Skip Navigation
Removed
CISSP Practice Question
  • Does that link go to a memory dump? If so.. that’s cheating and against the ISC2 agreement. Creating or using memory dumps doesn’t demonstrate competency and weakens the credibility of the cert for legitimate passers.

  • Jobsite Camera Advice

    Hey All,

    I could use some help in identifying a good set of cameras to use for monitoring and securing job sites for a contractor client of ours.

    They are set up on Ubiquiti Protect for their own facilities, but we're interested in something that can be a bit more cloud-based (or at least not dependent on our own sites). We'd like these abilities:

    • Ability to share a URL on a camera-by-camera basis to clients can see their job progress live
    • 24x7 recording
    • Decent storage history (7-30 days is probably fine)
    • Online storage to protect against jobsite camera theft
    • infrared for night use

    We're open to both cellular and non-cellular connectivity. Features like person detection and such are nice-to-haves rather than must-haves.

    Any thoughts on something that's worked well for you?

    Thanks, Siravious

    2
    Amazon's Prime Video will start serving ads on January 29 unless you pay extra
  • Welp… this isn’t very strategically sound. Within the same service, they want to motivate me to consolidate shipping to Amazon delivery day or no rush. Guess who’s not using those methods anymore? Fuck you amazon, gonna cost you multiples of that $3 in shipping you greedy fucks.

  • HOW DO I GET INTO CYBERSECURITY?
  • It would seem best to understand both offensive and defensive aspects of security, which, of course, is based on the fundamentals. There are no shortcuts to download a tool and become anything in Cybersecurity space because people who understand the fundamentals can easily counter most “amateur” attacks.

    For example, if I hire somebody interested in a certain type of security position, my first question will always be the opposite… If you want to attack X, how would you defend it? and then how would you circumvent that defense, etc.

  • HOW DO I GET INTO CYBERSECURITY?
  • I am a former enterprise architect in the cybersecurity space as well as a former director of cybersecurity operations and now own a cybersecurity consultancy.

    My best advice is to ignore the tools for now. Understand the concepts of cybersecurity across all domains you can - from endpoint protection to privileged access management.

    You can pick up a lot of this during the prep for certifications like CompTIA’s or CISSP.

    Then whatever you find yourself most passionate about, find an entry level job in that discipline and that can be a way of starting “real world” exposure to the rest.

    I hope this helps in some way, and best of luck!

  • InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SI
    siravious @lemmy.world
    Posts 1
    Comments 11