The Internet Explorer patch – Setting the record straight

Home > Blogs > Security

Blogs: Security

The Internet Explorer patch – Setting the record straight

0 0

News, background, and alternatives regarding the recent Internet Explorer “Day Zero” attack are spread across the Internet.  Confusion continues, so we decided to help set the record straight for our customer/readers. Step one, be careful what you read and interpret, including within this blog. Despite our care and research, we continue to find additional information … Continue reading The Internet Explorer patch – Setting the record straight

Security Blogs

Deciding Between Enterprise and Standalone Root Certification Authority in Windows Server 2012

1 1

This is part 4 of using Public Key Infrastructure (PKI) and Private Key Cryptography for your Windows Server 2012 environment. Part 1: Selecting a Key Size for Your Root Certificate Server in Windows Server 2012 AD CS. Part 2: Selecting a Cryptographic Key Provider in Windows Server 2012 AD CS. Part 3: How Long Does … Continue reading Deciding Between Enterprise and Standalone Root Certification Authority in Windows Server 2012

How Long Does It Take to Generate an Asymmetric Cryptography Key Pair?

0 0

This is part 3 of using Public Key Infrastructure (PKI) and Private Key Cryptography for your Windows Server 2012 environment. Part 1: Selecting a Key Size for Your Root Certificate Server in Windows Server 2012 AD CS. Part 2: Selecting a Cryptographic Key Provider in Windows Server 2012 AD CS. In this post, we’ll look … Continue reading How Long Does It Take to Generate an Asymmetric Cryptography Key Pair?

Selecting a Cryptographic Key Provider in Windows Server 2012 AD CS

2 2

This is part 2 of selecting a Public Key Infrastructure (PKI) for your Windows Server 2012 environment. In part 1; Selecting a Key Size for Your Root Certificate Server in Windows Server 2012 AD CS, we looked at creating a Strong Key for Root Certification Authority. In this post, we’ll look at deploying the Root … Continue reading Selecting a Cryptographic Key Provider in Windows Server 2012 AD CS

Selecting a Key Size for Your Root Certificate Server in Windows Server 2012 AD CS

3 2

Lots of different systems and platforms use certificates and Public Key Infrastructure (PKI). Many companies have decided to implement an internal Certification Authority to issue certificates to computers, users, and other Certification Authorities. When you decide to implement an internal PKI you’ll need to plan out the deployment, including end-user and CA certificate properties. One … Continue reading Selecting a Key Size for Your Root Certificate Server in Windows Server 2012 AD CS

Generating Random Numbers for Cryptography with Lava Lamps

0 0

Generating Random Numbers for Cryptography with Lava Lamps? Yes, this is a serious article. Cryptography often requires random numbers. From seed values to cryptographic key material to data obfuscation values to actual keys, random numbers are incredibly important. If there’s one thing that computers really suck at, it is generating random numbers. Computers are designed … Continue reading Generating Random Numbers for Cryptography with Lava Lamps

Exploits Against Legacy Encryption – A Conversation with Cisco

1 0

You should already realize that you cannot just change your standard encryption algorithms and key lengths on a moment’s notice. Those are decisions that you made after careful research and testing. So while you might have some cryptography in place that isn’t the latest and greatest Elliptic Curve or Quantum Cryptography fad, you’re confident that … Continue reading Exploits Against Legacy Encryption – A Conversation with Cisco

Workshops / Webinars

Project Management (PMP) for Executives – Introduction

1 94 0

Introduction Project Management (PMP) for Executives is a 9 part video training series developed by Steve Fullmer, PMP, MBA, MCT/CTT+, CDP.  Steven has a global reputation as a project manager, chief technology officer, and computer systems innovator. He has authored more than 100 articles and a dozen courses in the fields of project management, productivity, business … Continue reading Project Management (PMP) for Executives – Introduction

Project Management (PMP) Leadership Skills in the 21st Century … Do you Know Your History? – November 10, 2017

0 98 2

The PMI Leadership triangle touts our need to develop our knowledge and application of leadership. Do you understand the leadership models of the 20th century? The 21st Century? Understanding your predecessors can assist to set your future course. On the matter of history, Mark Twain’s quote “History doesn’t repeat itself, but it does rhyme” is … Continue reading Project Management (PMP) Leadership Skills in the 21st Century … Do you Know Your History? – November 10, 2017

Principles of Decision Tree Design and Analysis in Project Management (PMP)

0 58 0

In this Project Management Professional (PMP) training video, learn how about Decision Trees and how to solve them with Risk Analysis. Existentialism conveys themes like the importance of choice, contingencies, and extreme situations.  How do you choose when the decision is hard? (If the decision is easy, you just choose.) When the decision is hard, we … Continue reading Principles of Decision Tree Design and Analysis in Project Management (PMP)

Understand the Mind to Become a Better Project Manager – February 18, 2015

0 98 2

Our minds all work alike, at least biologically. Yet we are a diverse species with different motivations, opinions, perspectives, and directions. Do you understand how and why the human mind works? What makes you a great project manager? In this recording of our PMP training webinar from February 18, 2015, Steve Fullmer covers some of … Continue reading Understand the Mind to Become a Better Project Manager – February 18, 2015

Windows 10 Security – What’s New and Improved? – December 3, 2015

0 104 1

In this recording of our Windows 10 webinar from December 3, 2015 training,  security expert Mike Danseglio presents the enhanced security features of SmartScreen, Defender and BitLocker in Windows 10 and new features such as Biometric Identification, Microsoft Passport, Device Guard and more.

Windows 10 Managing, Deploying and Configuring – December 2, 2015

0 486 1

In this recorded Windows 10 training webinar from December 2, 2015, Windows Server instructor Rick Trader presents the deployment and management of Windows 10 Enterprise and the new Provisioning capability in Windows 10. Learn how to manage Windows 10 deployments using System Center Configuration Manager, Mobile Device Management and Intune. Also included in his presentation … Continue reading Windows 10 Managing, Deploying and Configuring – December 2, 2015

Videos You May Like

A Simple Introduction to Cisco CML2

0 3877 0

Mark Jacob, Cisco Instructor, presents an introduction to Cisco Modeling Labs 2.0 or CML2.0, an upgrade to Cisco’s VIRL Personal Edition. Mark demonstrates Terminal Emulator access to console, as well as console access from within the CML2.0 product. Hello, I’m Mark Jacob, a Cisco Instructor and Network Instructor at Interface Technical Training. I’ve been using … Continue reading A Simple Introduction to Cisco CML2

Creating Dynamic DNS in Network Environments

0 641 1

This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader teaches how to create Dynamic DNS zones in Network Environments. Video Transcription: Now that we’ve installed DNS, we’ve created our DNS zones, the next step is now, how do we produce those … Continue reading Creating Dynamic DNS in Network Environments

Cable Testers and How to Use them in Network Environments

0 724 1

This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader demonstrates how to use cable testers in network environments. Let’s look at some tools that we can use to test our different cables in our environment. Cable Testers Properly Wired Connectivity … Continue reading Cable Testers and How to Use them in Network Environments