Page Index - Paiet/Tech-Journal-for-Everything GitHub Wiki
256 page(s) in this GitHub Wiki:
- Home
- Welcome to the Tech-Journal-for-Everything's Wiki!
- Cool Stuff:
- Networking Stuff:
- Security Stuff:
- App Security:
- Linux
- Linux - Starting CLI:
- Linux Shell Commands:
- Linux Shell Commands Plus:
- Linux - Installing Software:
- Linux - Editing Files:
- Linux - Writing Simple Shell Scripts:
- Linux Security:
- Installing Configuring OpenVPN in Linux
- Linux Administration Task:
- Linux Networking:
- PowerShell: Syntax
- PowerShell: Scripting
- 1.10 Identify the basics elements of unified communication technologies
- 1.11 Compare and contrast technologies that support cloud and virtualization
- 1.12 Given a set of requirements, implement a basic network
- 1.3 IPv4 Subnetting
- 1.4 Explain the characteristics and benefits of various WAN technologies
- 1.4 IP Addressing
- 1.5 Install and properly terminate various cable types and connectors using appropriate tools
- 1.7 Differentiate between network infrastructure implementations
- 1.9 Explain the basics of routing concepts and protocols
- 2.1 Given a scenario, use appropriate monitoring tools
- 2.2 Given a scenario, analyze metrics and reports from monitoring and tracking performance tools
- 2.3 Given a scenario, use appropriate resources to support configuration management
- 2.4 Explain the importance of implementing network segmentation
- 2.5 Given a scenario, install and apply patches and updates
- 2.6 Given a scenario, configure a switch using proper features
- 2.7 Install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices
- 3.1 Compare and contrast risk related concepts
- 3.2 Compare and contrast common network vulnerabilities and threats
- 3.3 Given a scenario, implement network hardening techniques
- 3.4 Compare and contrast physical security controls
- 3.5 Given a scenario, install and configure a basic firewall
- 3.6 Explain the purpose of various network access control models
- 3.7 Summarize basic forensic concepts
- 4.1 Given a scenario, implement the following network troubleshooting methodology
- 4.2 Given a scenario, analyze and interpret the output of troubleshooting tools
- 4.3 Given a scenario, troubleshoot and resolve common wireless issues
- 4.4 Given a scenario, troubleshoot and resolve common copper cable issues
- 4.5 Given a scenario, troubleshoot and resolve common fiber cable issues
- 4.6 Given a scenario, troubleshoot and resolve common network issues
- 4.7 Given a scenario, troubleshoot and resolve common security issues
- 4.8 Given a scenario, troubleshoot and resolve common WAN issues
- 5.10 Given a scenario, configure and apply the appropriate ports and protocols
- 5.2 Explain the basics of network theory and concepts
- 5.3 Given a scenario, deploy the appropriate wireless standard
- 5.4 Given a scenario, deploy the appropriate wired connectivity standard
- 5.5 Given a scenario, implement the appropriate policies or procedures
- 5.7 Given a scenario, install and configure equipment in the appropriate location using best practices
- 5.8 Explain the basics of change management procedures
- 5.9 Compare and contrast the following ports and protocols
- Activation Options
- Applications for Cryptography
- Azure Cloud Stuff
- BASH CLI Scripting
- Benefits in migrating to the cloud
- CASP: 802.1X
- CCNA
- Certs
- Cloud Deployment Models
- Cloud Service Models
- Cloud's Scalability
- Common Security Principles
- Common Security Threats
- Common Vulnerabilities
- Compare and contrast the use of networking services and applications
- Compensating Controls and Architecture
- Configure DCB and MPIO
- Configure Disks and Volumes
- Configure iSCSI Target and Initiator
- Configure Shares
- Configure Virtual NICs
- Configure Virtual Switches
- Configuring a Network Adapter
- Configuring Basic Networking
- Converting File Systems
- Create and Manage Standard Switches
- Create Manage and Maintain Images
- Cryptanalysis
- CSIRT Roles and Communication
- CySa Stuff
- Data Correlation and Analytics
- Debian Package Management
- Desired State Configuration
- Diagnosing Network Connections
- Digital Forensics: Search and Seizure
- Executing Commands
- Executing Scripts
- External VM Stuff
- File and Folder Permissions
- File Permissions
- File System Hierarchy
- File System Snapshots
- File Systems
- Finding Files
- Forensic Investigation Process
- Forensic Suites and Utilities
- Forensics Toolkit
- GNU nano
- Hyper V
- Identity and Access Management (IAM)
- Implement Data Deduplication
- Incident Response Plan
- Indicator of Compromise: Network Symptoms
- Install and configure the following networking services applications
- Install Server Core
- Installing Configuring OpenVPN in Linux
- Installing & Setting Up pfSense
- Installing from Source
- Installing pfSense
- JavaScript
- Linux Command Line Tools
- Linux Scripting
- Linux Security Techniques
- Linux: Choosing a File System
- Linux: Email
- Linux: Getting Help
- Linux: Kali Linux
- Linux: Logical Volume Manager (LVM)
- Linux: Managing File Systems
- Linux: Monitoring System Logs
- Linux: Navigating the Filesystem
- Linux: Network Configuration
- Linux: Network File System (NFS)
- Linux: Network Time Protocol (NTP)
- Linux: Printers
- Linux: Samba and SMB
- Linux: SQL
- Linux: System Storage Manager (SSM)
- Linux: Working with XFS
- Managing & Maintaining pfSense
- Managing Groups
- Managing Name Resolution
- Managing Processes
- Managing System Time
- Managing User Accounts
- Migrate Servers
- Nano Server
- Navigating the Filesystem
- Network Design
- Networking
- Number Theory and Asymmetric Cryptography
- OSI Deep Dive
- OSI Layers
- Other Useful Commands
- PKI
- PowerShell Basics
- PowerShell Command History and Aliases
- PowerShell: Basic Functions
- PowerShell: Drives
- PowerShell: Module Basics
- PowerShell: Piping and Formatting
- PowerShell: Profiles
- PowerShell: Script Execution Policy
- PowerShell: Writing a Script
- PowerShell: Writing Another Script
- Preparing pfSense
- Processing Text Using Filters
- Programing
- Reconnaissance: Email
- Reconnaissance: Interpreting Results
- Reconnaissance: logs
- Reconnaissance: Social Media
- Reconnaissance: Tools
- Recovery and Post Incident Response
- Redhat Package Management
- Roles and Features
- Scan Results Verification
- Scheduling Tasks
- Scheduling with systemd
- Secure Management
- Security Administration
- Security Architectures and Toolsets
- Security Practices: Penetration Testing
- Security Practices: Reverse Engineering
- Security Practices: Training and Risk Evaluation
- Security Tools and Technologies
- Security: Incident Response Procedures for DF
- Security: App Security Controls
- Security: Basic Concepts of Cryptography
- Security: Best Practices and Secure Configuration Guides
- Security: Cloud and Virtualization
- Security: Common Account Management Practices
- Security: Components used to create a secure network design
- Security: Cryptography Algorithms
- Security: Data Security and Privacy Practices
- Security: Disaster Recovery and Business Continuity
- Security: Hardware and Software Orgranizational Security
- Security: How to Analyze and Interpret Output from Security Technologies
- Security: How to Deploy Mobile Security
- Security: Identity and Access Management Controls
- Security: Identity and Access Services
- Security: Impact Business Analysis
- Security: Impact of Various Vulnerabilities
- Security: Incident Response Procedures
- Security: Mitigation and Deterrents
- Security: Network Administration Principles
- Security: Penetration Testing Concepts
- Security: Physical Security
- Security: Physical Security & Awareness
- Security: Policies, Plans, and Procedures
- Security: Public Key Infrastructure
- Security: Risk
- Security: Risk Management & Incident Response
- Security: Secure Application Development and Deployment
- Security: Secure Protocols
- Security: Secure Staging Deployment
- Security: Secure System Design
- Security: Securing Network Devices
- Security: Security Implications of Embedded System
- Security: Social Engineering Attacks
- Security: Software based Security Posture Assessment
- Security: Threat Vector Types and Attributes
- Security: Troubleshoot Common Security Issues
- Security: Types of Attacks
- Security: Types of Malware.
- Security: Types of Wireless Attacks
- Security: Using Resiliency and Automation to Reduce Risk
- Security: Vulnerability Scanning & Pen Testing
- Security: Vulnerability Scanning Concepts
- Server Management Options
- Setting up a Lab Environment
- Severity and Prioritization
- Shared Resources: Shares and Printer Sharing
- Software Development Security
- Storage Replica
- TCP IP
- Terminals and Shells
- Troubleshooting Application Networking
- Troubleshooting Networking
- Understand Basic Cryptography Concepts
- Using the Host Client to configure an ESXi host
- vi and vim
- Virtual Hard Disks
- Virtualization Concepts
- Virtualization Stuff
- VMware Tools
- VPN Types
- vSphere ESXi 7.0 Host Installation
- Vulnerability Management
- What Allows a VM to Work?
- What are the Hardware Requirements for ESXi?
- What is a Software Defined Data Center (SDDC)?
- What is the Direct Console User Interface (DCUI)?
- Windows Active Directory Domains
- Windows Containers
- Windows Dynamic Deployment
- Windows Server 2016 editions
- Working with Files