Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

120 total results found

Asymmetric Encryption

Security Engineer Intro to Cryptography

Diffie-Hillman Key Exchange

Security Engineer Intro to Cryptography

Hashing

Security Engineer Intro to Cryptography

Overview Cryptographic hash functions transform data of any size into a fixed-length message digest or checksum, with SHA256 producing a 256-bit (64 hexadecimal digit) output regardless of input size. These functions are deterministic and demonstrate the avala...

PKI & SSL/TLS

Security Engineer Intro to Cryptography

Overview The fundamental Diffie-Hellman key exchange is susceptible to a Man-in-the-Middle (MITM) attack because it lacks a mechanism for participants to authenticate each other's identity, allowing an attacker to establish two separate secret keys and decrypt...

High-Level Overview

Architecture & Network

Network Topology

Architecture & Network

Subnets LAB Main Media 10.0.0.0/24 VLAN 50 192.168.0.1/24 VLAN 0 192.168.2.0/24 VLAN 20 DMZ VPN Security 192.168.4.0/24 192.168.3.0/24

Security Policies

Architecture & Network

Firewall Zone Definitions (e.g., DMZ, LAN, IoT) Core Access Rules (e.g., Management access allowed only from specific VLAN)

Virtualization Platform

Infrastructure Management

Host Setup Notes (Installation, storage configuration) Management Access Procedures

Cloud Platform

Infrastructure Management

Host Setup Notes (Installation, storage configuration) Management Access Procedures

Configuration Management

Infrastructure Management

Repository Structure and Location New Deployment/Provisioning Process

Storage Systems

Infrastructure Management

Pool Layout and Redundancy Level (e.g., RAIDZ2) Dataset/Share Mount Points

Core Services Index

Services Documentation

Table of all running services (Name, IP, Port, Purpose)

Monitoring

Services Documentation

Dashboard URLs and Authentication Notes Key Metrics Being Tracked

DNS & DHCP

Services Documentation

Configuration details and upstream DNS providers

Backup and Recovery Strategy

Operations & Maintenance

What is backed up (config/data), frequency, and retention policy Location of backup storage

Disaster Recovery

Operations & Maintenance

Step-by-step procedure for recovering a core system (e.g., Firewall) Service restoration order

Standard Procedures

Operations & Maintenance

Patching and Update Schedule Adding a New VM or Container Checklist

Authenticating With Passwords

Security Engineer Intro to Cryptography

Overview Cryptography is essential for protecting passwords both in transit (via SSL/TLS) and at rest (in databases), where the latter requires secure storage methods to prevent exposure during a breach. Simply hashing passwords is insufficient due to rainbow ...