Tech+ exam

I'm helping a client develop some training materials for the Tech+ course, so I took and passed the exam to see what the questions would be like.

I only had 60 questions, with no PBQs. It was the shortest CompTIA certification exam I've taken in 25 years. Mostly, it consisted of understanding the vocabulary terms and being able to pick information from an example. In my opinion, it was much easier than the previous IT Fundamentals+ certification that preceded it.

It provides the learning with very basic digital literacy but the exam is very surface-oriented. It does not go deep on any topic at all.

  • Question
Are there any answers to such web server behavior?

I frequently use tools like ffuf to illustrate fuzzing to my students.

Using the following command, for instance:

bash
┌──(kali㉿localhost)-[~]└─$ffuf -w wordlist.txt -u http://mydomaintarget.org/FUZZ

Files like backup.sql, graphql.txt, config.json, and other possibly sensitive files may be discovered in this way.

To confirm their presence, we employ:
┌──(kali㉿localhost)-[~]└─$curl -I http://mydomaintarget.org/backup.sql on mydomaintarget.org

The server replies with an HTTP 200 status if the file is present. When we try to download the file, though: backup.sql using

bash
┌──(kali㉿localhost)-[~]└─$curl -o http://mydomaintarget.org/backup.sql on mydomaintarget.org

The output is a JavaScript obfuscated code rather than the anticipated content.
Are there any explainations to such behavior?

The Internet Underworld

The dark web is a flourishing economic juggernaut - the world’s third-largest economy!!!
Yeah, the world's third largest!!!!

To shield businesses, and public organizations alike, from trouble, defenders must familiarize
themselves with the people, commodities, services and transactions that shape it.

No use in burying your head in the ground, cause these rats ain't goin' away!!! So, watcha
gonna do? Who you gonna call????
  • Love
Reactions: precious

State of the Dark Web 2025

Do you want to be cyber crooks at their own game?

Do you know what tools you need to guard your hen house - some are larger than
others, and require a different set of tools :)

I'm still prepping for my journey to the Dark Web!

The dark web isn't just a shadowy corner of the Internet!! It's a THRIVING marketplace
that's driving cybercrime on a massive scale.

Threat actors, armed with advanced AI, and ever-evolving tactics, are pushing businesses,
as well as public institutions, to their limits! Well! Well! Well! The bad guys are not only
using AI, but advanced AI!!!

Do you know:
- who the key players on the dark web
- the key marketplaces on the dark web
- how AI is boosting cybercriminal tactics
- strategies for monitoring dark web threats
- strategies for mitigating - yeah mitigating, cause you ain't gonna prevent - dark web threats
- the importance of threat intelligence for cybersecurity

What are you doing to ensure that cyber crooks don't get ahead of you - or is too late,
they're already way out in front!!!
  • Love
Reactions: precious

Non-volatile memory express (NVMe)

Non-volatile memory express (NVMe) -
A communications protocol developed specifically for all-flash storage,

NVMe enables faster performance and greater density compared to legacy protocols.
It’s geared for enterprise workloads that require top performance.


Is NVME covered in any CompTIA course? Is so, which one(s)?


Thanks CINners!
  • Love
Reactions: precious

CompTIA bolsters penetration testing certification

CompTIA bolsters penetration testing certification​


Very nice article published on networkworld.com. Very timely as well!!!

  • Love
Reactions: precious

BYOD vs Cybersecurity Policies

Can BYOD policies be compatible with good cybersecurity? It depends!!!!!
Oh, my bad: BYOD (Bring Yo Own Device)

The rise of remote work has brought a flood of BYO-devices, whether they’re
company-approved or just sneak in.

The question is: should IT and security pros embrace BYOD or try to ban it?

The answer depends on a wide range of factors!! One thing is for certain,
whichever policy you choose, you must be able to enforce it. The inmates
MUST NOT be allowed to run the place of confinement!!!
  • Love
Reactions: precious

Occam's Razor: Simplifying the Complex

As data professionals, we often deal with massive datasets and complex models.
Occam's Razor: The simplest explanation is often the best.

In data analysis and decision-making this means:
  • Simpler Models: A straightforward model that's easy to interpret often performs just as well as (or better than) an overly complex one.
  • Data Cleaning: Removing unnecessary variables can uncover clearer insights and reduce noise.
  • Decision-Making: Avoid over complicating processes by focusing on essential, actionable data.
Consider that you are analyzing network traffic for potential anomalies. A basic pattern recognition model may be more effective and efficient than a complex, resource-heavy AI system, especially when speed and clarity are crucial.

How do you apply Occam's Razor in your approach to data modeling, or analysis?

Zero Trust

Zero Trust Fundamentals:
- effective against insider threats
- effective against lateral movement
- effective against cloud vulnerabilities

Zero Trust Key Components
- identity verification
- continuous monitoring
- network segmentation



How does a company go about assessing is current security posture?


What are some of the ways to go about securing endpoints?
  • Love
Reactions: precious

Passkeys - What are they?

Passkeys? Is this covered in any Cybersecurity-focused CompTIA course?
If so, which one(s)?


A passkey is a sort of digital identification, that's interlocked to any individual's account, on a given
app or website. That may sound a little like a password, but not quite - there's an important distinction.
Passkeys are bilateral authentication, that have two separate components: a private key, and a public key.
The private key is stored locally on the user's device (computer, phone, etc.). When logging in with a
passkey, the public and private key pair give a user access to his/her account.

Here's where is gets good: Passkeys are more secure than traditional passwords!!!

Passkeys are more secure because they are never stored on any server, and instead reside as an encrypted
key on the user's personal device. And, like passwords, they can be paired to biometrics, like facial recognition
or fingerprint authentication, to initiate the login process. Even if a hacker got were able to get an individual's
device, they’d need the biometrics associated with that individual, to access any accounts, which is significantly
harder than brute forcing a poor-quality traditional password - you know, like "Password1234".

A passkey is a locally stored, system-generated cryptographic key.

Passkeys are completely unique. Almost sounds like a hash!

Passkeys are infinitely more difficult for nefarious actors to exploit.

This is a biggie: Passkeys are phishing-resistant!!!!!!!
Again, what's the #1 attack vector? Ah, you remembered: PHISHING!!!!

Don't I have anything to say about passwords? Yes - passwords are susceptible to breaches and hacks :-(



The END!
  • Love
Reactions: precious

What prevents our students from completing their goals

Many things can prevent our students from completing their goals, including:
• Fear: Fear of failure can paralyze them, while fear of success can lead to self-sabotage.
• Lack of clarity: They might not know what they want to achieve or why they're doing it.
• Procrastination: Putting off their goal or waiting to take action.
• Lack of support: They might not have the support they need to achieve their goals.
• Negative thoughts: Doubting their abilities. Negative emotions like fear of criticism.
• Not prioritizing it: Not prioritizing their goal in their schedule.
• Underestimating the difficulty: Not realizing how hard it will be to achieve their goal.
• Giving up too soon. Quitting. Giving up before they see results.
• Not anticipating problems: They might not plan or anticipate their challenges.
• Focusing on the reward: They might focus on getting a reward instead of putting in the effort.
As instructors, we must help students overcome these obstacles and complete their goals.

  • Question
Free or reduced resources for Title 1 Schools

Hello,

I'm a retired federal IT professional and a part-time High School Cybersecurity and Computer Science teacher. I served in government for 33 years, and this is my fourth year of teaching high school. I passed the Tech+ Exam yesterday, after spending last week studying the 727 page guide from Comptia. Now I'm tasked with trying to get some of my students to do the same. I teach at Woodlawn HS in Baton Rouge, LA. It is a Title 1, urban school that has at risk kids. I may also get involved with helping teachers who do not have a background in IT with passing the Tech+ exam. Next school year, LA is implementing a K-12 Computer Science curriculum. Tech+ is one of the three certifications that will be made available for high school students. The others are Python Programming and Web Development. Does Comptia have a program that can provide assistance to schools in underserved and underrepresented areas.

Thx

Frank Kidd

Filter