Search results

  1. Trevor Chandler

    Compromised SSH keys - Linux

    Hello CINners, Anyone have any suggestions on the mechanics that can be used to identify compromised SSH keys? Thanks CINners
  2. Trevor Chandler

    Common Vulnerabilities and Exposures

    40K+? Are you kidding me!!!!! Is this subject (CVEs) covered in any of the CompTIA courses?
  3. Trevor Chandler

    Linux PAM

    Hello CINners, Is the PAM (Pluggable Authentication Module) facility covered in the Linux+ course? Thanks CINners
  4. Trevor Chandler

    Chinese hackers breach office that reviews foreign investments in US

    Attack on the Committee on Foreign Investment in the U.S. was part of the recent Treasury Department breach. They love agitating the U.S.!!!!
  5. Trevor Chandler

    Non-volatile memory express (NVMe)

    Non-volatile memory express (NVMe) - A communications protocol developed specifically for all-flash storage, NVMe enables faster performance and greater density compared to legacy protocols. It’s geared for enterprise workloads that require top performance. Is NVME covered in any...
  6. Trevor Chandler

    CompTIA bolsters penetration testing certification

    CompTIA bolsters penetration testing certification Very nice article published on networkworld.com. Very timely as well!!! https://www.networkworld.com/article/3635286/comptia-bolsters-penetration-testing-certification.html
  7. Trevor Chandler

    Ransomware Attacks

    According to one source, ransomware attacks are the MOST common attack type, targeting businesses - 21% of total cyberattacks are caused by ransomware. Do you agree, or disagree??
  8. Trevor Chandler

    CEUs for Article Writing

    When writing an article for CEUs, where is the article submitted to receive the necessary credit? Thank you!
  9. Trevor Chandler

    CEUs for Mentoring

    One of the requirements for attaining CEUs for mentoring is to submit a signed document from the mentee, that the mentor dates and times are valid. Question: Where is this document obtained? Thank you.
  10. Trevor Chandler

    Zero Trust

    Zero Trust Fundamentals: - effective against insider threats - effective against lateral movement - effective against cloud vulnerabilities Zero Trust Key Components - identity verification - continuous monitoring - network segmentation How does a company go about assessing is current...
  11. Trevor Chandler

    Large Language Models

    Hello CINners, Are Large Language Models (LLMs) covered in any CompTIA course(s)? If so, which one(s)? Thanks CINners
  12. Trevor Chandler

    Passkeys - What are they?

    Passkeys? Is this covered in any Cybersecurity-focused CompTIA course? If so, which one(s)? A passkey is a sort of digital identification, that's interlocked to any individual's account, on a given app or website. That may sound a little like a password, but not quite - there's an important...
  13. Trevor Chandler

    VLAN Coverage

    Are VLANs covered in any of the Cybersecurity-based CompTIA courses? If so, which one(s)?
  14. Trevor Chandler

    Cybersecurity

    Cybersecurity - in which CompTIA course is this term defined ?????
  15. Trevor Chandler

    JavaScript Blocker

    Hello CINners, Anyone ever heard of a JavaScript blocker? If so, have you ever used it? Is JavaScript blocker mentioned/covered in any of the CompTIA courses? If so, which one(s)? Thanks CINners
  16. Trevor Chandler

    BYOD vs Cybersecurity Policies

    Can BYOD policies be compatible with good cybersecurity? It depends!!!!! Oh, my bad: BYOD (Bring Yo Own Device) The rise of remote work has brought a flood of BYO-devices, whether they’re company-approved or just sneak in. The question is: should IT and security pros embrace BYOD or try to...
  17. Trevor Chandler

    The Internet Underworld

    The dark web is a flourishing economic juggernaut - the world’s third-largest economy!!! Yeah, the world's third largest!!!! To shield businesses, and public organizations alike, from trouble, defenders must familiarize themselves with the people, commodities, services and transactions that...
  18. Trevor Chandler

    Threat Intelligence

    Threat intelligence is essential if IT professionals want to stay a step ahead of bad actors. Threat Intelligence: Is this covered in any of the CompTIA cybersecurity-related courses?
  19. Trevor Chandler

    State of the Dark Web 2025

    Do you want to be cyber crooks at their own game? Do you know what tools you need to guard your hen house - some are larger than others, and require a different set of tools :-) I'm still prepping for my journey to the Dark Web! The dark web isn't just a shadowy corner of the Internet!! It's...
  20. Trevor Chandler

    Ransomware Response Plan

    Hello CINners, What's your thoughts on the feasibility of including a ransomware response plan in one of the cybersecurity-based courses?