About my certifications and how to earn Microsoft certifications
Power Automate, Power Apps, Power BI, Power Pages
Creating, managing, auditing, and disabling user accounts in an organization. Security groups are added to accounts to provide access to corporate resources. Access needs to be monitored and adjusted appropriately and removed promptly when someone leaves the organization.
Using API's, scripts, and software to complete time consuming and monotonous tasks. E.G. copying and pasting data from a ticketing system to an Excel sheet.
Bluetooth: used to connect two devices that are close to each other (~30 feet). Common in wireless earbuds, wireless printers, etc. Switches frequency hundreds of times a second. Devices have to be paired first
NFC: connect device over very short distances (~4 inches). Commonly used for mobile payments, like Google Pay
(Dynamic Host Configuration Protocol) -- allows for automatically assigning and reserving IP addresses for connected devices. Can provide default gateway, domain name, DNS servers and time servers info to devices. It is like the road map of the network.
In a small office / residential setting DHCP is often handled by the router. In an enterprise setting DHCP runs on a server instance and device connect and renew IP leases.
(Domain Name System) - provides a naming system for resources on the internet or other IP networks. Converts a common name to the IP address of the resource. It consists of a set of distributed servers maintain the domain name hierarchy and IP address spaces for the internet.
Convert plain-text into a form that is unreadable without a decryption key. Ensures confidentiality and protects data at rest and it transit in data transmissions. You can employ symmetric (where both sender / receiver have the same key) or public keys (where the only the receiver has the key to decrypt).
TLS (transport layer security): uses encryption to provide secure communications for services like email, VoIP phones, HTTPS requests and more. Runs in the Application layer.
A network device (or software) that monitors network traffic and allows or blocks inbound / outbound traffic on the network based on rules. They evaluate packets against an number of criteria:
Firewalls are used to protect corporate networks from the public internet and on individual devices as part of the overall security suite.
Open Systems Interconnection model) - rules / concepts that are used in data transmission and troubleshooting network issues.
There are 7 layers:
Uses psychological manipulation (fear, urgency, empathy) to get a person to share sensitive data or take an action, like opening a link. Phishing is the most common social engineering attack.
A type of attack in which perpetrators create fake webpages, email addresses, phone number and domains that look legitimate, but are not. Victims then divulge private information.
An attack in which the victim’s files are encrypted and the attacker demands payment to decrypt the files. The file name extensions change and the victim can’t open there own documents.
HDMI
USB
USB-C
DVI
VGA
Used to direct network traffic to the correct services, E.G. port 443 for HTTPS traffic.
VLAN
Trunk
Switch
MDF / IDF
More to come
More to come
5G, 2.4G
More to come
Hypervisor
VMWare
More to come
Bluetooth: used to connect two devices that are close to each other (~30 feet). Common in wireless earbuds, wireless printers, etc. Switches frequency hundreds of times a second. Devices have to be paired first
NFC: connect device over very short distances (~4 inches). Commonly used for mobile payments, like Google Pay
More to come
More to come
More to come
More to come
More to come
Copyright © 2024 TeckWorm - All Rights Reserved.
Powered by GoDaddy