• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

Search results

  1. Rick Butler

    What prevents our students from completing their goals

    How many students have we all had to have that hard conversation with - the ones that tell them that they are mismanaging their expectations. Students think they'll get $75,000 by just passing their A+ I saw a video of a YouTuber I follow that had to close his channel this month from being...
  2. Rick Butler

    What prevents our students from completing their goals

    That's probably true as well. IntelliTec used to offer free coffee to students, and one day, I walked in and saw cups stood up in a pyramid - a testament to obsessively trying to make some kind of statement about his coffee habits. And then I had another student who, I'd swear his blood-type...
  3. Rick Butler

    An A+ History question

    Well, the first exam for A+ hit the books in 1993, and according to what we find on TestOut's website, it consisted of a single exam. So I guess @jasoneckert and I might have some conflicting information. Reference...
  4. Rick Butler

    Chinese Hackers Accessed US Treasury Workstations

    That's where it disappears. There will always be failures in people, process, and technology - that's just inherent to the human experience. Unfortunately, the real issue has to do with the follow up. If I were involved in that kind of screw up and I was found to be culpable, I would expect...
  5. Rick Butler

    Serverless Architecture: A New Threat to API Security?

    Sorry, but I'm starting to feel like the boards are being cluttered up with a lot of "brief" cluttery posts. While I'm not opposed to more activity - I believe CIN needs it, I'm finding that responding with 2-5 word replies on EVERY post, to me, is making it hard to engage in meaningful...
  6. Rick Butler

    Serverless Architecture: A New Threat to API Security?

    Well, there's not much to say. It was a question that promoted the concept of "post hoc ergo propter hoc". Serverless architecture doesn't make APIs less or more vulnerable. APIs are going to be secure or not based on how well they are built - how well they follow the latest techniques of...
  7. Rick Butler

    Chinese Hackers Accessed US Treasury Workstations

    The step that is missing here is what happens, following the breach and the subsequent cleanup of the mess. When a breach occurs, the cold hearted truth here, the part where I say the quiet part out loud, is that preparations failed as a result of People, Process, or Technology. Perhaps because...
  8. Rick Butler

    Learn Coding for Cybersecurity?

    Better. I appreciate the higher quality post in reply, rather than simple low-quality statements of agreement sprayed all over. I would tend to agree that having some knowledge of basic programming helps in cyber defense. I'm also of the persuasion that "to a carpenter, everything is a hammer...
  9. Rick Butler

    Chinese Hackers Accessed US Treasury Workstations

    This isn't just about preparation, though - because one can prepare to the Nth degree and still have a catastrophic breach. So, what's the next step, mes amis? What's the answer when preparation is not enough?
  10. Rick Butler

    Chinese Hackers Accessed US Treasury Workstations

    Not really. If people are surprised by this, I would say, they're not really paying attention. It's not a question of if a breach will happen, but rather, when.
  11. Rick Butler

    Learn Coding for Cybersecurity?

    Only generally. Sure, programming is part of security, but it's not the end all, like the question intimates. And if you're going to assess programming knowledge, then what language do we plan to use? How will you assess that, given that there are a myriad of approaches in programming? /r
  12. Rick Butler

    Skills or Knowledge?

    Skills is just another way of saying applied knowledge, so I don't see a distinction. Really, it comes back to what hasn't been mentioned - experience. /r
  13. Rick Butler

    Email Content

    Well, actually, it's not how much you make, nor how much you keep; it's how much you can give away. (but that's a different matter of sage wisdom) *flips over fedora* - we'll pass this around and see if we can get some CIN'ers to fill it. Otherwise, playing the guitar on the street, singing...
  14. Rick Butler

    Email Content

    C'mon, bud. With all the conferences you attend, you can't sell me on the notion that you're that destitute...
  15. Rick Butler

    What prevents our students from completing their goals

    In that case, then I would recommend going over to our good friends at Biohazard Coffee (https://biohazardcoffee.com/). 928mg of caffeine for a 12oz cup. Even I had to cut it into regular coffee - that stuff is what powers gaming marathons.
  16. Rick Butler

    Email - Sent to Spam/Junk

    Well, no, the end user doesn't typically do these things. But RBL and SBL's can also interfere with e-mail transmission - preventing all those annoying spammers from setting up their own SMTP boxes and blitzing the world with spam.
  17. Rick Butler

    Security vs. Privacy: Which Should Take Precedence?

    We'll just draw a picture.
  18. Rick Butler

    Email Content

    If you want, I can walk you through the Defender console here at ITC and you can see some pretty incredible stuff. And with an Individual subscription, you do get a lot of Defender's capability, that would be relevant to a home user.