak Peek - CloudNetX CNX-001

Dear CINners,

Due to overlapping engagements, I will be unable to attend the CIN Sneak Peek, on this coming Thursday, December 12, at 1pm CST. Is there anyone else planning to attend, whom I can trust, to take attendance in my absence? Let me know.

Thank you in advance!
Likely story...

Filter