CompTIA DataX DY0-001

Please house can we have discussion on DataX
in order to bring our memory back to what we have learn so far
abiodun1991
To Start with:
Software Libraries and Dependency Licenses
Mention three software libraries


•Automated analysis of open-source software
state five type of open source software.
abiodun1991
What is data wrangling?
looking for someone to give me be proctor for my MIcrosoft instructor exam i have the voucher just need the proctor i cant do it myself
Hello Kristen,

Would like to apply again.
Attached is my Updated resume.
Thank you

Attachments

  • Samuel Berumen English Resume - 20241030.pdf
    135.7 KB · Views: 5
Kristin Pelletier
I got it Sam! Thank you so much! I will be in touch. What is your availability? And what time zone are you in? I like the bilingual aspect too as we are in South Florida and do have spanish speaking students. Thanks
samberumen
Hello Kristin,

Hope I'm not too late but I am available all this week of the 25 of november.
Can you please use my personal email [email protected] I don't come in here everyday.
Thanks Kristin and hope to talk to you soon.
Sam
Community Goal
I hope to contribute meaningfully to the CIN by collabs, sharing insights & learning from you all. I’m passionate abt developing prgrms and inits that don't just train but empower individuals to thrive & lead in cyber & look fwd to working alongside each of you to contribute to building a stronger, more inclusive future for the cyber workforce.
My Passion & Vision (2/2)
As someone who has benefited and prospered from unique opportunities afforded to me in the past, my mission is to offer these opportunities in abundance to help bridge this gap by offering immersive, practical learning experiences that not only provide technical skills but also foster resilience, leadership, and adaptability -- key values I hold at the core of my teaching philosophy.
My Passion & Vision (1/2)
As a CIN member, I'm deeply committed to expanding access to IT and Cyber education, esp.in underserviced communities, (E.g., HBCUs); believing access to quality training, mentorship, and certifications can open new career pathways for students who have historically faced barriers in the tech field.
A Quick Intro (2/2)
I've had the privilege of working w/ high-profile orgs like ThreatConnect, FedData Systems & Exelon. I'm currently a Technical Director for the NSA & an Adj.Prof @ UMGC. My passion has also led to me starting Cy6er Consultancy LLC where I house a non-profit Cy6erForge Inc. to action my passion projects in incubating cyber talent.
A Quick Intro (1/2)
I'm excited to connect w/ this grp of dedicated professionals & share my journey/expertise/passion for teaching and advancing cybersec skills in diverse communities. With15+ YoE in the cyber field (I'm older than I look), I bring a bkgnd in compsci & cyber tech, along with extensive hands-on knowledge in digital network exploitation, threat analysis and adv. incident response.
When you click on the link to recordings from the Network+ deep dive I did in 10/2020 they no longer work. I suggest people learning basic networking to review them. That was set I did.
  • Like
Reactions: precious
Vietnam's largest enthusiast for software, ERP, CRM, SCM, WMS, BI, IT solutions, etc.
  • Like
Reactions: precious
precious
That's awesome, @TIEN TRAN It’s great to see such enthusiasm for ERP, CRM, SCM, and BI solutions. Are there any specific trends or tools in the industry that you're currently excited about? I'm always curious to learn more about innovative software solutions.
1723862001167.gif
precious
I once used SSH local forwarding when I needed to access a web application that was only available on a remote server's internal network. By setting up local forwarding, I was able to securely connect my local machine to the remote server’s localhost port and access the application as if it were running on my machine.

ssh -L 8080:localhost:80 user@remote_server
Trevor Chandler
I don't have a comment - I have a question. My question involves step 5, where key pairs are generated. Does this step always take place, even when passwords are used for authenticaton?
precious
Beautiful question @Trevor Chandler! In step 5, key pairs are generated only for public key authentication. If password authentication is used, key pair generation isn't necessary(step 4). Instead, the server verifies the password, and a session key is still negotiated to encrypt the communication. So, key pairs are used only in public key authentication, not in password-based methods.
I am in interested have 90% of CompTIA certs and been teaching since 2007.

Attachments

  • Samuel Berumen English Resume Trainer 20240812.pdf
    149 KB · Views: 3
  • Like
Reactions: precious

Filter