I got it Sam! Thank you so much! I will be in touch. What is your availability? And what time zone are you in? I like the bilingual aspect too as we are in South Florida and do have spanish speaking students. Thanks
Hope I'm not too late but I am available all this week of the 25 of november.
Can you please use my personal email [email protected] I don't come in here everyday.
Thanks Kristin and hope to talk to you soon.
Sam
Community Goal
I hope to contribute meaningfully to the CIN by collabs, sharing insights & learning from you all. I’m passionate abt developing prgrms and inits that don't just train but empower individuals to thrive & lead in cyber & look fwd to working alongside each of you to contribute to building a stronger, more inclusive future for the cyber workforce.
My Passion & Vision (2/2)
As someone who has benefited and prospered from unique opportunities afforded to me in the past, my mission is to offer these opportunities in abundance to help bridge this gap by offering immersive, practical learning experiences that not only provide technical skills but also foster resilience, leadership, and adaptability -- key values I hold at the core of my teaching philosophy.
My Passion & Vision (1/2)
As a CIN member, I'm deeply committed to expanding access to IT and Cyber education, esp.in underserviced communities, (E.g., HBCUs); believing access to quality training, mentorship, and certifications can open new career pathways for students who have historically faced barriers in the tech field.
A Quick Intro (2/2)
I've had the privilege of working w/ high-profile orgs like ThreatConnect, FedData Systems & Exelon. I'm currently a Technical Director for the NSA & an Adj.Prof @ UMGC. My passion has also led to me starting Cy6er Consultancy LLC where I house a non-profit Cy6erForge Inc. to action my passion projects in incubating cyber talent.
A Quick Intro (1/2)
I'm excited to connect w/ this grp of dedicated professionals & share my journey/expertise/passion for teaching and advancing cybersec skills in diverse communities. With15+ YoE in the cyber field (I'm older than I look), I bring a bkgnd in compsci & cyber tech, along with extensive hands-on knowledge in digital network exploitation, threat analysis and adv. incident response.
When you click on the link to recordings from the Network+ deep dive I did in 10/2020 they no longer work. I suggest people learning basic networking to review them. That was set I did.
I've just finalised a Conference paper to be presented at the Computing and Information Technology Research and Education New Zealand confrerence next week. It is on the value of IT certifications in a High School setting. Read it here (https://doi.org/10.34074/ctz.245) (this will be live soon, once the conference organisers activate the DOI)
That's awesome, @TIEN TRAN It’s great to see such enthusiasm for ERP, CRM, SCM, and BI solutions. Are there any specific trends or tools in the industry that you're currently excited about? I'm always curious to learn more about innovative software solutions.
I once used SSH local forwarding when I needed to access a web application that was only available on a remote server's internal network. By setting up local forwarding, I was able to securely connect my local machine to the remote server’s localhost port and access the application as if it were running on my machine.
I don't have a comment - I have a question. My question involves step 5, where key pairs are generated. Does this step always take place, even when passwords are used for authenticaton?
Beautiful question @Trevor Chandler! In step 5, key pairs are generated only for public key authentication. If password authentication is used, key pair generation isn't necessary(step 4). Instead, the server verifies the password, and a session key is still negotiated to encrypt the communication. So, key pairs are used only in public key authentication, not in password-based methods.
thank you Stephen Schneiter for your support AND THE Voucher I got the network+ N10-009
PASSED THE EXAM 723 WITH PASS 720 MARK. With 5 PBQs in the exam I thought the was not easy at all . BUT I PASSED IT. PETER HANWITH-HORDEN
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Software Libraries and Dependency Licenses
Mention three software libraries
•Automated analysis of open-source software
state five type of open source software.