On steering students' learning

The topics I had on my exam are completely irrelevant to the topics you get on your exam.
Theoretically true, but despite that I've certainly noticed a preference for specific topics when I retook an exam multiple times... And person B felt we can tell students about this... and I really don't.

Top Cyber Attacks in 2024???

Ransomware attacks remain one of the most prominent and damaging types of cyberattacks today. And we expect more of them in 2025.

For a detailed deconstruction and insightful analysis, I would recommend watching a conversation between Kirsty Paine — Splunk EMEA Strategic Advisor in Technology & Innovation and Kendall McKay — Cisco Cyber Threat Intelligence. Specializing in threat detection and with insights from Cisco Talos and David Bambol, these two tackle the latest trends, threats, and tactics related to cyber risk management.

You can watch their fascinating chat regarding cyberthreats and attacks.
Are You ready for these 2025 threats?
This is terrific. Thanks Previous!!!!
  • Love
Reactions: precious

Use of VPN when using Windows

Indeed Windows OS can have privacy and security issues, such as data collecting or vulnerabilities, but I've never utilized a VPN on my home internet connection, though it's making sense to. Additional encryption provided by a VPN guards against hackers, third-party tracking, and even helps get around geo-restrictions on region-locked material.
Thanks Previous for your response!
  • Love
Reactions: precious

Use of VPN when using Windows

Hello CINners,

I can see why I'd want to use a VPN when I'm away from home.
However, I ain't thinking about using a VPN when I am at home.

Is there anyone in the community that uses a VPN, when on their
home Internet connection - simply because the OS on the computer
is Windows?
Indeed Windows OS can have privacy and security issues, such as data collecting or vulnerabilities, but I've never utilized a VPN on my home internet connection, though it's making sense to. Additional encryption provided by a VPN guards against hackers, third-party tracking, and even helps get around geo-restrictions on region-locked material.

Top Cyber Attacks in 2024???

Hello Ryan,

The phrasing of my question was not the best - my apologies!
I intended to ask the "types" of cyber attacks that are the top 8.

Thanks Ryan for helping me along!!!
Ransomware attacks remain one of the most prominent and damaging types of cyberattacks today. And we expect more of them in 2025.

For a detailed deconstruction and insightful analysis, I would recommend watching a conversation between Kirsty Paine — Splunk EMEA Strategic Advisor in Technology & Innovation and Kendall McKay — Cisco Cyber Threat Intelligence. Specializing in threat detection and with insights from Cisco Talos and David Bambol, these two tackle the latest trends, threats, and tactics related to cyber risk management.

You can watch their fascinating chat regarding cyberthreats and attacks.
Are You ready for these 2025 threats?

Top Cyber Attacks in 2024???

Hi Trevor.

Are you referring to the individual attacks themselves (e.g. MOVEit breach that affected 77 million records and caused around $12B in damages) or the top vulnerabilities/exploits?
Hello Ryan,

The phrasing of my question was not the best - my apologies!
I intended to ask the "types" of cyber attacks that are the top 8.

Thanks Ryan for helping me along!!!
  • Like
Reactions: precious

CompTIA Restructure

Earlier, Educate 360 bought out the entire New Horizons Computer Learning Centers corporate office and corporate locations, discarding all franchise locations.
Yep, I worked in the Puerto Rico center and as soon as the transaction passed we were out of a job.....
  • Wow
Reactions: Tess Sluijter

On steering students' learning

Person A is asking "based on exams you have taken before, which topics take priority?". They are basically asking me to point out the specific topics which I know appear a lot on the exam. Which I feel is off-limits.
If the objectives are published by CompTIA, tell them to go read them. That's what I always do.....

CompTIA Restructure

Admittedly the silence is deafening. This transaction, along with the decision by ACI to close its Gainesville video production center (the former ITPro.TV operation), and the recent shrinking of Leo Laporte's TWIT.TV operation to an attic studio in his Petaluma house has me wondering where things are heading.
Earlier, Educate 360 bought out the entire New Horizons Computer Learning Centers corporate office and corporate locations, discarding all franchise locations.

It was the largest international computer training center, and now it's a shell of it's former self.

CompTIA Restructure

Admittedly the silence is deafening. This transaction, along with the decision by ACI to close its Gainesville video production center (the former ITPro.TV operation), and the recent shrinking of Leo Laporte's TWIT.TV operation to an attic studio in his Petaluma house has me wondering where things are heading.

Dark Web Visit

It's a resource for threat intelligence and discovering if your data has been leaked in a breach. If that's not your thing, it's all good. Plenty of different roles and responsibilities in cybersecurity and IT.

It's a resource for threat intelligence and discovering if your data has been leaked in a breach. If that's not your thing, it's all good. Plenty of different roles and responsibilities in cybersecurity and IT.
Thank you Gregory! Very insightful comments!!!
  • Like
Reactions: precious

CompTIA Restructure

I have to believe that if the leadership went forward with this move, that it has to be a good move, if not a great one, for CompTIA.

Until the deal goes through and we see what changes the new ownership group implements, this is all speculation. It could remain the same, get better, or get worse. We just don't know.

Filter