What Are Algorithms and Are They Biased Against Me? #Root

What Are Algorithms and Are They Biased Against Me?
https://www.bloomberg.com/news/articles/2020-12-11/what-are-algorithms-and-are-they-biased-against-me-quicktake?srnd=premium-canada

Mutual Funds Bleed $469 Billion as ETFs Triumph in Zero-Sum 2020: https://www.bloomberg.com/news/articles/2020-12-13/mutual-funds-bleed-469-billion-as-etfs-triumph-in-zero-sum-2020?srnd=premium-canada

Airbnb Reaches $47 Billion Value in Above-Range IPO
https://www.bloomberg.com/news/articles/2020-12-09/airbnb-is-said-to-reach-47-billion-value-in-above-range-ipo?srnd=premium-canada

TD Sees Big Role for AI in Fraud Detection, Lending Decisions
https://www.bloomberg.com/news/articles/2020-12-10/td-sees-big-role-for-ai-in-fraud-detection-lending-decisions?srnd=premium-canada

*** . *** *** . *** . *** . ***

Courses: http://Training.SitesTree.com (Big Data, Cloud)
Blog
: http://Bangla.SaLearningSchool.com, http://SitesTree.com

8112223 Canada Inc./JustEtc: http://JustEtc.net

Online Product Database: http://www.ShopForSoul.com/ (Ecommerce Product Database)
Linkedin: https://ca.linkedin.com/in/sayedjustetc From: http://sitestree.com/what-are-algorithms-and-are-they-biased-against-me/
Categories:Root
Tags:
Post Data:2020-12-13 17:45:58

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

#Bullies Are a Thing on LinkedIn, Too

Call BullyingCanada Now (I do not know if this is a legitimate organization to get help. Find out)

https://www.bullyingcanada.ca/get-help/

Bullies Are a Thing on LinkedIn, Too

https://medium.com/swlh/bullies-are-a-thing-on-linkedin-too-50f81cadfde3

Social Media Bullying — On LinkedIn?

https://medium.com/dayone-a-new-perspective/social-media-bullying-on-linkedin-518046d59904

Add To Your LinkedIn ‘Superpowers’ By Building A Bully-Alert System

https://www.forbes.com/sites/forbescoachescouncil/2020/01/17/add-to-your-linkedin-superpowers-by-building-a-bully-alert-system/?sh=18a61b10116a

What is the #decidetobe kind movement?

https://linkedexpress.ca/decide-to-be-kind/

LinkedIn’s stance on bullying, harassment and threats

https://reportharmfulcontent.com/report/where-is-the-content-posted/linkedin/no/bullying-harassment-and-threats/?lang=en

What to do if you’re being bullied online

https://ben.org.uk/our-services/health-and-wellbeing/top-searches/bullying/what-is-cyber-bullying/what-to-do-if-youre-being-bullied-online/

The experts are not really that experts #Root

The experts are not really that experts. " I mean that literally; there is no valid science to estimating stock prices, interest rates, inflation, bond yields, gold, bitcoin or whatever 12 months out." https://lnkd.in/eY3ghaV

https://lnkd.in/e3zkWNU

https://lnkd.in/dmYAHKE

*** . *** *** . *** . *** . ***

Courses: http://Training.SitesTree.com (Big Data, Cloud)
Blog
: http://Bangla.SaLearningSchool.com, http://SitesTree.com

8112223 Canada Inc./JustEtc: http://JustEtc.net

Online Product Database: http://www.ShopForSoul.com/ (Ecommerce Product Database)
Linkedin: https://ca.linkedin.com/in/sayedjustetc From: http://sitestree.com/the-experts-are-not-really-that-experts/
Categories:Root
Tags:
Post Data:2020-12-12 13:21:13

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

On Self Driving Cars #Root

Autoware is the world’s first "all-in-one" open-source software for self-driving vehicles. T

https://github.com/Autoware-AI/autoware.ai

https://www.youtube.com/user/hatemtem/playlists

Code: Autoware
https://autoware.readthedocs.io/en/feature-documentation_rtd/index.html

https://autoware.readthedocs.io/en/feature-documentation_rtd/DevelopersGuide/PackagesAPI/detection/lidar_kf_contour_track.html

*** . *** *** . *** . *** . ***

Courses: http://Training.SitesTree.com (Big Data, Cloud)
Blog
: http://Bangla.SaLearningSchool.com, http://SitesTree.com

8112223 Canada Inc./JustEtc: http://JustEtc.net

Online Product Database: http://www.ShopForSoul.com/ (Ecommerce Product Database)
Linkedin: https://ca.linkedin.com/in/sayedjustetc From: http://sitestree.com/on-self-driving-cars/
Categories:Root
Tags:
Post Data:2020-12-10 22:03:19

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Buy value ETFs and enjoy the profits. #Root

However, do not act just because I said, these are for your own research only

Portfolios
https://www.blackrock.com/ca/individual/en/products/product-list#!type=iSharesETFCA&tab=overview&view=list&fac=43521

Choose yourself:
https://www.blackrock.com/ca/individual/en/products/product-list#!type=iSharesETFCA&tab=overview&view=list

Only Ishare above, search for similar lists for Vanguard, Invesco, Horizon, Scwab, Fidelity, Major Bank Provided ETFs, and similar. We have no relation/affiliation with any

Buy value ETFs and enjoy the profits.

https://money.usnews.com/investing/slideshows/the-10-best-etfs-for-value-investors

  • WisdomTree U.S. LargeCap Dividend ETF (DLN)
  • iShares Russell Top 200 Value ETF (IWX)
  • Schwab U.S. Large-Cap Value ETF (SCHV)
  • Vanguard Value ETF (VTV)
  • Invesco FTSE RAFI US 1000 ETF (PRF)
  • iShares S&P 500 Value ETF (IVE)
  • Vanguard S&P 500 Value ETF (VOOV)
  • Vanguard Mega Cap Value ETF (MGV)
  • Vanguard Russell 1000 Value ETF (VONV)
  • iShares Core S&P US Value (IUSV)

IUSV
https://www.morningstar.ca/ca/report/etf/performance.aspx?t=0P00002D93&lang=en-CA

XUS
https://www.morningstar.ca/ca/report/etf/performance.aspx?t=0P0000YUAU&lang=en-CA

FCUV

https://www.morningstar.ca/ca/report/etf/performance.aspx?t=0P0001K2UC&lang=en-CA

VTV

https://www.morningstar.ca/ca/report/etf/performance.aspx?t=0P00002DBX&lang=en-CA


XGRO:
https://www.blackrock.com/ca/individual/en/products/239447/ishares-balanced-growth-coreportfoliotm-fund

Portfolios in one ETF:
https://www.blackrock.com/ca/individual/en/products/product-list#!type=iSharesETFCA&tab=overview&view=list&fst=50567%7C50572&fac=43521

*** . *** *** . *** . *** . ***

Courses: http://Training.SitesTree.com (Big Data, Cloud)
Blog
: http://Bangla.SaLearningSchool.com, http://SitesTree.com

8112223 Canada Inc./JustEtc: http://JustEtc.net

Online Product Database: http://www.ShopForSoul.com/ (Ecommerce Product Database)
Linkedin: https://ca.linkedin.com/in/sayedjustetc

*** . *** *** . *** . *** . ***

Courses: http://Training.SitesTree.com (Big Data, Cloud)
Blog
: http://Bangla.SaLearningSchool.com, http://SitesTree.com

8112223 Canada Inc./JustEtc: http://JustEtc.net

Online Product Database: http://www.ShopForSoul.com/ (Ecommerce Product Database)
Linkedin: https://ca.linkedin.com/in/sayedjustetc From: https://sitestree.com/buy-value-etfs-and-enjoy-the-profits/
Categories:Root
Tags:
Post Data:2020-11-28 12:19:46

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Calculus: Cheat Sheets: Derivatives: Integration #Root

calculus cheat sheet complete

https://www.anderson1.org/cms/lib/SC01000609/Centricity/Domain/1150/calculus%20cheat%20sheet%20complete.pdf

calculus_cheat_sheet_integrals.pdf

https://tutorial.math.lamar.edu/pdf/calculus_cheat_sheet_integrals.pdf

Calculus Summary Formulas

https://sites.stat.washington.edu/people/handcock/505/Lectures/lec6.pdf

Calculus II For Dummies Cheat Sheet

https://www.dummies.com/education/math/calculus/calculus-ii-for-dummies-cheat-sheet/

*** . *** *** . *** . *** . ***

Courses: http://Training.SitesTree.com (Big Data, Cloud)
Blog
: http://Bangla.SaLearningSchool.com, http://SitesTree.com

8112223 Canada Inc./JustEtc: http://JustEtc.net

Online Product Database: http://www.ShopForSoul.com/ (Ecommerce Product Database) From: http://sitestree.com/calculus-cheat-sheets-derivatives-integration/
Categories:Root
Tags:
Post Data:2020-10-16 14:35:01

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Predicting the Future of the Web Development (2020 and 2025) #Root

Web Development Misc.

2020 Top Web Development Trends
https://www.youtube.com/watch?v=Pw8U9l8acPA

Frontend vs Backend vs Fullstack Web Development – What should you learn? https://www.youtube.com/watch?v=pkdgVYehiTE

Predicting the Future of the Web Development (2020 and 2025)
https://www.youtube.com/watch?v=24tQRwIRP_w

*** . *** *** . *** . *** . ***

Courses: http://Training.SitesTree.com (Big Data, Cloud)
Blog
: http://Bangla.SaLearningSchool.com, http://SitesTree.com

8112223 Canada Inc./JustEtc: http://JustEtc.net

Online Product Database: http://www.ShopForSoul.com/ (Ecommerce Product Database)
Linkedin: https://ca.linkedin.com/in/sayedjustetc From: https://sitestree.com/predicting-the-future-of-the-web-development-2020-and-2025/
Categories:Root
Tags:
Post Data:2020-10-11 21:43:33

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Magento 2 Useful and Important CLI Commands List #Root

"Cache CLI (Status, Enable, Disable, Clean, Flush)

php bin/magento cache:clean Cleans cache type(s) php bin/magento cache:disable Disables cache type(s) php bin/magento cache:enable Enables cache type(s) php bin/magento cache:flush Flushes cache storage used by cache type(s) php bin/magento cache:status" Checks cache status

"

Also Check:
http://bangla.salearningschool.com/recent-posts?s=bin%2Fmagento

Also Check:
http://bangla.salearningschool.com/recent-posts?s=magento

Also, Check:
Youtube.com/channel/UCHrtq0pV8mEuTLGd2-Lp9ig/playlists

Check the details at:
Magento 2 Useful and Important CLI Commands List

Ref: https://hiteshvaghasiya.com/magento-2-daily-useful-cli-commands-list

*** . *** *** . *** . *** . ***

Sayed Ahmed

BSc. Eng. in Comp. Sc. & Eng. (BUET)
MSc. in Comp. Sc. (U of Manitoba, Canada)
MSc. in Data Science and Analytics (Ryerson University, Canada)
Linkedin: https://ca.linkedin.com/in/sayedjustetc

Training Courses: http://Training.SitesTree.com
Blog
: http://Bangla.SaLearningSchool.com, http://SitesTree.com

8112223 Canada Inc/Justetc: http://JustEtc.net
Youtube: https://www.youtube.com/channel/UCHrtq0pV8mEuTLGd2-Lp9ig/playlists
Medium: https://medium.com/@SayedAhmedCanada

Facebook Groups/Forums to discuss (Q & A):
https://www.facebook.com/salearningschool

https://www.facebook.com/banglasalearningschool
https://www.facebook.com/justetcsocial

Get access to courses on Big Data, Data Science, AI, Cloud, Linux, System Admin, Web Development and Misc. related. Also, create your own course to sell to others. http://sitestree.com/training/

Join, Discuss, and Thrive:
Finance: https://www.facebook.com/groups/1792339521056034

Bangladesh and Canada: https://www.facebook.com/groups/398414183875009

Bangladesh: IT & Eng: Canada: https://www.facebook.com/groups/480297675634630

BUETians in Ontario: https://www.facebook.com/groups/371982239854027

Worldwide IT: https://www.facebook.com/groups/28362061867

JustEtc: https://www.facebook.com/JustETC-Technologies-Inc-289864738261 From: https://sitestree.com/magento-2-useful-and-important-cli-commands-list/
Categories:Root
Tags:
Post Data:2020-05-23 17:40:21

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Do you want to be an information security professional? #Root

Do you want to be an information security professional or an Ethical Hacker? Then you can learn by finding answers to the following questions. You can search Google, read book, or even ask the security professionals around you to get the answers. Knowing these (and doing/practicing/analyzing/thinking/applying/building/relating) for sure will help.

What you might need to know for Ethical Hacking (CEH Foundation)

First some Operating System Basics

What is an Operating System? What is a kernel?

How do Windows Kernel and Linux Kernel differ?

What is ring or layered architecture for Kernel?

What is a file system? Give examples of File System. Give some details on the File Systems that you just mentioned.

What are device drivers?

Difference between stacks and heaps?

Types of windows authentication? Local and Central

How can you backup and restore windows registry?

What is windows event viewer? How can you use to identify security incidents?

What are windows services?

Where can you see windows security policies?

What is the shell command wf.msc ?

What do the following commands do? Is there any relation to security ? tasklist, tracert, ipconfig, driverquery, cipher, assoc

What are the permission groups in Linux?

What is a IPTable in Linux? Give some IPTable related commands? Also give some related concepts. How can you use them to ensure/check security? What are input chain, output chain, forward chain?

What do the following files do in Linux/Unix? /etc/hosts.allow, /etc/hosts.deny

What do the following commands do? uname, sudo, last, diff, history, uptime, w, crontab, lsof, kill

What are TCP wrappers?

What is uid, gid in Linux? Also, what is sticky bit? What is SELinux? What is LDAP? What is Active Directory?

How can you dump all password hashes in windows? and do similar in Linux?

How can you set password policy?

What is Powershell Integrated Scripting Environment?

what does netsh.exe do?

What do the following powershell cmdlets do? Stop-Process, Get-Process, Get-eventlog, Export-csv, Get-Service, Get-Help, Get-CimInstance, Get-WmiObject

What is a Hypervisor? Types of Hypervisors?

What is a Type 1 Hypervisor? What is a Type 2 Hypervisor?

What are snapshots? How can you use this for the integrity of the Operating System and the installed software?

What are common security issues with Virtual Machines?

Unpatched Hypervisor, Insecure Management Console, Dormant virtual machines: What are these?

What are the commercial/free software to create virtual machines?

What is docker? What is Software Containerization? How can docker help? Any other alternatives to Docker?

What is Kubernetes?

What are SaaS, PaaS, IaaS?

What are cloud security considerations?

How the following can happen in Cloud? What can you do about these?
Data Loss, Account Hijacking, Insecure APIs, Denial of Service Attack, Legal Issues, Abuse by malicious insiders.

Define Confidentiality, Integrity, Availability.

Give examples of attacks that affect confidentiality?

Give examples of attacks that affect Integrity?

Give examples of attacks that affect Availability?

How do Functionality, Usability, Security interact/influence each other? Define them as well.

Define Authentication, Authorization, and Accounting (AAA)? How are they related?

What is nonrepudiation?

What is a vulnerability?

What is a zero day vulnerability?

What is an exploit? What is a Risk? What is Threat?

What are some Natural, Physical, and Human threats to Information Security?

What is Defense in Depth architecture for Information Security? (layered … )

What are the types of hackers? How do they differ?

Black Hats, White Hats, Gray Hats, Suicide Hats, Script-Kiddies, Spy Hacks, Cyber Terrorists, State Sponsored Hacks : what are these?

Difference between Hacking and ethical Hacking?

What are the steps in Incident Management?

What is a penetration testing? Does it apply to the infrastructure or the software?

What is security assessment? Is it required?

What are the types of Penetration Testing? Black, gray, White,

What are other testing for security? Announced, manual, automated

What are the steps in Penetration Testing?

What should you do in the pre-attack phase, attack phase, post-attack phase.?

Define False Positive and False Negative Security alarms?

What is Footprinting?

What are the ways hackers collect information about your organization (assets)?

How do hackers use Pipl?

What is Enumeration in the hacking process?

How can you use Maltego? https://www.paterva.com/buy/maltego-clients/maltego-ce.php . How hackers use this?

What do the following commands do? Finger, Netscan tools, superscan, nmap,

what is https://www.shodan.io/?

What is nbtstat tool?

what can you find on www.sec.gov/edgar.shtml?

Where can you trace emails? www.traceemail.com/trace-email-header.html

readnotify.com what does it do?

What are attack vectors when it comes down to web-application hacking?

Give some example of web-application flaws?

Give some example of web-application authentication flaws?

Give some example of web-application authorization flaws?

Give some example of web-application session management flaws?

Give some example of web-application input validation flaws?

Give some example of web-application configuration management flaws?

What are the steps in Web Application Hacking Methodology?
Analyze web-app, identify entry and exit points, break down components, test for vulnerability, automated security scanning, remove false positives, reporting with remediation

What can you do to mitigate and prevent the security flaws mentioned above? authentication flaws, authorization flaws, session management flaws, input validation flaws, configuration management flaws, auditing and logging flaws?

What are some advantages and risks of Wireless Networking?

What do you know about OSA authentication, Shared Key authentication and centralized authentication for Wireless Networks? At least give some examples?

What are some common Wireless Threats?

What are the steps in Wireless Hacking Methodology?
Discover Wi-fi networks, GPS Mapping, Wireless Traffic Analysis, execute attacks (), break wi-fi encryption
attacks: Fragmentation, MAC-spoofing, De-authentication, Man-in-the-middle, Evil twin

What is Spectrum Analysis? How can Bluetooth hacking happen? What is Bluetooth pairing?

What are common Bluetooth Threats?
loss personal data, hijacking, sending SMS, use airtime, malicious code, bluejacking,, blue sniffing, bluesmacking, bluesnarfing

How can you defend against bluetooth attacks? PIN change, go to hidden mode, monitor pairing, enable only when needed, review pairing requests

What are common Mobile Attack Vectors? Malware, Jailbreak, application modification

Jailbreak: enable to run all 3rd party applications, corrupt kernel

Provide some Android, and iOs security guidelines?

What is IDS? How does it work? Can IDS be used for Anomaly Detection?

What are the different types of IDS? Network Host, Log, File

What are the approaches to evade IDS? Insertion attack, DoS, Obfuscating/Encoding, Session Splicing, invalid packets, polymorphic shellcodes

What are the common Symptoms of an Intrusion?

DMZ what is it?

What are the following concepts for Firewall architecture? Bastion Host, Screened subnet, multi-homes subnet

What are the different types of firewalls? Packet, circuit, application level, stateful inspection

how to detect firewalls in the target system? What is Port Scanning? How can it help in this case?

What is firewalking? What is the purpose?

What are some possible ways to evade firewalls? IP Address spoofing, source routing, use a proxy to bypass firewalls, tunneling

What are Honeypots? What are the types? High, Low -> interactions

How can you detect Honeypots? HPING, Port Scan detect all services, Send Safe Honeypot Hunter,

What are the different types of Encryption?

What is the concept: Key Escrow?

What are DES, AES, RSA, Private key cryptography, Public Key Cryptography?

What is the Advanced Encryption Package?

Give some details on how Message Digests are used in securing and also in hacking?

What is PKI?

What is Splunk?

By

Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://Bangla.SaLearningSchool.com, http://SitesTree.com
Online and Offline Training: http://Training.SitesTree.com

If you want to contribute to the operation of this site including occasional free online training (using Skype, Zoom.us): http://Training.SitesTree.com (or charitable/non-profit work in the education sector), you can financially contribute to: safoundation at salearningschool.com using Paypal. Sometime, we also provide

Affiliate Links:
Hottest Deals on Amazon USA: http://tiny.cc/38lddz

Hottest Deals on Amazon CA: http://tiny.cc/bgnddz

Hottest Deals on Amazon Europe: http://tiny.cc/w4nddz

Reference: Certified Ethical Hacker Guide, S. A. Rahalkar From: https://sitestree.com/do-you-want-to-be-an-information-security-professional/
Categories:Root
Tags:
Post Data:2019-11-21 21:40:17

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Must know for an Information Security Professional (A CISSP professional will know these in general) #Root

Must know for an Information Security Professional (A CISSP professional will know these in general) . Want to be a security professional, learn these as well.

What is a security policy?

What are policies in general?

What are the different types of Security Controls?

Give examples of Audit Trail.

Give examples of security guard.

Difference between authentication and authorization

Can SSO be decentralized? How can you implement that? Just examples are good.

What is the least privilege policy?

What is a job rotation policy?

TACAS, RADIUS what are these? Does your organization need to use these? In what cases? Is it a good fit?

Give examples of access control attacks?

Give examples of Social Engineering?

What is your experience with reviewing the access configurations?

What TCP/IP, OSI, ATM, QoS?

Give examples of Network Access Control Devices?

Give examples on how Network Access Control Devices are used in your organization? How can you configure them?

Is Endpoint security a good practice? What is Endpoint security anyway?

POTS, PBX, VoIP – does your organization use these? What are the related security risks?

How can attackers inject data into video stream (video conferencing)?

Give examples of Tunneling Protocols? esp. the secured ones?

Is VPN a tunneling concept? What protocols are used on VPN?

How is IpSec data formatted? What is AH ? What is ESP?

What is the primary purpose of SSL and TLS?

What is a Syn Flood Attack.

What is spoofing?

What is VLAN? Will you implement VLAN in your organization? When?

What is the concept of Risk when it comes to organizational IT resource security?

Can your security measures mitigate all risks?

What is the relation between a security policy and local laws and regulations?

Does your organization conduct Due care and Due diligence for security?

How do you ensure confidentiality, integrity, and availability?

How is managing information lifecycle important for an organization?

To which organizations HIPAA apply?

What are Risk Avoidance, Risk transference, Risk Mitigation, Risk Acceptance?

Can Risk Acceptance be acceptable policy? Give examples…

How can you apply and ensure security in the software development lifecycle?

What are backdoors in software?

What is XSS security risk? How can you prevent XSS?

What is security testing?

Can you use white box testing as a security measure?

Should you encrypt all sensitive – data files?

Define Symmetric and Asymmetric cryptography? Give examples. Which one is more secure?

What is Hybrid cryptography, What is Hashing?

What is Social Engineering for Key Discovery?

What is a rainbow table attack?

What is PKI? How does PKI work?

What are security models?

What is Bell-Lapadula model?

What is Biba model?

what is Clark-Wilson access model.

How can XML traffic be protected?

OWASP what is it? Who sponsors OWASP?

How can Separation of duties and responsibilities help with security?

What is the last step in incident response?

What is root cause analysis?

What is change management?

How do software configuration, and configuration management help with security?

What you know About RAID? Describe in your own way.

Give example ways you can make your servers fault tolerant.

Give an example of a backup strategy for a hypothetical organization.

Give types and examples of computer crimes.

What is Shrinkwrap contract?

Give some example guidelines from ISC code of Professional Ethics.

Give examples of forensic procedures.

Give examples of Site and facility design considerations for security?

By

Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://Bangla.SaLearningSchool.com, http://SitesTree.com
Online and Offline Training: http://Training.SitesTree.com

If you want to contribute to the operation of this site including occasional free online training (using Skype, Zoom.us): http://Training.SitesTree.com (or charitable/non-profit work in the education sector), you can financially contribute to: safoundation at salearningschool.com using Paypal. Sometime, we also provide

Affiliate Links:
Hottest Deals on Amazon USA: http://tiny.cc/38lddz

Hottest Deals on Amazon CA: http://tiny.cc/bgnddz

Hottest Deals on Amazon Europe: http://tiny.cc/w4nddz From: http://sitestree.com/must-know-for-an-information-security-professional-a-cissp-professional-will-know-these-in-general/
Categories:Root
Tags:
Post Data:2019-11-19 22:29:35

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada