Skip to content
Clocked-Out

Clocked-Out

๐™‹๐™ค๐™ฌ๐™š๐™ง๐™š๐™™ ๐˜ฝ๐™ฎ ๐™†๐™ฃ๐™ค๐™ฌ๐™ก๐™š๐™™๐™œ๐™š

Clocked-Out
Clocked-Out

๐™‹๐™ค๐™ฌ๐™š๐™ง๐™š๐™™ ๐˜ฝ๐™ฎ ๐™†๐™ฃ๐™ค๐™ฌ๐™ก๐™š๐™™๐™œ๐™š

  • Home
  • Cyberspace Notes
    • IT Fundamentals
    • Cyber Security
    • Cloud
    • Linux
  • Certification Notes
    • CompTIA A+
    • CompTIA Net+
    • CompTIA Sec+
  • Guides
    • Written
    • Videos
  • About Us
Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is a Trojan?

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is Ransomware?

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is zero-day vulnerabilities?

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is mobile device vulnerabilities?

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is misconfiguration vulnerabilities?

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is operational security controls?

Intro Operational security controls are a critical aspect of an organizationโ€™s overall security strategy. While technical and managerial controls focus on hardware, software, and policy development, operational controls deal with…

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is managerial security controls?

Intro Managerial security controls play a crucial role in protecting an organization’s IT infrastructure. These controls involve policies, procedures, and oversight mechanisms that guide the behavior of employees and ensure…

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is a technical security control?

TLDR Technical security controls refer to the security measures that organizations implement using technology to protect their systems, networks, and data. These controls aim to safeguard critical infrastructure from cyberattacks,…

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is Whaling?

TLDR Whaling is a type of phishing attack that targets high-ranking individuals within an organization, such as executives, CEOs, CFOs, or senior managers. These attacks are more sophisticated than regular…

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is Eliciting Information?

TLDR Eliciting information is a technique used to subtly extract sensitive or valuable details from individuals without directly asking for them. It often involves casual conversations where the subject is…

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is Tailgating?

TLDR Tailgating is a common social engineering tactic where an unauthorized person gains access to a restricted area by following closely behind an authorized individual. This method exploits the trust…

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is Pharming?

TLDR Pharming is a type of cyberattack that redirects users from legitimate websites to fraudulent ones without their knowledge. It manipulates the website’s DNS (Domain Name System) or compromises the…

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is Shoulder Surfing?

TLDR Shoulder surfing is a type of security breach where attackers visually observe sensitive information, such as passwords, PINs, or confidential data, by watching over someoneโ€™s shoulder as they enter…

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is Dumpster Diving?

TLDR Dumpster diving is a technique used by attackers to gather sensitive information by searching through an organization’s or individual’s discarded materials. These materials, often found in trash bins or…

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is Spear Phishing?

TLDR Spear phishing is a targeted form of phishing where attackers focus on specific individuals or organizations rather than sending out mass emails to random users. These attacks are highly…

Posts pagination

1 … 6 7 8 … 10

« Previous Page — Next Page »

Prepped. Ready. Certified.

Our official Sec+ App

Clocked-Out App Icon

You Missed

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is a Trojan?

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is Ransomware?

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is zero-day vulnerabilities?

Certification Notes CompTIA Sec+ Cyber Security Cyberspace Notes

What is mobile device vulnerabilities?

Clocked-Out

Clocked-Out

๐™‹๐™ค๐™ฌ๐™š๐™ง๐™š๐™™ ๐˜ฝ๐™ฎ ๐™†๐™ฃ๐™ค๐™ฌ๐™ก๐™š๐™™๐™œ๐™š

Your privacy comes first. We donโ€™t use cookies or personal tracking. Your personal activity isnโ€™t monitored or stored, because your data belongs to you, not us.