Renita and I had a blunt discussion about what to look out for when evaluating a course offered by a tech job influencer. We discussed our perspectives on what we uncovered during our research for this episode. We also discus...
Play EpisodeWhen it comes to cybersecurity threats, rootkits occupy a prominent position due to their insidious nature. Rootkits are clandestine software packages that aim to gain unauthorized access and control over computers. What's even more scarier, is t…
Firewalls are a fundamental component of network security. Understanding how Access Control Lists (ACLs) work is crucial for aspiring cybersecurity professionals. In this review, I will delve into five ACL configurations commonly used by netw…
(Objective 2.5: Given a scenario, implement cybersecurity resilience.) In the world of data backup and recovery, one common challenge is dealing with open files. When critical data, such as SQL databases or Exchange messaging systems, is constantly…