LATEST POSTS

November 20, 2018

This is the second canon of the ISC2 Code of Ethics:

"Act honorably, honestly, justly, responsibly, and legally." 

You can ask, "why should I follow these ethics?".  Well, you don't have to.  The only ethics you have to follow are your own.  However, your certification status is contingent on following the list of ethics.  These ethics just provide a genera...

August 16, 2018

Source: https://sc1.checkpoint.com/documents/R76/CP_R76_VPN_AdminGuide/13847.htm

The Situation

You can learn a lot about encryption,  hashing, and DH when configuring a site-to-site VPN. 

I was on a conference call where several other network security engineers, project managers, and networking teams were trying to bring up an existing site-to-site...

March 6, 2018

Just one word on a CISSP exam question can either provide you the correct answer, or throw you off completely.  Let's go over an example.


VPN tunnels use IKE negotiations and IPSec to create a private line of communication between two peers.  Which of the following below is NOT true about IPsec VPNs?

A.  IPSec consists of two main protocols: Authentica...

Please reload

© 2013 Study Notes and Theory
Terms and Conditions/Privacy Policy

Proudly created to make you

a better security professional.