Non-volatile memory express (NVMe)

Non-volatile memory express (NVMe) -
A communications protocol developed specifically for all-flash storage,

NVMe enables faster performance and greater density compared to legacy protocols.
It’s geared for enterprise workloads that require top performance.


Is NVME covered in any CompTIA course? Is so, which one(s)?


Thanks CINners!
  • Love
Reactions: precious

CompTIA bolsters penetration testing certification

CompTIA bolsters penetration testing certification​


Very nice article published on networkworld.com. Very timely as well!!!

  • Love
Reactions: precious

Upcoming SME Workshops

Upcoming SME Workshops

CompTIA has a number of upcoming workshops. Whether you've been a SME with us for some time or are thinking about joining as one of our SMEs, we encourage all of you who can to sign up and join us! It's the knowledge and creativity of IT professionals that help us develop and maintain the quality of our certification exams.

We are currently recruiting for the following workshops:

January 13 - 17, 2025: A+ Cut Score Workshop
January 27-31, 2025: +Cyber AI Job Task Analysis Workshop
February 17 - 21, 2025: Cloud+ Item Writing Workshop
March 3 - 7, 2025: Linux+ Cut Score Workshop
March 10- 14, 2025: +Autocode Job Task Analysis Workshop

Occam's Razor: Simplifying the Complex

As data professionals, we often deal with massive datasets and complex models.
Occam's Razor: The simplest explanation is often the best.

In data analysis and decision-making this means:
  • Simpler Models: A straightforward model that's easy to interpret often performs just as well as (or better than) an overly complex one.
  • Data Cleaning: Removing unnecessary variables can uncover clearer insights and reduce noise.
  • Decision-Making: Avoid over complicating processes by focusing on essential, actionable data.
Consider that you are analyzing network traffic for potential anomalies. A basic pattern recognition model may be more effective and efficient than a complex, resource-heavy AI system, especially when speed and clarity are crucial.

How do you apply Occam's Razor in your approach to data modeling, or analysis?

Zero Trust

Zero Trust Fundamentals:
- effective against insider threats
- effective against lateral movement
- effective against cloud vulnerabilities

Zero Trust Key Components
- identity verification
- continuous monitoring
- network segmentation



How does a company go about assessing is current security posture?


What are some of the ways to go about securing endpoints?
  • Love
Reactions: precious

Passkeys - What are they?

Passkeys? Is this covered in any Cybersecurity-focused CompTIA course?
If so, which one(s)?


A passkey is a sort of digital identification, that's interlocked to any individual's account, on a given
app or website. That may sound a little like a password, but not quite - there's an important distinction.
Passkeys are bilateral authentication, that have two separate components: a private key, and a public key.
The private key is stored locally on the user's device (computer, phone, etc.). When logging in with a
passkey, the public and private key pair give a user access to his/her account.

Here's where is gets good: Passkeys are more secure than traditional passwords!!!

Passkeys are more secure because they are never stored on any server, and instead reside as an encrypted
key on the user's personal device. And, like passwords, they can be paired to biometrics, like facial recognition
or fingerprint authentication, to initiate the login process. Even if a hacker got were able to get an individual's
device, they’d need the biometrics associated with that individual, to access any accounts, which is significantly
harder than brute forcing a poor-quality traditional password - you know, like "Password1234".

A passkey is a locally stored, system-generated cryptographic key.

Passkeys are completely unique. Almost sounds like a hash!

Passkeys are infinitely more difficult for nefarious actors to exploit.

This is a biggie: Passkeys are phishing-resistant!!!!!!!
Again, what's the #1 attack vector? Ah, you remembered: PHISHING!!!!

Don't I have anything to say about passwords? Yes - passwords are susceptible to breaches and hacks :-(



The END!
  • Love
Reactions: precious

BYOD vs Cybersecurity Policies

Can BYOD policies be compatible with good cybersecurity? It depends!!!!!
Oh, my bad: BYOD (Bring Yo Own Device)

The rise of remote work has brought a flood of BYO-devices, whether they’re
company-approved or just sneak in.

The question is: should IT and security pros embrace BYOD or try to ban it?

The answer depends on a wide range of factors!! One thing is for certain,
whichever policy you choose, you must be able to enforce it. The inmates
MUST NOT be allowed to run the place of confinement!!!
  • Love
Reactions: precious

The Internet Underworld

The dark web is a flourishing economic juggernaut - the world’s third-largest economy!!!
Yeah, the world's third largest!!!!

To shield businesses, and public organizations alike, from trouble, defenders must familiarize
themselves with the people, commodities, services and transactions that shape it.

No use in burying your head in the ground, cause these rats ain't goin' away!!! So, watcha
gonna do? Who you gonna call????
  • Love
Reactions: precious

State of the Dark Web 2025

Do you want to be cyber crooks at their own game?

Do you know what tools you need to guard your hen house - some are larger than
others, and require a different set of tools :)

I'm still prepping for my journey to the Dark Web!

The dark web isn't just a shadowy corner of the Internet!! It's a THRIVING marketplace
that's driving cybercrime on a massive scale.

Threat actors, armed with advanced AI, and ever-evolving tactics, are pushing businesses,
as well as public institutions, to their limits! Well! Well! Well! The bad guys are not only
using AI, but advanced AI!!!

Do you know:
- who the key players on the dark web
- the key marketplaces on the dark web
- how AI is boosting cybercriminal tactics
- strategies for monitoring dark web threats
- strategies for mitigating - yeah mitigating, cause you ain't gonna prevent - dark web threats
- the importance of threat intelligence for cybersecurity

What are you doing to ensure that cyber crooks don't get ahead of you - or is too late,
they're already way out in front!!!
  • Love
Reactions: precious

  • Question
Free or reduced resources for Title 1 Schools

Hello,

I'm a retired federal IT professional and a part-time High School Cybersecurity and Computer Science teacher. I served in government for 33 years, and this is my fourth year of teaching high school. I passed the Tech+ Exam yesterday, after spending last week studying the 727 page guide from Comptia. Now I'm tasked with trying to get some of my students to do the same. I teach at Woodlawn HS in Baton Rouge, LA. It is a Title 1, urban school that has at risk kids. I may also get involved with helping teachers who do not have a background in IT with passing the Tech+ exam. Next school year, LA is implementing a K-12 Computer Science curriculum. Tech+ is one of the three certifications that will be made available for high school students. The others are Python Programming and Web Development. Does Comptia have a program that can provide assistance to schools in underserved and underrepresented areas.

Thx

Frank Kidd

CIN TTT Series - PenTest+ PT0-003

YES! It is time for our first TTT series of 2025! Join us for the PenTest+ series beginning Tuesday, January 21st! @Nicholas Pierce will lead this series, which consists of eight sessions covering the PenTest+ exam domains. Nick will teach the key cybersecurity concepts covered on the exam and conduct hands-on activities with key technology tools used by cybersecurity professionals. We will also discuss instructional strategies for presenting the concepts to students and best practices for implementing a PenTest+ course.

What: CIN TTT Series PenTest+ PT0-003 8 sessions
When: Jan 21, 2024, 6:00 - 8:00 PM Central Daylight Time, Tuesday and Thursday
Who: Nicholas Pierce
Where: ON24

REGISTER HERE
CIN Webinar Banners-TTT ON24.pngPenTest  Logo(1).png

Filter