• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

Search results

  1. Trevor Chandler

    What’s Your Biggest Win as an Instructor?

    My biggest win was the end of the semester :-)
  2. Trevor Chandler

    Learn Coding for Cybersecurity?

    So much I don't know! Thanks precious!!!
  3. Trevor Chandler

    Serverless Architecture: A New Threat to API Security?

    I got lost from the beginning - '"post hoc ergo propter hoc"
  4. Trevor Chandler

    Serverless Architecture: A New Threat to API Security?

    Great souls feel the same!!!
  5. Trevor Chandler

    Learn Coding for Cybersecurity?

    What is OTW?
  6. Trevor Chandler

    Learn Coding for Cybersecurity?

    That's the direction that I'm leaning!!!
  7. Trevor Chandler

    Skills or Knowledge?

    I'm biased toward assessing skills. Exams that have a performance-based component, carry a lot of weight in the practical world. You see, there's a reason that CCIEs command the attention and respect that they do in the practical world. No one, and I mean no one, achieves this designation...
  8. Trevor Chandler

    Learn Coding for Cybersecurity?

    If programming were to be included on the exams, what language would you use to make the assessment? An additional challenge would be how to go about assessing the coding? Considering multiple approaches could be taken to code something. If a question requires some code that involves a...
  9. Trevor Chandler

    Security vs. Privacy: Which Should Take Precedence?

    Thank you - as I stand to take a bow :)
  10. Trevor Chandler

    Email Content

    I don't play the guitar :-( Passing the fedora sounds like a good idea :)
  11. Trevor Chandler

    Email - Sent to Spam/Junk

    I'm still failing to see how, where, the end user is able to control the email going into the Inbox vs the Junk/Spam folders. That's what I'd like to achieve!!!
  12. Trevor Chandler

    What prevents our students from completing their goals

    Not being a connoisseur of this beverage, that 928mg reference to caffeine content has zero meaning to me. So, without the ability to contribute any meaningful commentary, I'll just move myself from the playing field, into the stands, with the fans!!!
  13. Trevor Chandler

    Email Content

    destitute (adjective) - without the basic necessities of life. You're right, I'm not that destitute. However, I have to be very sagacious in my expenditures!!! One of the many pieces of wisdom that has been shared with me is, "It's not how much you make, but it's how much you get to keep."...
  14. Trevor Chandler

    Security vs. Privacy: Which Should Take Precedence?

    Being the visual learner that I am, this certainly brings the point home more so than the verbiage that I provided!!! Thank you Mr. Butler!!!
  15. Trevor Chandler

    What prevents our students from completing their goals

    That's one that should be at the top of the list!!!!
  16. Trevor Chandler

    Compromised Account

    Thanks for that information. Now I've got a reference point to work from!!!
  17. Trevor Chandler

    Email Content

    I do appreciate your generosity good sir! The step before that though is to get past the little matter of funding for the subscription!
  18. Trevor Chandler

    Security vs. Privacy: Which Should Take Precedence?

    Vulnerability - Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. Note: The term weakness is synonymous for deficiency. Weakness may result in security and/or privacy risks. Threat - Any...
  19. Trevor Chandler

    Email - Sent to Spam/Junk

    Properly constructed DMARC and SPF records on the domain level are definitely part of the equation, but unfortunately, the end user has no access. Thank you for the URL to the blacklist check.