• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

Search results

  1. Michael Schmitz

    Cybersecurity Layers

    We disagree, and it does not change any relationship, but i tell you what my opion about this is., since you did ask for it. and if you google for "Defense in Depth" you find graphics that are better illustrated and more correct then this one.. So, this graphic is imho more or less useless.
  2. Michael Schmitz

    Cyber Security Tools

    then we can`t use it. anyway, as i said, it is not a good illustration anyway.. I personally believe, you share something were you have the rights and are willing to share it, post the Link to the source and we can see it by ourself and decide to violate maybe copyrights, or if you do not...
  3. Michael Schmitz

    Forensics Tools

    it is wrong: The Sleuth Kit® (TSK) is a library and collection of command linetools that allow you to investigate disk images. The core functionality of TSK allows you to analyze volume and file system data. The librarycan be incorporated into larger digital forensics tools and the command...
  4. Michael Schmitz

    Common Attack Vectors

    you should attend one of my courses then. Man in the Cloud: using public Cloud ressources for delivering malware or using onedrive7ggogle drive to exfiltrate data f.e. Man in the Disk: attack vector for android with installed SD-Card Also there is a Meet in the middle Attack, but that is for...
  5. Michael Schmitz

    Anonymizer

    701 launched November 7, 2023, so 601 was EOL somewhere in June this year. But you had more then one year to learn, that 701 is Up to date.. Traner should know that, when standing before a class, not mention always: oh, but in 601 it was like this...
  6. Michael Schmitz

    Anonymizer

    VPN is already introduced/explained in A+ if you start on the beginning.
  7. Michael Schmitz

    SSH Encryption Methods

    Depending what u choose to use. It is not SSH that may make the mistake (if not in the code), its u, selecting what you wanna have. then use the right settings. If the outside attacker is already in your network to decrypt SSH, you have failed before and other Problems. then SSH would be the...
  8. Michael Schmitz

    SSH Encryption Methods

    as you mention below, quantum computing will change that in ways, we do not really know yet. like AI changed a lot in a fast way the last two years. there are this year three post quantum cryptographic standards released. https://csrc.nist.gov/projects/post-quantum-cryptography you need to...
  9. Michael Schmitz

    Microsoft Teams - the Latest Victim

    sure, you can train him. That is a risk mitigation strategie. or you have a lot of Ductape. Then you can patch him. But he will not like it..
  10. Michael Schmitz

    SecurityX (CASP+005) beta & Pentest+ 003 beta

    passed SecX in beta. Pentest is on the book for 2025. So it gets easier with each version? 001 was pretty nasty...
  11. Michael Schmitz

    Common Exam Pitfalls and How to Overcome Them

    I would not underwrite this. PBQ on the Beginning: Yes. i recommend skip them, go back later, when you finished the rest. nearly all my students are thankfull for that advice, when followed it. But the order of questions is random, and if a questions is consider hard (without knowing the...
  12. Michael Schmitz

    Jumping the line

    You may master the Training and Exam for CISSP, but they are requiring to prove the Work Experience before handing out the Certification. Huge difference to CompTIA. You have to start to learn it somewhere. But i would not recommend CISSP in that case (had one student that started with CEH in...
  13. Michael Schmitz

    Jumping the line

    That is pretty bad. didn`t know you can have that less points. Sure they can. CompTIA has no requirement to have passed N+ before Sec+. They recommend it, to have the knowledge. But they do not enforcing it. Why? You did not know better or did you make a explanation. Technically you where...
  14. Michael Schmitz

    CIN Sneak Peek - CloudNetX CNX-001

    Thanks for the link. did miss it that week, end of year training business.. :-)
  15. Michael Schmitz

    Phishing

    Yes in nearly every course from A+ on. Pretty basic stuff. I do not teach ITF or the new little a+ courses, but still there it should be mentioned..
  16. Michael Schmitz

    Microsoft Teams - the Latest Victim

    Layer8 Problem. If the user opens Mails as part of social Engnieering. Teams is not the Problem (There are settings for the Admin to protect the company), the User is. Teams is just another Vector. Not getting political, but yes, china and russia are at war with western countries to attack in...
  17. Michael Schmitz

    Antivirus Software - Purpose

    Technically : No. Because that AV is an old term. EDR or better XDR Solutions praise, they protect against Ramsonware. Companies may call their Product still AV and offer Ransomware Protection, but that is marketing. But then again, if the Ransomare comes in as Virus or Worm, the AV my detect...
  18. Michael Schmitz

    Basic Cybersecurity Hygiene

    Some GPO? You have a domain at home? For a single computer there is only the local Securtiy Configuration, which is like 1 GPO for all Users or this Computer with different Settings applied. But only one GPO.
  19. Michael Schmitz

    Basic Cybersecurity Hygiene

    Conditional Access. But that has to be enforced by the Application Vendor. Nothing i can enforce for myself. Nor so easy in a Company Enviroment. Use a Password Management Solution.
  20. Michael Schmitz

    Web Browser Launch - starts multiple instances

    You did not know, that Microsoft replaced their Edge Engine years ago (Jan, 15th 2020) with Chromium? Something that does come up in A+ to tell, or in Security courses, when talking about Browser Attacks..