Boolean Math (NOT Logic) – CISSP Domain 3

Hello everyone.  We’ve got another Boolean math session lined up for you today.  This time we’re going to take a quick look at the NOT logic and examine how this one differs from the other operations. To review, Boolean math is based on a binary system… Continue reading Boolean Math (NOT Logic) – CISSP Domain 3

Boolean Math (OR Logic) – CISSP Domain 3

Today we are going to take another look at some Boolean mathematics.  In particular, we’re going to focus on the OR operational logic, as covered in Domain 3 of the CISSP common body of knowledge (CBK).  As a brief recap, Boolean math is based on a bin… Continue reading Boolean Math (OR Logic) – CISSP Domain 3

Boolean Math (AND Logic) – CISSP Domain 3

Today we’re going to take a quick look at the AND Boolean logic, which is covered in Domain 3 of the CISSP common body of knowledge (CBK).  To begin with, Boolean math is used to define the rules on how computer systems evaluate data. Because Boolean i… Continue reading Boolean Math (AND Logic) – CISSP Domain 3

Encryption – CISSP Domain 3

We’re circling back to some more CISSP-related materials.  Today’s topic will be encryption, which can be found in CISSP Domain 3. By its very nature, encryption is meant to hide the meaning or intent of a communication from unintended… Continue reading Encryption – CISSP Domain 3

Encoding – CISSP Domain 3

Today we’re going to take a quick look at encoding, as covered in Domain 3 of the CISSP common body of knowledge (CBK). There is often some confusion between encoding and encryption, so one of the purposes of this article is to look at how the CB… Continue reading Encoding – CISSP Domain 3

Hashing Functions – CISSP Domain 3

Today we’re going to take a quick look at hashing functions, as covered in Domain 3 of the CISSP common body of knowledge (CBK).  There is often some confusion between hashing, encryption, and encoding, so one of the purposes of this article… Continue reading Hashing Functions – CISSP Domain 3

Cracking WPA Pre Shared Keys

Cracking WPA Pre Shared Keys This is intended to be part 2 of a previous blog (Intro to Wireless Security), which was designed to introduce people to the realm of wireless security testing.  One of the best ways I’ve found to learn about som… Continue reading Cracking WPA Pre Shared Keys

Introduction to Wireless Security with Aircrack-ng

Introduction to Wireless Security with Aircrack-ng Today we’re going to walk through a few WiFi testing examples using Aircrack-ng, which is a suite of wireless network security tools.  It allows us to monitor and export packet data, attack … Continue reading Introduction to Wireless Security with Aircrack-ng