Elisha Bereelishacodes.com·Nov 11, 2023A Software Developer's Odyssey into Cybersecurity and the CISSP 8 DomainsFor software developers looking to pivot into the realm of cybersecurity, understanding the NIST CISSP 8 security domains is crucial. These domains serve as a comprehensive framework for building a robust cybersecurity strategy, ensuring that busines...Discuss·34 reads#cybersecurity
Deva Saidevasai.hashnode.dev·Jul 4, 2023What is Packet-filtering Firewalls ?Packet-filtering firewalls are a type of cybersecurity technology used to enforce network security policies by inspecting and filtering individual network packets based on predefined rules. These firewalls operate at the network layer (Layer 3) or tr...Discuss CISSP course
Murali DossforCloudnloud Tech Communityblog.cloudnloud.com·Jul 22, 2022Image Hardening for SecurityCIS Hardened Images for Cloud CIS hardened images are a secure way to operate in a cloud and they are built off CIS benchmark security recommendation guidelines. In the cloud, if you need to have secure environments, you need to deploy the resources ...Discuss·460 readsimages
Jubaer Alnazijubaeralnazi.com·Jun 24, 2022What is the CIA triad? [CHAPTER - 1]The CIA triad, also known as confidentiality, integrity, and availability, is a concept created to direct information security policies inside a company. To avoid confusion with the Central Intelligence Agency, the approach is sometimes frequently re...Discuss·174 readsCISSP Study GuideSecurity