Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 

Linear Barcodes used in Press

Press and magazines usually come with a barcode that is located in the last page or back cover of these publications. This post tries to clarify the use of this barcode. Breakdown of Linear Barcodes used in Press ISSN (International Standard Serial Number) is a code that identifies a periodical publication. ISSN follows the standard […]

Comments { 0 }

List of VPN Protocols

This post summarizes the most common VPN (Virtual Private Network) protocols: PPTP L2TP SSH OpenVPN IPsec External references “CISSP 9th Edition”, Chapter 12

Comments { 0 }

ISO/IEC 27001 Lead Implementer Certifications

ISO/IEC 27001 Lead Implementer Do not confuse this certification with ISO 27001 Lead Auditor certification. List of ISO/IEC 27001 Lead Implementer certifications: PECB ISO/IEC 27001 Lead Implementer CertiProfISO 27001 Lead Implementer List of ISO/IEC 27001 Lead Implementer course: ISMS.online IAF (International Accreditation Forum) issued the document “Knowledge Requirements for Accreditation Body Personnel for Information Security […]

Comments { 0 }

Certifications for Windows Security Administration

This post lists some professional certifications for administration of Windows operating systems. List of certifications for Windows administration: Microsoft Certified: Security Operations Analyst GIAC’s GCWN Microsoft 365 Certified: Security Administrator Associate List of certifications for Windows Administration Microsoft Certified: Security Operations Analyst Certification is “Microsoft Certified: Security Operations Analyst”. https://docs.microsoft.com/en-us/learn/certifications/security-operations-analyst/ Exam related to this certification […]

Comments { 0 }

How to get CISSP-ISSAP certification

CISSP-ISSAP (Information Systems Security Architecture Professional) is a certification issued by (ISC)2. CISSP (Certified Information Systems Security Professional) is another certification issued by (ISC)2 that is a pre-requirement for CISSP-ISSAP. Certifications that require CISSP as a pre-requiriment is called CISSP concentration. There are three CISSP concentrations: CISSP-ISSAP: Architecture CISSP-ISSEP: Engineering CISSP-ISSMP: Management This post is […]

Comments { 0 }

How to get GDSA Certification

GIAC Defensible Security Architecture (GDSA) is an IT certification provided by Global Information Assurance Certification (GIAC), that is linked to training courses provided by SANS. This certificate was first issued in May 2019. The news about the launch can be find on this link.   FAQ about GDSA What are the requirements to get certification? […]

Comments { 0 }

How to get GISP Certification

GIAC Information Security Professional (GISP) is an IT certification provided by Global Information Assurance Certification (GIAC), that is linked to training courses provided by SANS. Do not confuse GIAC’s GISP with another certification related to GIS that shares the same acronym GISP, standing for GIS Professional. FAQ about GISP What are the requirements to get […]

Comments { 0 }

How to get Info from default Settings of a wireless Device

When a wireless device has default settings from manufacturer, some info can be inferred from it. From a security point of view this is a weakness, because malicious users can leverage this data to identify quicker the possible vulnerabilities linked to that device. Settings from wireless device that can provide info about itself: Organizational Unit […]

Comments { 0 }

Search Engines for the deep Web

This post lists some popular portals to search content in the deep web. List of portals to search content in the deep web featured in this post: The Hidden Wiki Torch NotEvil Ahmia OnionLinks DuckDuckGo In order to see content in the deep web you need to be in the Tor network. It is recommended […]

Comments { 0 }

How to crack WPA2

Wi-Fi Protected Access 2 (WPA2) is one of the most widespread security standards for wireless networks. It has been replaced by more recent WPA3, but as of 2021 WPA2 is still more spread. This post explains briefly what is WPA2, its vulnerabilities, how to strengthen a WPA2 network and how to crack it. What is […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional