All posts by Tuna Peyo

IT security guidelines

Jan 6,85

Here are some IT security guidelines you should have in mind when designing your IT infrastructure: Rule of least privilege …

Read More

Hacking methodology

Jan 5,85

Although there is no specific step-by-step methodology used by all hackers, a typical hacking process comprises of the following steps: …

Read More

Risk and countermeasure definition

Jan 4,85

Two more IT security terms we need to define before moving on more advanced topics are: risk – in IT security, …

Read More

Basic security terms

Jan 3,85

Before we start to implement security policies and mechanisms, we need to define some basic security terms: asset – anything …

Read More

Confidentiality, Integrity, and Availability (CIA) triad

Jan 2,85

The CIA (Confidentiality, Integrity, and Availability) triad is a well-known model for security policy development. The model consists of these …

Read More

CCNA Security online course

Jan 1,85

About this course This course teaches you how to secure Cisco routers and switches and their associated networks. The course covers most of the …

Read More
Geek University 2022