1/30
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
IT Governance
The framework that ensures that IT investments support the organization's business goals and deliver value.
GDPR
The General Data Protection Regulation, a comprehensive data privacy law in the European Union that regulates how personal data is processed and protected.
FERPA
The Family Educational Rights and Privacy Act, a U.S. federal law that protects the privacy of student education records.
FISMA
The Federal Information Security Management Act, which mandates that U.S. federal agencies develop, document, and implement an information security system.
Personal Data Privacy in the EU
The main focus of GDPR, ensuring the protection of individuals' personal data and enhancing privacy rights.
PIPEDA
The Personal Information Protection and Electronic Documents Act, which governs how private sector organizations in Canada collect, use, and disclose personal information.
GLBA
The Gramm-Leach-Bliley Act, which requires U.S. financial institutions to protect consumers' personal financial information.
PCI DSS
The Payment Card Industry Data Security Standard, a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.
HIPAA
The Health Insurance Portability and Accountability Act, which establishes national standards for the protection of health information.
ifconfig
A command-line utility in Unix/Linux used to configure network interfaces, display network configuration, and manage IP addresses.
arp
The Address Resolution Protocol command that displays the mapping of IP addresses to MAC (Media Access Control) addresses within a local network.
netstat
A command-line tool that provides information about active network connections, routing tables, and network interface statistics.
nslookup
A command used to query DNS servers for information regarding domain names and IP addresses, primarily for troubleshooting.
scp
The Secure Copy Protocol, used for securely transferring files between hosts using SSH (Secure Shell) for encryption.
dig command
The command-line utility that queries DNS servers for detailed DNS information like resource records.
tcpdump
A network packet analyzer command-line tool that captures and displays packets being transmitted or received over a network.
whois
A command that provides information about the ownership of domains or IP addresses, including registration details.
FTP
The File Transfer Protocol, a standard network protocol used for transferring files without encryption by default.
finger
A command-line tool that displays information about users on a remote system, such as login status and user details.
SSH
The Secure Shell protocol, widely used for secure remote control of computers, enabling encrypted communication in a network.
TFTP
The Trivial File Transfer Protocol, a simple, unsecure file transfer protocol that uses UDP (User Datagram Protocol) for fast transfers.
cat
A command used in Unix/Linux to display the contents of files, concatenate multiple files, and create new files.
SFTP
The SSH File Transfer Protocol, a secure version of FTP that encrypts data transfers, ensuring both security and privacy.
nmap
A network scanning tool used to discover hosts and services on a computer network, helpful for security auditing and network inventory.
Protection of Credit Card Holder Data
The primary objective of PCI DSS to safeguard sensitive cardholder information and prevent data breaches.
Information Security for U.S. Federal Agencies
The primary focus of FISMA, aimed at securing federal information systems against unauthorized access and cyber threats.
route
A command used to view and manipulate the routing table of a local system, showing how data packets are directed through networks.
Telnet
A protocol that enables remote terminal connection to computers over a network, considered insecure since it transmits data unencrypted.
Active Network Connections
Network connections currently established on a system, viewable through the netstat command.
Look Up IP Addresses
The purpose of the nslookup command to retrieve IP addresses associated with given domain names.
File Transfer Protocol
The acronym FTP stands for File Transfer Protocol, a method for transferring files across a network.