Two project certifications - 20 years apart

I passed the CompTIA IT Project+ exam in September 2003. It was good for life, so I did not re-certify after it was renamed Project+.

Due to an employer requirement, I took (and passed) the Project+ PK0-005 exam today.

It's still hard for me to believe that it's been 20 years between those two certifications. I've really enjoyed my professional relationship with CompTIA.

Building a Cyber Program: Risk Assessment vs. Cyber Frameworks

So here 's a question that came up in my head and one that I suggested to Bjoern after the session today. Worth some noodling...

When building a cyber program do you:

A) Get a framework? - Most times, people don't know what they don't know and they end up going out to the internet to grab some kind of checklist to "cover the bases" with respect to network security. Frameworks like NIST 800-53 and 800-171 as its checklist are great because they'll cover everything.

But a framework has the tendency for those who use one to cover more than we need. Do we pick and choose which parts to use? Can we say that we used the NIST framework if we only use a part of it? Going through a framework can create a lot of documentation that no one will ever read.

(kinda like all the documentation we write, but alas)

B) Perform a Risk Assessment? - The risk assessment is the way an organization can tailor its cyber program to meet its specific needs. An organization can walk through all its assets and services and define priorities.

However, I've always seen two things when doing a risk assessment. One, the defining the risk tends to get subjective. We can put impact to a cost scale, but probability is a little more nebulous. Say you have two incidents on a risk in year 1, none in year 2, and none in year 3. High risk? Medium risk? Or do we define it ourselves in a subjective kind of way. Sure that brings in the idea of risk appetite, so its different for everyone. The other thing I see in risk assessment is making sure we've identified everything. Seems like that's an ongoing process, like one day, you're walking by an office and notice an IoT device that's been there for an age, but we forgot about it in risk planning.

So, what do you think about this? Chime in and let's see what you think.

/r

UPDATE: I might have also wrote the question a little badly - the question isn't whether we do those things - it's the approach you take first in doing a cyber program build. Some will go with the Framework first, which prescribes a risk assessment, the other will do the risk assessment first which prescribes a framework. ..

Finally, Comptia Pentest+

After an onsite bootcamp, out of curiosity, I decided to prepare for and take the Comptia Pentest+.
Mixed reactions from the result, although a very narrow win. Not sure whether to celebrate or go back and dig deeper.
Here we go guys, Comptia Pentest+

Attachments

  • Pentest.JPG
    Pentest.JPG
    76.7 KB · Views: 31

VOUCHER CTT + DISCOUNT

Hello everyone, I hope you are well.
I am preparing for my CompTIA CCT+ before the exam is withdrawn.
I would also like others to also have the chance to take this exam at a reduced price. The voucher is official from the CompTIA store

CTT+ Voucher CompTIA CTT+ (TK0-201) Essentials Voucher 230$
CTT+ Voucher CompTIA CTT+ (TK0-202) Classroom Trainer 250$
CTT+ Voucher CompTIA CTT+ (TK0-203) Virtual Classroom Trainer 250$

[email protected]

Discount limited

Project+ Vouchers Gone Out - Inflate my Ego

Okay, CIN - Looks like those Project+ vouchers have gone out to those of you that were on for my Proj+ TTT! Good luck to all of you!

Now, in a shameless post, you get to inflate my ego. This is the part where we find out if the TTT was helpful/instrumental in getting you to that shiny Project+ cert. So if you pass, post it here! If I did something really right, let me know.

And if you don't get it, it's okay! Keep at it - I'll help if you need it, meanwhile, if there was something about my training that wasn't so good, please tell me that, right here publicly, even. No instructor can improve if he does everything right, yeah? And I love to improve myself too. Or as a verse from the Good Book says, "As iron sharpens iron...". This is how we make CIN instructors the best ones out there. So, bring your eggs and tomatoes - I can handle it.

It was a pleasure having all of you on for the TTT and I sincerely wish you good luck as you all start certifying!

/r

Seeking a CYSA+ Instructor

Hi Guys,
We are a CompTIA learning partner.
We are looking for an instructor for the following class:
  • CYSA+
  • 5-day class.
  • June 26-30, 2023.
  • Start time 7:00AM (Hawaii) = GMT -10.
Experience in the CYSA+ course is a must.
We’ll use “Integrated” materials - so you’ll need to be conversant with this format.
Fluent in English language is required.
If you can do this class, and are available, please message me/us ASAP.
Thanks!
Rie

CompTIA Extends A+ Brand to Launch More Careers in Technology

CompTIA Extends A+ Brand to Launch More Careers in Technology​

May 23, 2023
DOWNERS GROVE, Ill. CompTIA, the world’s leading certifying body in information technology (IT), today announced plans to expand its CompTIA A+ brand, adding a new suite of introductory resources to prepare aspiring tech professionals for on-the-job success.

The CompTIA A+ underscore (_) technical learning and certificate programs is a series of modular programs that will offer learners greater flexibility to build the depth and breadth of their skills, while expanding accessibility to encourage more people to explore tech career pathway options. The CompTIA A+_ series centers around key knowledge domains and in-demand job roles, including the following areas:


CompTIA A+_cyberCompTIA A+_server
CompTIA A+_networkCompTIA A+_data
CompTIA A+_cloudCompTIA A+_coding



I'm getting disillusioned

Recently, I was on a CompTIA-related message board, and I noticed a disturbing trend. Most people posting were directly asking which multiple-choice questions other testers had on their exams and what PBQs they had. I was under the impression that sharing that information violated CompTIA's NDA. When I brought it up, I was met with derision and mockery.

There were also a lot of posts recommending 16-hour free video series and questionable practice exams. When I suggested taking a class, using CertMaster resources, or getting a decent book from Amazon, I was again met with mockery and ridicule.

There seemed to be a pervasive culture of encouraging cutting corners and taking shortcuts to "check the box" to get a cert and a tech career. They seemed to be mostly younger people with no experience whatsoever. It felt like a bunch of high school kids trying to share secrets on how to scam the system. None of them wanted to hear from an old geezer like me who told them they needed to study hard to have practical applied knowledge of the information and not just memorize and exam cram. My suggestions fell on deaf ears.

Does what we do as trainers really matter? Even in my 20+ years of being a trainer, I've encountered the occasional student (or class) who didn't care about learning as they did about "checking the box." I know I can't make people want to learn, but it's challenging to help them when they have a poor work ethic and attitude. There will always be people who try to cheat the system to get a certification that, quite frankly, they don't deserve. Even if they get certified and get past the recruiters and hiring managers, they'll struggle to perform the most basic tasks because they took the easy way out. Employers will see them struggle and start to believe the certifications have little value in the real world.

Maybe I'm just an idealist, but I strongly believe that certifications, or any education for that matter, have incredible value. They show that a person has a baseline mastery of a topic; for years, I've been preaching that the A+/Network+/Security+ trifecta should be the baseline level of certification for any tech job. Those three certifications are the broadest, foundational knowledge areas to cover how things work and basic troubleshooting. From there, a person can pivot into numerous different specialty areas.

Why do we do it? Why do we choose to be technical trainers? Does anyone care any more?

CySA+ CS1-003 beta results coming in.

Happened to be looking at my CompTIA/Pearson account today and decided to peek at the status of the CySA+ beta I took in December. I saw the words "Status: Pass". (?) Looked for it under score reports to verify and it's true.

I haven't received an official email yet and it's not appearing in my CertMetrics account, but... if you took it, your report might be in.

The Honeypot Strategy: Cybersecurity Defenders vs. Crypto Scammers

In the fascinating world of cybersecurity and crypto, there exists a crafty mechanism known as the honeypot. Interestingly, both cybersecurity experts and crypto scammers have found utility in this deceptive tool, albeit for entirely different purposes.

For cybersecurity professionals, a honeypot serves as a clever trap designed to safeguard computer systems from malicious hackers. The concept is rather ingenious. A honeypot program disguises itself as a tempting target—an alluring file, software, or server with an apparent security flaw. Its purpose is to divert the attention of potential attackers away from genuine targets while providing valuable insights into their tactics and behaviors. By collecting data on these attackers, cybersecurity experts gain valuable knowledge that can be used to enhance future protection measures.

However, the effectiveness of a honeypot hinges on its ability to convincingly masquerade as the real thing. If the deception falls short and the attacker detects the ruse, the entire endeavor can be compromised. The success of a honeypot relies on its capability to deceive and outwit the attackers.

Now, in the realm of blockchain technology, we encounter another application of the honeypot strategy. Here, the objective is to lure potential attackers into focusing their efforts on supposedly "vulnerable" smart contracts or nodes. By doing so, these honeypots divert attention away from less obvious weaknesses within the network structure that could pose a genuine threat to the blockchain or decentralized app. When an attacker falls into the trap, their actions are carefully tracked, and any malicious activity is promptly blocked. This proactive honeypot strategy acts as a protective shield for the blockchain, detecting attackers and tracing their tactics.

However, in the darker corners of the crypto world, a different breed of individuals harnesses the power of honeypot techniques for far less noble purposes. Enter the crypto scammers. Rather than seeking out vulnerable smart contracts, these scammers create their own, meticulously engineered to exploit the vulnerabilities of cryptocurrency holders who are enticed by the promise of swift and effortless profits.

The modus operandi of these scammers involves the use of smart contracts deliberately riddled with obvious vulnerabilities. This setup allows them to exploit unsuspecting victims for substantial gains. Here's the catch: the victim is required to pay a percentage fee as part of the supposed "reward" for accessing this profitable opportunity. Little do they realize that this fee simply facilitates an automated transfer of the victim's funds straight into the scammer's wallet.

In essence, the victim is drawn in by the prospect of financial gain, blissfully unaware of the intricate layers of complexity woven into the scheme. The scammers prey on the naivety and greed of their victims, capitalizing on their desperation for quick profits.

Allow me to illustrate this with a simple yet all too common example of such a trap. Imagine stumbling upon a forum or social network where an individual, posing as an innocent and clueless crypto enthusiast, seeks assistance from others in transferring their SHIB tokens worth $6,000 to an exchange. They offer a small reward for this aid and, cunningly, publicize their private key. Unsuspecting users, failing to recognize the deception, fall prey to the apparent "naiveté" and decide to transfer funds to the provided address.

Soon, however, they encounter an unexpected hurdle. A transaction fee must be paid in ETH, deliberately chosen by the scammers to inflate the commission. Acting impulsively, victims transfer small amounts to the scammer's wallet in their quest to withdraw a more substantial sum. Regrettably, the funds never materialize in their intended destination. Instead, they promptly vanish, siphoned away through a specialized smart contract into the pockets of the mastermind behind the scheme. In other words, the victim finds themselves unable to retrieve the hypothetical $6,000 they were enticed by.

In their pursuit of acquiring someone else's hard-earned savings, the victim unknowingly falls into the trap and pays a steep price for their own greed. It is a stark reminder that in the world of crypto, one must exercise caution and critical thinking at every turn.

These honeypot tactics employed by crypto scammers highlight the importance of educating oneself about the intricacies of the crypto landscape. Vigilance and skepticism are key to avoiding such traps. It is crucial to thoroughly research any investment opportunity, scrutinize the credibility of the individuals involved, and remain cautious of enticing promises that seem too good to be true.

Moreover, maintaining the security of one's private keys and personal information is paramount. Sharing sensitive details publicly or with unverified individuals is an invitation for exploitation. It is essential to practice good cyber hygiene, including using secure wallets, enabling two-factor authentication, and staying updated on the latest security practices.

While honeypots have found a place in the arsenals of both cybersecurity experts and crypto scammers, their motivations and consequences couldn't be more different. In the hands of cybersecurity professionals, honeypots serve as valuable tools to gather intelligence and enhance defenses. On the other hand, crypto scammers manipulate these techniques to prey upon the unsuspecting and exploit their vulnerabilities for personal gain.

CompTIA, as an industry-leading IT certification organization, provides certifications and resources that cover a wide range of topics and strategies related to information security. While CompTIA doesn't have specific certifications or resources solely focused on honeypots, they do cover related topics in their cybersecurity certifications. When it comes to the honeypot strategy, which involves setting up decoy systems to attract and deceive potential attackers, CompTIA can take several actions to support and educate professionals in this area.

Firstly, CompTIA can develop educational resources and training programs to raise awareness about honeypots and their role in cybersecurity. These resources would provide guidance on the setup, management, and monitoring of honeypot systems, ensuring professionals have the necessary knowledge to implement this strategy effectively.

Furthermore, CompTIA can incorporate honeypot-related topics into their cybersecurity certification programs. By including specific modules or certifications dedicated to honeypots, professionals can gain recognition for their expertise in implementing and utilizing this strategy. This would encourage individuals to develop specialized skills and demonstrate their proficiency in honeypot deployment.

CompTIA can also publish best practice guidelines for implementing and maintaining honeypots. These guidelines would cover aspects such as deployment strategies, network segregation, data protection, and legal considerations. By providing comprehensive guidelines, CompTIA ensures that professionals have access to the necessary information to deploy and manage honeypots ethically and responsibly.

In addition, CompTIA can foster collaboration among industry experts, researchers, and practitioners to advance the understanding and development of honeypot technologies. This could involve facilitating knowledge sharing, organizing research initiatives, and creating platforms for discussion and collaboration. By doing so, CompTIA contributes to the improvement and innovation of honeypot strategies.

CompTIA can also engage in advocacy efforts to promote the use of honeypots as a proactive cybersecurity measure. This may involve advocating for supportive policies and regulations that encourage organizations to adopt honeypot strategies. Additionally, CompTIA can provide guidance on legal and ethical considerations to ensure that honeypots are used appropriately and within the bounds of the law.

Furthermore, CompTIA can develop industry-specific guidance on the implementation of honeypots. Different sectors may have unique considerations and requirements when deploying honeypots. By providing tailored advice and recommendations, CompTIA ensures that professionals in various industries can effectively implement honeypots to enhance their cybersecurity defenses.

By taking these actions, CompTIA can contribute to the wider adoption and effective utilization of honeypot strategies. This, in turn, strengthens cybersecurity defenses and acts as a deterrent to potential attackers. As the field of cybersecurity continues to evolve, it is important for professionals to stay updated with the latest trends and research, ensuring they have a comprehensive understanding of honeypots and their implementation in real-world scenarios.

As the crypto landscape continues to evolve, it is imperative for individuals to remain informed, exercise caution, and adopt responsible practices. By doing so, we can collectively contribute to a safer and more secure environment for all participants in the crypto ecosystem.

Filter