February 27, 2020

Current events prove that 2020 will see the unfortunate continuation of the fight for privacy as a basic human right across the globe. Technology created by just a handful of major organizations continue to weave together the fabrics of our lives, and the commercial va...

November 1, 2019

Type juggling is a feature within PHP which provides developers some flexibility in comparing variables. It is derived from “loose comparison” (denoted with ==):

As one could determine from the comparison charts, “strict” comparison requires a value to be exactly accura...

October 2, 2019

In computing terms, cryptography is one of the primary technical methods by which individuals and organizations protect against the disclosure of their sensitive information. This is accomplished through the development and implementation of complex mathematical calcul...

July 8, 2019

Domain 8: Software Development Security

8.1 Understand and integrate security in the Software Development Life Cycle

Programming Concepts

  • Machine Code is binary language built into a CPU. Just above that is assembly language, which are low level commands. Humans use s...

July 8, 2019

Domain 7: Security Operations

7.1 Understand and support investigations


  • Digital Forensics – focuses on the recovery and investigation of material found in digital devices, often related to computer crime. Closely related to incident response as it is based o...

July 8, 2019

Domain 6: Security Assessment and Testing

6.1 Design and validate assessment, test and audit strategies

  • Spans many areas:

    • Policies/procedures and other admin controls

    • Change management – primary goal is to ensure changes don’t reduce security

    • ...

July 8, 2019

Domain 5: Identity and Access Management

5.1 Control physical and logical access to assets

  • IAAA Five elements:

    • Identification – claiming to be someone

    • Authentication – proving you are that person

    • Authorization – allows you to access resources


July 8, 2019

Domain 4: Communication and Network Security

4.1 Implement secure design principles in network architectures

Communications and Network Security

  • OSI Model – Please Do Not Teach Students Pointless Acronyms. Developed by ISO

  • Encapsulation is when the payload has t...