• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

Need for Linux+, Cloud+, DataSys+, DataX Instructors

Online Live training, daytime and evening. Onsite training on occasion per group requests. Must hold current exam version of the certifications. Please contact me if interested and kindly provide your resume. Thank you!


Liz Pernaselci
Director of Operations
Applied Technology Academy
[email protected]

Non-volatile memory express (NVMe)

Non-volatile memory express (NVMe) -
A communications protocol developed specifically for all-flash storage,

NVMe enables faster performance and greater density compared to legacy protocols.
It’s geared for enterprise workloads that require top performance.


Is NVME covered in any CompTIA course? Is so, which one(s)?


Thanks CINners!
  • Love
Reactions: precious

CompTIA bolsters penetration testing certification

CompTIA bolsters penetration testing certification​


Very nice article published on networkworld.com. Very timely as well!!!

  • Love
Reactions: precious

Upcoming SME Workshops

Upcoming SME Workshops

CompTIA has a number of upcoming workshops. Whether you've been a SME with us for some time or are thinking about joining as one of our SMEs, we encourage all of you who can to sign up and join us! It's the knowledge and creativity of IT professionals that help us develop and maintain the quality of our certification exams.

We are currently recruiting for the following workshops:

January 13 - 17, 2025: A+ Cut Score Workshop
January 27-31, 2025: +Cyber AI Job Task Analysis Workshop
February 17 - 21, 2025: Cloud+ Item Writing Workshop
March 3 - 7, 2025: Linux+ Cut Score Workshop
March 10- 14, 2025: +Autocode Job Task Analysis Workshop

Occam's Razor: Simplifying the Complex

As data professionals, we often deal with massive datasets and complex models.
Occam's Razor: The simplest explanation is often the best.

In data analysis and decision-making this means:
  • Simpler Models: A straightforward model that's easy to interpret often performs just as well as (or better than) an overly complex one.
  • Data Cleaning: Removing unnecessary variables can uncover clearer insights and reduce noise.
  • Decision-Making: Avoid over complicating processes by focusing on essential, actionable data.
Consider that you are analyzing network traffic for potential anomalies. A basic pattern recognition model may be more effective and efficient than a complex, resource-heavy AI system, especially when speed and clarity are crucial.

How do you apply Occam's Razor in your approach to data modeling, or analysis?

Zero Trust

Zero Trust Fundamentals:
- effective against insider threats
- effective against lateral movement
- effective against cloud vulnerabilities

Zero Trust Key Components
- identity verification
- continuous monitoring
- network segmentation



How does a company go about assessing is current security posture?


What are some of the ways to go about securing endpoints?
  • Love
Reactions: precious

Passkeys - What are they?

Passkeys? Is this covered in any Cybersecurity-focused CompTIA course?
If so, which one(s)?


A passkey is a sort of digital identification, that's interlocked to any individual's account, on a given
app or website. That may sound a little like a password, but not quite - there's an important distinction.
Passkeys are bilateral authentication, that have two separate components: a private key, and a public key.
The private key is stored locally on the user's device (computer, phone, etc.). When logging in with a
passkey, the public and private key pair give a user access to his/her account.

Here's where is gets good: Passkeys are more secure than traditional passwords!!!

Passkeys are more secure because they are never stored on any server, and instead reside as an encrypted
key on the user's personal device. And, like passwords, they can be paired to biometrics, like facial recognition
or fingerprint authentication, to initiate the login process. Even if a hacker got were able to get an individual's
device, they’d need the biometrics associated with that individual, to access any accounts, which is significantly
harder than brute forcing a poor-quality traditional password - you know, like "Password1234".

A passkey is a locally stored, system-generated cryptographic key.

Passkeys are completely unique. Almost sounds like a hash!

Passkeys are infinitely more difficult for nefarious actors to exploit.

This is a biggie: Passkeys are phishing-resistant!!!!!!!
Again, what's the #1 attack vector? Ah, you remembered: PHISHING!!!!

Don't I have anything to say about passwords? Yes - passwords are susceptible to breaches and hacks :-(



The END!
  • Love
Reactions: precious

BYOD vs Cybersecurity Policies

Can BYOD policies be compatible with good cybersecurity? It depends!!!!!
Oh, my bad: BYOD (Bring Yo Own Device)

The rise of remote work has brought a flood of BYO-devices, whether they’re
company-approved or just sneak in.

The question is: should IT and security pros embrace BYOD or try to ban it?

The answer depends on a wide range of factors!! One thing is for certain,
whichever policy you choose, you must be able to enforce it. The inmates
MUST NOT be allowed to run the place of confinement!!!
  • Love
Reactions: precious

The Internet Underworld

The dark web is a flourishing economic juggernaut - the world’s third-largest economy!!!
Yeah, the world's third largest!!!!

To shield businesses, and public organizations alike, from trouble, defenders must familiarize
themselves with the people, commodities, services and transactions that shape it.

No use in burying your head in the ground, cause these rats ain't goin' away!!! So, watcha
gonna do? Who you gonna call????
  • Love
Reactions: precious

State of the Dark Web 2025

Do you want to be cyber crooks at their own game?

Do you know what tools you need to guard your hen house - some are larger than
others, and require a different set of tools :)

I'm still prepping for my journey to the Dark Web!

The dark web isn't just a shadowy corner of the Internet!! It's a THRIVING marketplace
that's driving cybercrime on a massive scale.

Threat actors, armed with advanced AI, and ever-evolving tactics, are pushing businesses,
as well as public institutions, to their limits! Well! Well! Well! The bad guys are not only
using AI, but advanced AI!!!

Do you know:
- who the key players on the dark web
- the key marketplaces on the dark web
- how AI is boosting cybercriminal tactics
- strategies for monitoring dark web threats
- strategies for mitigating - yeah mitigating, cause you ain't gonna prevent - dark web threats
- the importance of threat intelligence for cybersecurity

What are you doing to ensure that cyber crooks don't get ahead of you - or is too late,
they're already way out in front!!!
  • Love
Reactions: precious

Filter