search
top
Currently Browsing: Reviews

Passing The Microsoft AZ-900 Exam

Getting Microsoft Certified for Azure Fundamentals


I decided to challenge the AZ-900 Exam, as I got a Microsoft voucher for a free exam attempt. So, I decided to give the exam a crack. Basing it off other peer’s experience, who had already taken this exam. The consensus I had heard is that it should be a simple exam if you have used Azure before and worked on different services (e.g., IaaS, PaaS, SaaS.) I probably spent about less than 8 hours prepping, as I felt the topics seemed general and things I have already been exposed too.

Prepping to take the exam

My personal experience with Azure is that I have worked with it for 3+ years. If you have spent a lot of time in the Azure environment building things, configuring things and managing different items. You will have no problem challenging this exam. Most of the concepts are related to everyday tasks that you would be working on. Or tasks you would have been exposed to at some point while engineering designs in Azure.

Here is a score list of what you need to know –> https://docs.microsoft.com/en-us/learn/certifications/exams/az-900

  • Cloud concepts (20-25%)
  • Core Azure services (15-20%)
  • Core solutions and management tools on Azure (10-15%)
  • General security and network security features (10-15%)
  • Identity, governance, privacy, and compliance features (20-25%)
  • Azure cost management and Service Level Agreements (10-15%)
Read More Of This Post

InfoSec-Jobs.com – A rare Cyber Security job listings site

I wanted to post about a very cool one-of-a-kind cyber security job listing website. If you are looking into getting a job specializing in cyber security, you are in luck!  One of my friends has created a website dedicated towards connecting like minded cyber security professionals and hiring managers.

What is InfoSec-Jobs.com?

It is a highly focused website listing out only cyber security positions. You can check out the website here: https://infosec-jobs.com/

It has listings that only consist of security focused and related jobs or positions. If you are a hiring manager, it is a great place that allows you to post your current open positions if you are looking for some talented cyber security professionals.

The website also does not sell your personal information, CV/Resume details to any other parties, and no external trackers are used on the site. The website is built to protect every user’s personal information.

It is a rare website, as most other IT job related websites showcase various IT positions. There are none that really focus just on cyber security positions. So this is a new rare gem to check out and bookmark!

Read More Of This Post

CISA Exam Study Guide from Packt


CISA Study Guide from Packt

I like to review over CISA study materials and keep up with content every year. ISACA usually has small new updates every year to the auditing domains. It is always nice to see all the new changes and advancements that are being made in the auditing world. This year, I decided to check out a book and wanted to post a quick review of it for others so they may get some good use out of it too.


What is this book about

The book is was just recently published by Packt and is called “CISA – Certified Information Systems Auditor Study Guide” authored by Hemang Doshi. You can grab a copy of it here –> https://amzn.to/358rb3h

Read more Of This Post

Autopsy– A Forensic Analysis Tool


Autopsy – Digital Forensics

For anyone looking to conduct some in depth forensics on any type of disk image. Autopsy is a great free tool that you can make use of for deep forensic analysis.

It has been a few years since I last used Autopsy. I recall back on one of the SANS tools (SANS SIFT). Back then I felt it was a great tool, but did lack speed in terms of searching through data. It appears with the most recent version of Autopsy that issue has been drastically improved. On top of that, machines have also become much faster using SSD’s and tons of more CPU and RAM power.

Read more Of This post

Recover Keys – Part 2 – Scanning Devices on the Network

In this Part 2 review of Recover Keys, we will look at how we can scan machines via the network. For most users, I don’t believe this option will be used too often. The average home user that purchase a license for personal use could just uninstall and install the tool on each machine they want to grab license keys off of, or buy a license for multiple machines.

For larger organizations this tool is excellent as it can be installed in one location on a single machine. You also get the ability of being able to extract the license keys via the network, which makes this tool much more efficient and valuable. At the end of the day it is all about saving and making the best use of time.

If you haven’t read Part 1 of using Recover Keys (scanning a local machines) you can check it out here: https://www.stealthbay.com/recover-keys-part-1-scanning-a-local-machine/

Read more Of This Post

« Previous Entries

top