Search results

  1. precious

    Slide Decks More Effective

    You have made some great points, though. Slides can definitely become the villain if they’re overdone or misused....That said, I’m curious-what is your go-to prop or trick to keep the learners engaged when slides are a no-go? Maybe I’ll ditch my 'mini-me' box and steal a page from your playbook.
  2. precious

    Linux PAM

    Thanks
  3. precious

    Linux PAM

    XK0-005 2.2 Summarize the purpose and use of security best practices in a Linux environment
  4. precious

    Slide Decks More Effective

    Thank you for sharing such innovative and practical ideas! I love the idea of disabling slide numbers; it's a straightforward yet powerful method of preventing students from becoming distracted by counting slides. It's also excellent that you use subliminal indicators, such as symbols, to...
  5. precious

    I broke O365 while preparing curriculum for a program that aligns to DataX :-)

    Challenges in balancing innovation with security protocols
  6. precious

    Hello, pls i need CompTIA security+ slides to deliver

    Are you looking for TTT Security plus slides?
  7. precious

    Slide Decks More Effective

    Great content. Thanks I appreciate
  8. precious

    Slide Decks More Effective

    Great... It's always good not to leave students with questions
  9. precious

    Slide Decks More Effective

    What’s one thing you always include on your slides to keep learners engaged?
  10. precious

    Predictive Analytics-Prime Time?

    What's exciting is how advancements in AI and machine learning are pushing the boundaries even further, making predictions more accurate and accessible..... How do you see these developments shaping the future of predictive analytics in your field?
  11. precious

    Chinese hackers breach office that reviews foreign investments in US

    Yes, both piggybacking and phishing are common methods hackers use, along with other tactics like pretexting, baiting, and spear phishing, to exploit human vulnerabilities and gain unauthorized access... CompTIA Security plus SY0-701 2.2 Explain common threat vectors and attack surfaces.
  12. precious

    Chinese hackers breach office that reviews foreign investments in US

    I understand your point, and the U.S. does indeed have a strong defensive team. Their ability to adapt and respond quickly to challenges sets them apart. However, it’s also worth considering that end users within the systems are not cybersecurity experts which of course is another weak...
  13. precious

    Chinese hackers breach office that reviews foreign investments in US

    This is even worse Chinese hackers spent 5 years waiting in U.S. infrastructure, ready to attack, agencies say
  14. precious

    Chinese hackers breach office that reviews foreign investments in US

    😂😂How will you wonder if you find some back doors in your system and someone is watching you?
  15. precious

    Passed Cloud+ CV0-004

    Happy New Year, and congratulations on Cloud+..........It’s exciting that you have so many projects lined up across various Cloud Service Providers; it sounds like 2025 is off to a great start for you. Fingers crossed for your CloudNetX results-you’ve got this!
  16. precious

    Chinese hackers breach office that reviews foreign investments in US

    This other breach shows growing sophistication and reach of state-sponsored cyberattacks. Such incidents emphasize the need for robust cybersecurity measures, particularly for government agencies handling sensitive economic and national security information.
  17. precious

    Are there any answers to such web server behavior?

    Am deeply thankful and grateful for the link..... The page provides a clear step by step more than just Virtual Host Enumeration
  18. precious

    The Internet Underworld

    Totally fair-zero trust is a smart approach in this space!
  19. precious

    Zero Trust: Is it Really Achievable?

    Glad you enjoyed that!