Hey what's up guys
This post is a recap of everything you should have learned from the beginning of the section.
So in case you missed it, on January 1st 2018 we embarked on an awesome journey into your CompTIA Security+ training for the SY0-501 exam.
We published over a dozen training lessons with screenshots, step-by-step walk-throughs and video lab explanations. All on this site - all 100% free.
But I wanted to wrap everything up into a tidy resource page so you could easily bookmark or share the page with your friends.
This is a quick intro in to the concept of confidentiality, authorization and stenography.
https://www.securitypluspro.com/blog/cyber-security-goals-confidentiality
In this lesson we discussed file hashes, including MD5 digests and SHA256. We also unwrapped the mysterious world of digital signatures including integrity, authentication and...
Alright yes! yes! yes!
The last time we go together I introduced you to the Linux terminal and how to find help using any Linux command.
Today we're going to investigate the top Linux commands you'll need to know for the SY0-501 exam.
Let's start with PING.
Using PING in Linux isn't all that different from using PING in Windows. But there are a few notable differences which we should get into.
The unique thing about PING in Linux is that it never stops until you explicitly tell it to stop.
So when I type:
ping 10.1.30.16
My Linux box will continuously ping the target until I press Ctrl + c
There's a nice little trick to get around that though:
Type:
ping 10.1.30.16 -c 10
Using the "-c" command line switch I'm able to limit my pings to a count of exactly 10.
You can also specify the amount of time your Linux box should wait before sending the next PING packet (also known as an ICMP echo request).
By...
Yes! Now it's time to have some fun with Linux.
Today we're going to introduce to the world's most popular penetration testing and ethical hacking Linux distribution: Kali Linux. (pronounced "CAL - LEE")
Kali is the standard beloved by both white-hat hackers and evil attackers alike. It offers a complete suite of attack tools that a competent hacker can use to attack and compromise systems and networks.
Today we're going to start things off with a basic introduction to the Linux terminal. You'll learn:
Are you ready to jump in? Let's do this baby!
Every cybersecurity professional needs to know how to navigate around the operating system from the command...
Ay yo!
Last week we looked into how to open the Windows Command Prompt, how to launch it as an administrator and then we dove into some pretty neat tricks with PING and ARP.
If you missed that training session check it out here:
Understanding the Windows Command Prompt Basics
Today we're going to round out our series with:
Alright, let's get into it.
Everyone knows what ipconfig is right? I think it was the first command I ever learned.
Let's open PowerShell and give it a whirl.
To open PowerShell in Windows 10 just hit the Windows Key and type:
powershell
The neat thing about Powershell is that all the normal Windows commands run just fine as well as the super leet Cmdlets which I'll share with you in a future lesson.
So let's type in ipconfig. Type:
ipconfig
Look at the output:
We can see my IP...
Yes!
Finally, at last we are were I wanted to arrive: the Windows Command Prompt.
In this article you're going to all the Windows Command Prompt tools you need to pass the CompTIA Security+ exam.
Here's the list:
Once you have all these under your belt I would strongly suggest that you play with these commands so you can really get comfortable with them. Explore the help system and explore the universe of Windows Command Prompt commands.
Today we'll look at launching the Windows Command Prompt, understanding the Command Prompt help system and using PING and ARP. Then next week we'll wrap up ipconfig, netstat and tracert.
There are two ways to open the Windows Command Prompt: the weak way...
Yo!
Welcome back. This is the last post in our seven part series on setting up our Security+ Pro hacking lab. Here's what we covered so far:
Each post has a detailed step-by-step walk through with tons of screenshots and a step-by-step video to help you along the way:
Now today I want to show you how to enable file sharing between your Kali Linux VM and your host; this is, your physical computer.
There are two techniques for doing this. Both are pretty easy but it took me a long time to figure this out for some reason.
The first step is to enable file sharing.
Select...
Wassup wassup!
Alright baby - here's what I have for you today:
We are going to install VMWare Tools in Kali Linux.
There are a ton of tutorials out there that tell you how to do this but I'm going to show you the recommended way to install VMWare tools as documented by Kali Linux.
Here's the rundown:
I remember the first time I tried to install VMWare tools in Kali Linux. It was one of the most frustrating things in the world because I thought all I had to do was to click the "VM" menu in VMWare Workstation and then choose "Install VMWare Tools"
Ha!
But that would have been too easy.
Wen you...
Ayo!!!
Wassup kid.
Welcome to our seven part, step-by-step series on setting up a hacking lab. The purpose of this short series is to give you real experience working with Security+ topics. We're going beyond the book knowledge and into real world experience.
Last week we customized Kali Linux and today I'm going to show you how to legally download and install Windows 10 in VMWare Workstation. The Windows 10 workstation will become our victim in our hacking lab.
Here's the rundown:
Let's jump right in! I hope this one will be a faster read and setup than my previous training lessons!
Let's go ahead and grab a...
Yo!
What's up baby - so this is part four of our seven part series which walks you through creating your own Security+ hacking lab (so you can pass the test with confidence).
We've already covered how to setup VMWare Workstation and how to download and install Kali Linux. Now I'm going to show you how to personalize Kali Linux which will make it way more fun to use.
Here's the rundown:
We are midway through our training session on configuring our hacking lab for the Security+ exam.
We are going to do five things in this training lesson:
Wassup!
Okay, in the last video, we downloaded Kali Linux. You totally need to check that out if you haven't already.
But today we're going to actually install Kali Linux from scratch. There are a bunch of little things you need to be aware of when going through the installation.
In the last lesson we left off with the Kali Linux install window so we'll pick up right from here and get going fast.
The first thing you're going to want to do is make sure you use the "Graphical Install". It's the easiest and quickest option so that's what we'll be using today.
Kali is going to ask you to pick...
50% Complete
Pop in your first name and best email address and we'll send you:
The latest updates on the CompTIA Security+ SY0-501 exam
Proven tips and tricks for passing the exam
Hands on video labs with complete step-by-step walk-throughs
And don't forget to refresh your inbox. You should see us there in about 3 minutes.