alice eneyoaliyo.hashnode.dev路Aug 22, 2024Day Four - My Cybersecurity Journey on Coursera馃攼 Day Four - My Cybersecurity Journey on Coursera As I continue exploring cybersecurity on Coursera, today鈥檚 focus has been truly eye-opening. Building on my previous insights, I鈥檝e delved deeper into cybersecurity, examining crucial concepts like s...#dataproctection
Ritikaletscreateunique.hashnode.dev路Aug 22, 2024Common Challenges Faced During CISSP Exam Preparation and How to Overcome ThemThe Certified Information Systems Security Professional (CISSP) certification is one of the most sought-after credentials in the field of cybersecurity. It validates a professional's knowledge and experience in information security, making it a valua...CISSP
Elisha Bereelishacodes.com路Nov 11, 2023A Software Developer's Odyssey into Cybersecurity and the CISSP 8 DomainsFor software developers looking to pivot into the realm of cybersecurity, understanding the NIST CISSP 8 security domains is crucial. These domains serve as a comprehensive framework for building a robust cybersecurity strategy, ensuring that busines...57 reads#cybersecurity
Deva Saidevasai.hashnode.dev路Jul 4, 2023What is Packet-filtering Firewalls ?Packet-filtering firewalls are a type of cybersecurity technology used to enforce network security policies by inspecting and filtering individual network packets based on predefined rules. These firewalls operate at the network layer (Layer 3) or tr... CISSP course
Murali DossforCloudnloud Tech Communityblog.cloudnloud.com路Jul 22, 2022Image Hardening for SecurityCIS Hardened Images for Cloud CIS hardened images are a secure way to operate in a cloud and they are built off CIS benchmark security recommendation guidelines. In the cloud, if you need to have secure environments, you need to deploy the resources ...403 readsimages
Jubaer Alnazijubaeralnazi.com路Jun 24, 2022What is the CIA triad? [CHAPTER - 1]The CIA triad, also known as confidentiality, integrity, and availability, is a concept created to direct information security policies inside a company. To avoid confusion with the Central Intelligence Agency, the approach is sometimes frequently re...76 readsCISSP Study GuideSecurity