Page Index - Paiet/Tech-Journal-for-Everything GitHub Wiki
493 page(s) in this GitHub Wiki:
- Home
- Welcome to the Tech-Journal-for-Everything's Wiki!
- Cool Stuff:
- Networking Stuff:
- Security Stuff:
- App Security:
- Linux
- Linux - Starting CLI:
- Linux Shell Commands:
- Linux Shell Commands Plus:
- Linux - Installing Software:
- Linux - Editing Files:
- Linux - Writing Simple Shell Scripts:
- Linux Security:
- Installing Configuring OpenVPN in Linux
- Linux Administration Task:
- Linux Networking:
- PowerShell: Syntax
- PowerShell: Scripting
- 1.10 Identify the basics elements of unified communication technologies
- Please reload this page
- 1.11 Compare and contrast technologies that support cloud and virtualization
- Please reload this page
- 1.12 Given a set of requirements, implement a basic network
- Please reload this page
- 1.3 IPv4 Subnetting
- Please reload this page
- 1.4 Explain the characteristics and benefits of various WAN technologies
- Please reload this page
- 1.4 IP Addressing
- Please reload this page
- 1.5 Install and properly terminate various cable types and connectors using appropriate tools
- Please reload this page
- 1.7 Differentiate between network infrastructure implementations
- Please reload this page
- 1.9 Explain the basics of routing concepts and protocols
- Please reload this page
- 2.1 Given a scenario, use appropriate monitoring tools
- Please reload this page
- 2.2 Given a scenario, analyze metrics and reports from monitoring and tracking performance tools
- Please reload this page
- 2.3 Given a scenario, use appropriate resources to support configuration management
- Please reload this page
- 2.4 Explain the importance of implementing network segmentation
- Please reload this page
- 2.5 Given a scenario, install and apply patches and updates
- Please reload this page
- 2.6 Given a scenario, configure a switch using proper features
- Please reload this page
- 2.7 Install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices
- Please reload this page
- 3.1 Compare and contrast risk related concepts
- Please reload this page
- 3.2 Compare and contrast common network vulnerabilities and threats
- Please reload this page
- 3.3 Given a scenario, implement network hardening techniques
- Please reload this page
- 3.4 Compare and contrast physical security controls
- Please reload this page
- 3.5 Given a scenario, install and configure a basic firewall
- Please reload this page
- 3.6 Explain the purpose of various network access control models
- Please reload this page
- 3.7 Summarize basic forensic concepts
- Please reload this page
- 4.1 Given a scenario, implement the following network troubleshooting methodology
- Please reload this page
- 4.2 Given a scenario, analyze and interpret the output of troubleshooting tools
- Please reload this page
- 4.3 Given a scenario, troubleshoot and resolve common wireless issues
- Please reload this page
- 4.4 Given a scenario, troubleshoot and resolve common copper cable issues
- Please reload this page
- 4.5 Given a scenario, troubleshoot and resolve common fiber cable issues
- Please reload this page
- 4.6 Given a scenario, troubleshoot and resolve common network issues
- Please reload this page
- 4.7 Given a scenario, troubleshoot and resolve common security issues
- Please reload this page
- 4.8 Given a scenario, troubleshoot and resolve common WAN issues
- Please reload this page
- 5.10 Given a scenario, configure and apply the appropriate ports and protocols
- Please reload this page
- 5.2 Explain the basics of network theory and concepts
- Please reload this page
- 5.3 Given a scenario, deploy the appropriate wireless standard
- Please reload this page
- 5.4 Given a scenario, deploy the appropriate wired connectivity standard
- Please reload this page
- 5.5 Given a scenario, implement the appropriate policies or procedures
- Please reload this page
- 5.7 Given a scenario, install and configure equipment in the appropriate location using best practices
- Please reload this page
- 5.8 Explain the basics of change management procedures
- Please reload this page
- 5.9 Compare and contrast the following ports and protocols
- Please reload this page
- Activation Options
- Please reload this page
- Applications for Cryptography
- Please reload this page
- Azure Cloud Stuff
- Please reload this page
- BASH CLI Scripting
- Please reload this page
- Benefits in migrating to the cloud
- Please reload this page
- CASP: 802.1X
- Please reload this page
- CCNA
- Please reload this page
- Certs
- Please reload this page
- Cloud Deployment Models
- Please reload this page
- Cloud Service Models
- Please reload this page
- Cloud's Scalability
- Please reload this page
- Common Security Principles
- Please reload this page
- Common Security Threats
- Please reload this page
- Common Vulnerabilities
- Please reload this page
- Compare and contrast the use of networking services and applications
- Please reload this page
- Compensating Controls and Architecture
- Please reload this page
- Configure DCB and MPIO
- Please reload this page
- Configure Disks and Volumes
- Please reload this page
- Configure iSCSI Target and Initiator
- Please reload this page
- Configure Shares
- Please reload this page
- Configure Virtual NICs
- Please reload this page
- Configure Virtual Switches
- Please reload this page
- Configuring a Network Adapter
- Please reload this page
- Configuring Basic Networking
- Please reload this page
- Converting File Systems
- Please reload this page
- Create and Manage Standard Switches
- Please reload this page
- Create Manage and Maintain Images
- Please reload this page
- Cryptanalysis
- Please reload this page
- CSIRT Roles and Communication
- Please reload this page
- CySa Stuff
- Please reload this page
- Data Correlation and Analytics
- Please reload this page
- Debian Package Management
- Please reload this page
- Desired State Configuration
- Please reload this page
- Diagnosing Network Connections
- Please reload this page
- Digital Forensics: Search and Seizure
- Please reload this page
- Executing Commands
- Please reload this page
- Executing Scripts
- Please reload this page
- External VM Stuff
- Please reload this page
- File and Folder Permissions
- Please reload this page
- File Permissions
- Please reload this page
- File System Hierarchy
- Please reload this page
- File System Snapshots
- Please reload this page
- File Systems
- Please reload this page
- Finding Files
- Please reload this page
- Forensic Investigation Process
- Please reload this page
- Forensic Suites and Utilities
- Please reload this page
- Forensics Toolkit
- Please reload this page
- GNU nano
- Please reload this page
- Hyper V
- Please reload this page
- Identity and Access Management (IAM)
- Please reload this page
- Implement Data Deduplication
- Please reload this page
- Incident Response Plan
- Please reload this page
- Indicator of Compromise: Network Symptoms
- Please reload this page
- Install and configure the following networking services applications
- Please reload this page
- Install Server Core
- Please reload this page
- Installing Configuring OpenVPN in Linux
- Please reload this page
- Installing & Setting Up pfSense
- Please reload this page
- Installing from Source
- Please reload this page
- Installing pfSense
- Please reload this page
- JavaScript
- Please reload this page
- Linux Command Line Tools
- Please reload this page
- Linux Scripting
- Please reload this page
- Linux Security Techniques
- Please reload this page
- Linux: Choosing a File System
- Please reload this page
- Linux: Email
- Please reload this page
- Linux: Getting Help
- Please reload this page
- Linux: Kali Linux
- Please reload this page
- Linux: Logical Volume Manager (LVM)
- Please reload this page
- Linux: Managing File Systems
- Please reload this page
- Linux: Monitoring System Logs
- Please reload this page
- Linux: Navigating the Filesystem
- Please reload this page
- Linux: Network Configuration
- Please reload this page
- Linux: Network File System (NFS)
- Please reload this page
- Linux: Network Time Protocol (NTP)
- Please reload this page
- Linux: Printers
- Please reload this page
- Linux: Samba and SMB
- Please reload this page
- Linux: SQL
- Please reload this page
- Linux: System Storage Manager (SSM)
- Please reload this page
- Linux: Working with XFS
- Please reload this page
- Managing & Maintaining pfSense
- Please reload this page
- Managing Groups
- Please reload this page
- Managing Name Resolution
- Please reload this page
- Managing Processes
- Please reload this page
- Managing System Time
- Please reload this page
- Managing User Accounts
- Please reload this page
- Migrate Servers
- Please reload this page
- Nano Server
- Please reload this page
- Navigating the Filesystem
- Please reload this page
- Network Design
- Please reload this page
- Networking
- Please reload this page
- Number Theory and Asymmetric Cryptography
- Please reload this page
- OSI Deep Dive
- Please reload this page
- OSI Layers
- Please reload this page
- Other Useful Commands
- Please reload this page
- PKI
- Please reload this page
- PowerShell Basics
- Please reload this page
- PowerShell Command History and Aliases
- Please reload this page
- PowerShell: Basic Functions
- Please reload this page
- PowerShell: Drives
- Please reload this page
- PowerShell: Module Basics
- Please reload this page
- PowerShell: Piping and Formatting
- Please reload this page
- PowerShell: Profiles
- Please reload this page
- PowerShell: Script Execution Policy
- Please reload this page
- PowerShell: Writing a Script
- Please reload this page
- PowerShell: Writing Another Script
- Please reload this page
- Preparing pfSense
- Please reload this page
- Processing Text Using Filters
- Please reload this page
- Programing
- Please reload this page
- Reconnaissance: Email
- Please reload this page
- Reconnaissance: Interpreting Results
- Please reload this page
- Reconnaissance: logs
- Please reload this page
- Reconnaissance: Social Media
- Please reload this page
- Reconnaissance: Tools
- Please reload this page
- Recovery and Post Incident Response
- Please reload this page
- Redhat Package Management
- Please reload this page
- Roles and Features
- Please reload this page
- Scan Results Verification
- Please reload this page
- Scheduling Tasks
- Please reload this page
- Scheduling with systemd
- Please reload this page
- Secure Management
- Please reload this page
- Security Administration
- Please reload this page
- Security Architectures and Toolsets
- Please reload this page
- Security Practices: Penetration Testing
- Please reload this page
- Security Practices: Reverse Engineering
- Please reload this page
- Security Practices: Training and Risk Evaluation
- Please reload this page
- Security Tools and Technologies
- Please reload this page
- Security: Incident Response Procedures for DF
- Please reload this page
- Security: App Security Controls
- Please reload this page
- Security: Basic Concepts of Cryptography
- Please reload this page
- Security: Best Practices and Secure Configuration Guides
- Please reload this page
- Security: Cloud and Virtualization
- Please reload this page
- Security: Common Account Management Practices
- Please reload this page
- Security: Components used to create a secure network design
- Please reload this page
- Security: Cryptography Algorithms
- Please reload this page
- Security: Data Security and Privacy Practices
- Please reload this page
- Security: Disaster Recovery and Business Continuity
- Please reload this page
- Security: Hardware and Software Orgranizational Security
- Please reload this page
- Security: How to Analyze and Interpret Output from Security Technologies
- Please reload this page
- Security: How to Deploy Mobile Security
- Please reload this page
- Security: Identity and Access Management Controls
- Please reload this page
- Security: Identity and Access Services
- Please reload this page
- Security: Impact Business Analysis
- Please reload this page
- Security: Impact of Various Vulnerabilities
- Please reload this page
- Security: Incident Response Procedures
- Please reload this page
- Security: Mitigation and Deterrents
- Please reload this page
- Security: Network Administration Principles
- Please reload this page
- Security: Penetration Testing Concepts
- Please reload this page
- Security: Physical Security
- Please reload this page
- Security: Physical Security & Awareness
- Please reload this page
- Security: Policies, Plans, and Procedures
- Please reload this page
- Security: Public Key Infrastructure
- Please reload this page
- Security: Risk
- Please reload this page
- Security: Risk Management & Incident Response
- Please reload this page
- Security: Secure Application Development and Deployment
- Please reload this page
- Security: Secure Protocols
- Please reload this page
- Security: Secure Staging Deployment
- Please reload this page
- Security: Secure System Design
- Please reload this page
- Security: Securing Network Devices
- Please reload this page
- Security: Security Implications of Embedded System
- Please reload this page
- Security: Social Engineering Attacks
- Please reload this page
- Security: Software based Security Posture Assessment
- Please reload this page
- Security: Threat Vector Types and Attributes
- Please reload this page
- Security: Troubleshoot Common Security Issues
- Please reload this page
- Security: Types of Attacks
- Please reload this page
- Security: Types of Malware.
- Please reload this page
- Security: Types of Wireless Attacks
- Please reload this page
- Security: Using Resiliency and Automation to Reduce Risk
- Please reload this page
- Security: Vulnerability Scanning & Pen Testing
- Please reload this page
- Security: Vulnerability Scanning Concepts
- Please reload this page
- Server Management Options
- Please reload this page
- Setting up a Lab Environment
- Please reload this page
- Severity and Prioritization
- Please reload this page
- Shared Resources: Shares and Printer Sharing
- Please reload this page
- Software Development Security
- Please reload this page
- Storage Replica
- Please reload this page
- TCP IP
- Please reload this page
- Terminals and Shells
- Please reload this page
- Troubleshooting Application Networking
- Please reload this page
- Troubleshooting Networking
- Please reload this page
- Understand Basic Cryptography Concepts
- Please reload this page
- Using the Host Client to configure an ESXi host
- Please reload this page
- vi and vim
- Please reload this page
- Virtual Hard Disks
- Please reload this page
- Virtualization Concepts
- Please reload this page
- Virtualization Stuff
- Please reload this page
- VMware Tools
- Please reload this page
- VPN Types
- Please reload this page
- vSphere ESXi 7.0 Host Installation
- Please reload this page
- Vulnerability Management
- Please reload this page
- What Allows a VM to Work?
- Please reload this page
- What are the Hardware Requirements for ESXi?
- Please reload this page
- What is a Software Defined Data Center (SDDC)?
- Please reload this page
- What is the Direct Console User Interface (DCUI)?
- Please reload this page
- Windows Active Directory Domains
- Please reload this page
- Windows Containers
- Please reload this page
- Windows Dynamic Deployment
- Please reload this page
- Windows Server 2016 editions
- Please reload this page
- Working with Files
- Please reload this page