Comptia Security+, Security, Technology

Comptia Security+ (SY0-501) Study Notes

I am working my way through the online course “Cert Prep: CompTIA Security+” by Michael Chapple. This is available on Lynda and LinkedIn Learning. These are my study notes- Section 1 – Threats, Attacks and Vulnerabilities 1.1 Malware 1.2 Understanding Attackers 1.3 Understanding Attack Types 1.4 Application Attacks 1.5 Vulnerability Scanning and Penetration Testing 1.6 Impact of Vulnerabilities   Section…

Continue Reading
PowerShell, Technology

Powershell: Automating Exiting Users

Introduction I have being playing around with Powershell a lot more lately and trying to learn and utilise it as much as possible. One of the repetitive tasks we deal with is when a student exits the school. There are a number of steps in AD that have to be undertaken each time a student leaves. These include: Disable the…

Continue Reading
PowerShell, Technology, Uncategorized

PowerShell Resources

As a Sys Admin, I am probably a bit late to the party with how useful PowerShell can be. I have lately completed a couple of online courses about PowerShell and am trying to use it as much as I can in my day to day work. I am finding it incredibly useful in work and relatively easy to pick…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 4.4 Account Management

1. Understanding account and privilege management Account Management Tasks: implement the principles of least privilege: An individual should only have the minimum set of privileges necessary to complete their assigned job duties Implement separation of duties: Performing sensitive actions should require the collaboration of two individuals implementing job rotation schemes: regularly move people between jobs to prevent fraud managing the…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 4.3 Authorisation

1. Understanding Authorisation Authorisation is the final step in the access control process. Once an individual successfully authenticates to a system, authorisation determines the privileges that individual has to access resources and information. 2 Principles of Authorisation Principal of Least Privilege: This principle states that an individual should have only the minimum set of permissions necessary to accomplish his or…

Continue Reading