One of my students once asked, 'Why don’t we just delete all hackers from the internet?' It was a funny😀 yet teachable moment about the complexity of cybersecurity.
What’s the most surprising or memorable question a student has asked you?
Mine was when an entire class of Security+ students passed their exams on the first try-a huge moment of pride!
What’s been your biggest 'win' as a CompTIA instructor?
When trust is undermined, the institutions and processes that people rely on may be shaken to their core. Well said- that accountability is essential, both for the purpose of justice and to avoid mistakes being made again.
However, while zero tolerance is a strong stance, it’s also important to...
Your perspective highlights an important truth: when breaches occur, they often expose weaknesses in people, processes, or technology...... In this case, the bigger implication-that trust was placed in an institution that failed to live up to expectations-is more concerning than the breach...
I appreciate your reply. I value the clarification provided regarding the connection-or lack thereof-between API security and serverless architecture.
You're correct; in the end, API security depends on the caliber of development procedures and regular upgrades. Although I acknowledge that the...
True! Picking a language is tricky,...... as JavaScript helps with understanding XSS attacks (executing malicious code in browsers), SQL is key for SQL Injection (injecting malicious queries), and Python aids in crafting custom exploits or automating tasks........while we don’t need a deep dive...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.