This blog is here to help those preparing for CompTIA exams. This is designed to help the exam candidate to understand the concepts, rather than trust a brain dump. CHECK OUT THE BLOG INDEXES!!!
CompTIA Security+ Exam Notes

Let Us Help You Pass
Thursday, August 12, 2021
PROTOCOL / PACKET ANALYZERS
Friday, August 6, 2021
International Organization for Standardization (ISO) 27001/27002/27701/31000
ISO 27001/27002/27017/27701/31000
Thursday, August 5, 2021
PCI DSS (Payment Card Industry Data Security Standard)
Requirements for PCI DSS compliance
GDPR ( General Data Protextion Regulation)
GDPR - Things to know for the exam
The General Data Protection Regulation regulates the
protection of personal data for residents of the European Union.
The GDPR outlines the roles and responsibilities of data
controllers and data processors.
The data controller is responsible for protecting privacy
& website user rights.
The data protection officer (DPO) can advocate for the
care and use of customer information.
A data protection officer ensures the organization
complies with all relevant laws.
The data controller (sometimes called the data owner) is
responsible for the data's use.
A data processor uses and manipulates the data on behalf
of the data controller.
Sunday, July 25, 2021
Password Policy
Avoid using words found in the dictionary or part of the username to make a password strong. Use at least 3 of the following four:
Uppercase letters (26 A through Z)
Lowercase letters (26 a through z)
Numbers (10 numbers 0-9)
Special characters (32 characters, like !, @, #, %, &, and *)
An 8-character password with only lowercase letters is calculated as 26^8, or 208827064576 (208 billion) possibilities. Making the password 10 lowercase letters changes it to 141 trillion possibilities.
With a desktop computer and a high-end graphics card, password-cracking tools are capable of testing 20 billion passwords per second. An attacker could break the 10-character password in two hours.
The combination possibilities of utilizing all four character types will equal 94 characters. Change your password to 14 characters and use a combination of all four character types (94^14), and the possibilities are mind-blowing, a little over 4 septillions.
Password length: To make brute force attacks more difficult, enforce minimum length.
Password history: A password history setting in Group Policy can be enabled for 24 passwords. Once 24 passwords have been used, users can only use their favorite password. This needs to be enabled along with Password Minimum Age. Password History is not enabled if the user uses the same password after the Maximum Password Age (Password expiration).
Password Minimum Age: The default setting in Group Policy is 0, meaning users could change their passwords multiple times on the same day to return to their favorite password. The administrator would receive multiple password reset alerts.
Saturday, July 24, 2021
Passwordless Authentication: The Future of Secure and Seamless Logins
Passwordless Authentication
- This method uses unique biological traits like fingerprints, facial recognition, or iris scans to verify identity.
- Users unlock their devices or access applications by simply scanning their fingerprint or using facial recognition, eliminating the need for passwords.
- Examples include fingerprint sensors on smartphones or facial recognition features in laptops.
- This approach relies on something the user possesses, like a device or a security key.
- One-Time Passwords (OTPs): Users receive a unique, time-sensitive code via SMS or an authentication app, which they enter to log in.
- Magic Links: Users receive a link via email or other messaging app. Clicking the link grants access to the user, eliminating the need for a password.
- Hardware Security Keys: Users plug in a physical device (like a USB key) to authenticate.
- This standard utilizes public-key cryptography to generate a unique key pair for each website or application.
- The private key remains securely stored on the user's device (e.g., smartphone, computer), while the public key is registered with the service.
- When logging in, the service sends a challenge, which the user's device signs using the private key. The service then verifies the signature using the public key.
Monday, April 12, 2021
Sunday, February 7, 2021
IPv4 Subnetting Videos
Video 1. Intro to IPv4 Subnetting