• Community
    • Join Discord
    • Industry News
    • Discussions
    • Contact & Support
  • Learn
    • Featured Courses
    • All Courses
    • Categories
      • Cybersecurity Fundamentals
      • Networking Security
      • Application Security
      • Ethical Hacking
      • Cloud Security
  • Resources
    • Blog
    • Ebooks
    • Podcasts
    • Webinars
  • Pricing
  • About Cybr
    Sign in Sign up

    Cybr logo badge

    Cybr logo badge

    • Community
      • Join Discord
      • Industry News
      • Discussions
      • Contact & Support
    • Learn
      • Featured Courses
      • All Courses
      • Categories
        • Cybersecurity Fundamentals
        • Networking Security
        • Application Security
        • Ethical Hacking
        • Cloud Security
    • Resources
      • Blog
      • Ebooks
      • Podcasts
      • Webinars
    • Pricing
    • About Cybr
    Sign in Sign up

    Tag: CompTIA Security+

    Network segmentation explanation for the CompTIA Security+ certification exam

    Network segmentation

    Network segmentation is a really important topic to understand for IT in general, but also for security. As we deploy resources in our networks, creating…

    Christophe February 10, 2023
    0 Comments
    Jump servers (aka bastion hosts) explanation for the CompTIA Security+

    Jump servers (aka bastion hosts)

    One of the challenges with having network segmentation is that it not only prevents attackers from accessing private networks and private resources, but it also…

    Christophe February 9, 2023
    0 Comments
    What you need to know about bluejacking and bluesnarfing for the Security+ exam

    Bluesnarfing and Bluejacking

    Studying for the Security+ exam? Here’s a quick and easy read for a topic covered in the exam objectives. What is bluesnarfing? If you were…

    Christophe February 8, 2023
    0 Comments
    Biometrics banner image

    Biometrics techniques and concepts for authentication

    We talked about how biometrics can be used for multifactor authentication in order to verify someone’s identity. Biometric authentication refers to something you are (as…

    Christophe September 27, 2022
    0 Comments
    Key stretching banner image

    Key stretching concepts and algorithms

    One of the best ways to make a password strong is to make it long. The longer the password is, the harder it is to…

    Christophe July 31, 2022
    0 Comments
    Hashing use cases

    Hashing use cases

    In practice, what is hashing used for? How is it being used in the real world? Let’s take a look at a few common hashing…

    Christophe July 18, 2022
    0 Comments
    Hash tables and rainbow table attacks banner

    Hash Tables, Rainbow Table Attacks, and Salts

    As we talked about, applications that properly handle passwords don’t actually store the passwords themselves in databases, but instead, store hashes of passwords. That’s why…

    Christophe July 11, 2022
    0 Comments
    Multi-Factor Authentication factors and attributes banner

    Multifactor authentication (MFA) factors and attributes

    Password-based authentication has been proven time and time again to be a vulnerable form of authentication. One of the best defenses is using Multifactor Authentication,…

    Christophe July 3, 2022
    0 Comments
    Banner for plaintext versus encrypted versus hashed passwords

    Encrypted versus hashed passwords. What’s the difference?

    As you study for the CompTIA Security+ exam, it’s important that you understand the differences between plaintext, encrypted, and hashed passwords. It’s common to hear…

    Christophe June 25, 2022
    0 Comments
    Vulnerability scanning for the Security+ exam banner

    What to know about vulnerability scans for the Security+ exam

    Regularly auditing systems for potential vulnerabilities is an important part of securing an organization’s environments, systems, and applications. One of the ways that we can…

    Christophe April 1, 2022
    0 Comments

    Get notified of new posts

    Recent Posts

    • Network segmentation
    • Jump servers (aka bastion hosts)
    • Bluesnarfing and Bluejacking
    • Biometrics techniques and concepts for authentication
    • Key stretching concepts and algorithms

    Categories

    • Announcements
    • Application Security
    • Beginner
    • Career
    • Certifications
    • Cloud Security
    • Community
    • Cybersecurity
    • Cybersecurity Fundamentals
    • Ethical Hacking
    • Incident Response
    • Intermediate
    • Network Security
    • Programming Languages
    • Scripting

    Recent Comments

    • lifengquan52 on SQL Injections explained
    • Christophe on Performance-based Questions #1
    • pep on Performance-based Questions #1
    • lifengquan52 on Creating a home lab environment
    • Christophe on Performance-based Questions #1
    Cybr logo badge
    © 2023 - Cybr, Inc
    • Contact
    • Courses
    • Discord
    • Terms of Service
    • Privacy Policy

    Report

    There was a problem reporting this post.

    Harassment or bullying behavior
    Contains mature or sensitive content
    Contains misleading or false information
    Contains abusive or derogatory content
    Contains spam, fake content or potential malware

    Block Member?

    Please confirm you want to block this member.

    You will no longer be able to:

    • See blocked member's posts
    • Mention this member in posts

    Please allow a few minutes for this process to complete.

    Report

    You have already reported this .