Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

178 total results found

PKI & SSL/TLS

Security Engineer Intro to Cryptography

Overview The fundamental Diffie-Hellman key exchange is susceptible to a Man-in-the-Middle (MITM) attack because it lacks a mechanism for participants to authenticate each other's identity, allowing an attacker to establish two separate secret keys and decrypt...

Architecture & Network

Infrastructure Management

Services Documentation

Operations & Maintenance

High-Level Overview

Architecture & Network

Network Topology

Architecture & Network

Subnets LAB Main Media 10.0.0.0/24 VLAN 50 192.168.0.1/24 VLAN 0 192.168.2.0/24 VLAN 20 DMZ VPN Security 192.168.4.0/24 192.168.3.0/24

Security Policies

Architecture & Network

Firewall Zone Definitions (e.g., DMZ, LAN, IoT) Core Access Rules (e.g., Management access allowed only from specific VLAN)

Virtualization Platform

Infrastructure Management

Host Setup Notes (Installation, storage configuration) Management Access Procedures

Cloud Platform

Infrastructure Management

Host Setup Notes (Installation, storage configuration) Management Access Procedures

Configuration Management

Infrastructure Management

Repository Structure and Location New Deployment/Provisioning Process

Storage Systems

Infrastructure Management

Pool Layout and Redundancy Level (e.g., RAIDZ2) Dataset/Share Mount Points

Core Services Index

Services Documentation

Table of all running services (Name, IP, Port, Purpose)

Monitoring

Services Documentation

Dashboard URLs and Authentication Notes Key Metrics Being Tracked

DNS & DHCP

Services Documentation

Configuration details and upstream DNS providers

Backup and Recovery Strategy

Operations & Maintenance

What is backed up (config/data), frequency, and retention policy Location of backup storage

Disaster Recovery

Operations & Maintenance

Step-by-step procedure for recovering a core system (e.g., Firewall) Service restoration order

Standard Procedures

Operations & Maintenance

Patching and Update Schedule Adding a New VM or Container Checklist