Munilakshmi G J100daysdevops.hashnode.dev·Nov 13, 2024Day 19 of 100 Days: Docker Interview Questions and Answers (Part 2) — Advanced ScenariosWelcome to Day 19 of my 100 Days of DevOps journey! 🎉 Today, we’re diving into some advanced Docker interview questions that will tackle complex scenarios and real-world troubleshooting challenges. Get ready to enhance your Docker knowledge and take...Discuss100DaysOfCode
Munilakshmi G J100daysdevops.hashnode.dev·Nov 13, 2024Day 18 of 100 Days : Docker Interview Questions and Answers (Part 1) — Real-World ScenariosWelcome to Day 18 of my 100 Days of DevOps journey! Today, we dive into Docker interview questions that reflect real-world scenarios. These questions are designed to assess practical knowledge, rather than just command recall, so let's break down eac...Discuss100DaysChallenge
Mallika Gautamvbnm.hashnode.dev·Jul 26, 2024Cybersecurity Skills: Day 25 of the 100-Day Learning JourneyOverview of detection tools In this reading, you’ll compare and contrast these tools and learn about endpoint detection and response (EDR). As a security analyst, you'll likely work with these different tools, so it's important to understand their fu...Discuss#day25
Mallika Gautamvbnm.hashnode.dev·Jul 26, 2024Cybersecurity Skills: Day 24 of the 100-Day Learning JourneyTraits of an effective threat model Threat modeling is the process of identifying assets, their vulnerabilities, and how each is exposed to threats. It is a strategic approach that combines various security activities, such as vulnerability managemen...Discussday24 100daysofcode
Mallika Gautamvbnm.hashnode.dev·Jul 23, 2024Cybersecurity Skills: Day 23 of the 100-Day Learning JourneyOpen source intelligence Cyber attacks can sometimes be prevented with the right information, which starts with knowing where your systems are vulnerable. Previously, you learned that the CVE® list and scanning tools are two useful ways of finding we...Discuss·1 likeday23
Mallika Gautamvbnm.hashnode.dev·Jul 18, 2024Cybersecurity Skills: Day 21 of the 100-Day Learning JourneyCore Understanding of risks, threats, and vulnerabilities Security risk Security plans are all about how an organization defines risk. However, this definition can vary widely by organization. As you may recall, a risk is anything that can impact the...Discussday21
Mallika Gautamvbnm.hashnode.dev·Jul 17, 2024Cybersecurity Skills: Day 20 of the 100-Day Learning JourneyQuidance : SQL Query a database The SELECT, FROM, and ORDER BY keywords are used when retrieving information from a database. FROM Indicates which table to query; required to perform a query FROM employees Indicates to query the employees table ORDER...Discussday20
Mallika Gautamvbnm.hashnode.dev·Jul 16, 2024Mastering Cybersecurity: Day 19 of the 100-Day ChallengeComparing Types of Joins Compare types of joins Previously, you explored SQL joins and how to use them to join data from multiple tables when these tables share a common column. You also examined how there are different types of joins, and each of th...Discussday19
Mallika Gautamvbnm.hashnode.dev·Jul 15, 2024Mastering Cybersecurity: Day 18 of the 100-Day ChallengeFile permissions and ownership Permissions are the type of access granted to a file or directory. Permissions are related to authorization. Authorization is the concept of granting access to specific resources in a system. Authorization allows you to...Discussday18
Mallika Gautamvbnm.hashnode.dev·Jul 13, 2024Mastering Cybersecurity: Day 17 of the 100-Day ChallengeFilter content in linux Filtering for information Filtering is selecting data that matches a certain condition. For example, if you had a virus in your system that only affected the .txt files, you could use filtering to find these files quickly. Fil...Discussday17