• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

Recent content by Paul Willy

  1. Paul Willy

    Inquiring Minds Want to Know about Cyber Ranges

    Greg you are absolutely correct. Out to pasture describes me. At age 72, after 30 years of corporate training, I am doing an adjunct role for a local junior college and loving it. I get to grade students on their Packet Tracer Labs, easy peasy.
  2. Paul Willy

    Inquiring Minds Want to Know about Cyber Ranges

    Disclaimer, I am a grouchy old bastard. DoD Bases are all over the place, but having taught at many there is always someone responsible that you can push to make labs work. An airbase in Alabama had put us in a room with no service. The students had been provided with LTE dongles, but there...
  3. Paul Willy

    Don't know how to respond to question in 7.4.9 Live Lab: Configure First Hop Redundancy

    Hi Bogdan and Michael, Guten tag. As I do not have access to the lab, I will give you the basics of Hot Standby Routing Protocol in Cisco IOS. HSRP Configuration on DIST1 and DIST2 The default gateway is not the address of either router. When standby is configured a MAC address is created that...
  4. Paul Willy

    Email - Sent to Spam/Junk

    We have come a long way from the open relay in Exchange 5 and Groupwise. Great thread!
  5. Paul Willy

    Chinese Hackers Accessed US Treasury Workstations

    Organizations come in many different postures; Paranoid, fire them! Prudent, train them or ask for resignation. Promiscuous, ignore it and go on, if you even noticed.
  6. Paul Willy

    Serverless Architecture: A New Threat to API Security?

    Just because they make Multi Factor authentication free for global admins doesn't mean everyone turns it on, and MFA has had some found vulnerabilities. If everyone did the correct implementation of privileged user roles. I have read many articles that suggest the whole representational state...
  7. Paul Willy

    Learn Coding for Cybersecurity?

    Maybe CompTIA could do a distinct cert, there is a decent Python course "Artificial Intelligence for Cybersecurity" at uCertify
  8. Paul Willy

    An A+ History question

    That first A+ M$ OS exam was the only certification exam (out of over 100 taken), I ever got a perfect score on, with no prep. Well, I was at IBM when the PC came out, and I did do PC/dos and MS/dos from the beginning. And I had multiple CNE's an ECNE and 2 MCSE's at that point. OK, it...
  9. Paul Willy

    CompTIA’s Role in Cybersecurity Careers

    Security+ is easy as I have seen the difference in hire rates due to DoD and Gov requirements. CySA+ and PenTest+ are good add-ons to Sec+ but more specific to particular job roles, and frequently overshadowed by OSCP and CISSP.
  10. Paul Willy

    Problem Based Question: Connect AP to Patch Panel?

    It is true that we should not give details regarding questions. However, having taken A+ 3 times over the years, with decreasing scores, only the first exam software part in 1996 was a perfect score. Since then they always have a few unanswerable questions. There is also the possibility that...
  11. Paul Willy

    Phishing Email Analysis Tools

    How about python regression models. import pandas as pd import numpy as np df = pd.read_csv('../datasets/sms_spam_perceptron.csv') X = df.iloc[:, [1, 2]].values y = df.iloc[:, 0].values y = np.where(y == 'spam', -1, 1) from sklearn.linear_model import LinearRegression linear_regression =...
  12. Paul Willy

    How Load Balancing Works in Cloud Environments

    On a related topic in the Cloud, DNS traffic management can improve the end user experience by considering several variables and then connecting the user to the closest or least loaded load balancer. A great demo of that is to ipconfig /flushdns then ipconfig /displaydns then ping someone...