Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Memberships

Learn Web Dev

75 members • Free

Tech Interview Stack

80 members • $2/m

The Studycoach School

9.8k members • Free

Software Developer Academy

26.8k members • Free

CG Python Academy (Free)

907 members • Free

Python Developers

764 members • Free

Offensive Cyber Community

1.1k members • Free

Cyber Hub | Empirical Training

12.1k members • Free

Skool Money Models

8.8k members • Free

2 contributions to Cybersecurity Pros Internship
🚨 I’m Back — Now Teaching with Global IT Tech and we almost have 100 members!
What’s good everyone Devon here. After a month-long hiatus to sharpen the blade and recharge the mission, I’m officially back. And this time, I’m linking up with Global IT Tech https://www.global-itech.com/, one of the largest IT schools in Michigan with thousands of students trained & certified with a job placement rate of 95%. I'm also looking for assistance running some aspects of the Skool, DM me if interested. I’m now an official tutor for their A+, Network+, Security+, CCNA, and CCNP programs — and I’m bringing something special to the table. I'll be offering a Remote Work setup if your location supports it. allowing you to earn 25-45/hr and professional IT experience. You’ll get my personal job search system, career support, and exclusive extras from the Global IT Tech tutoring track too. Shout out to the new members! This is a very exciting time to be joining the field!
🚨 I’m Back — Now Teaching with Global IT Tech and we almost have 100 members!
0 likes • Jul 22
@Devon Beck welcome back and congratulations, I Really looking forward to this!
CISSP Q's of the DAY
Alyssa is responsible for her organization's security awareness program. She is concerned that changes in technology may make the content outdated. What control can she put in place to protect against this risk? 1. Gamification 2. Computer-based training 3. Content reviews 4. Live training Nadia's company is operating a hybrid cloud environment with some on-site systems and some cloud-based systems. She has satisfactory monitoring on-site but needs to apply security policies to both the activities her users engage in and to report on exceptions with her growing number of cloud services. What type of tool is best suited to this purpose? 1. A NGFW 2. A CASB 3. An IDS 4. A SOAR Which of the following is a client-server protocol designed to allow network access servers to authenticate remote users by sending access request messages to a central server? 1. Kerberos 2. EAP 3. RADIUS 4. OAuth
1 like • Apr 12
Thank you for the question 1 Content reviews 2 CASB 3 RADIUS
1-2 of 2
Daniel Belay
2
15points to level up
@daniel-belay-6028
I am VAPT Specialist

Active 12d ago
Joined Apr 11, 2025