Skip to content
BIT 108 Certification
Learn
About
Support
Contact
BIT 108 Certification
Learn
About
Support
Contact
Start Exam
Login / Register
Basics Of Servers A-Z
Basic Of Cloud Computing A-Z
Basics Of Networking A - Z
Basics of CyberSecurity A - Z
Basics of AI / ML / Data Science
Basics Of Servers A-Z
Learn Now
Curriculum
1U-2U-3U-4U
10GigE
Alternate Location Path
Anti Malware
Antivirus
Application Consistent
Application Hardening
Apply Driver Updates
Apply OS Updates
Architectural Reinforcements
Architectural Diagrams
Archive
Asset Management
Backdoor
Background
Backplane Failure
Backup Frequency
Backup Media Tyres
Backup Methods
Backup Validations
Backward Compatible
Basic Input Output System - BIOS
Bidirectional
Blade Enclosure
Blue Screen
Boot Errors
Boot Options
Breaches
Bus Types
Cache Battery Failure
Cache Failure
Cages
Card Readers
Cards
Central Processing Unit (CPU)
CMOS Battery Failure
Component Failure
Console Connections
Controller Failure
Cooling
Cooling Management
Crash Cart
Crushing
Data Corruption
Data Monitoring
Datacenter Camouflage
Deletions
Deployments
Destination Host Unreachable
Disabling Unneeded Hardware
Disabling Unused Services
Disk Space Utilization
Disk Wiping
Downgrades
Drive Failures
Drives
Drives Not Available
Enclosure Sizes
End Of Support
Excessive Access
Expansion Cards
External - eSATA
Fans
Fencing
Fiber Channel Over Ethernet - FCoE
File Integrity
File Locking
Firewall Configurations
Floor Load Limitations
Forward Compatible
Gigabit
Graphics Processing Unit - GPU
Group Membership
Hard Disk Drive - HDD
Hard Drive Media Types
Hardware Diagnostics
Hardware Failure
Hardware Hardening
HBA Failures
Host Security
Hot Bus Adapter - HBA
Hot Swappable Hardware
Incineration
Incremental
Individually Privileged Information
Install Required Software
Installing Latest Patches
Insufficient Disk Space
Interface Types
IP KVM
iSCSI
Just A Bunch Of Disks - JBOD
Keyboard Video Mouse - KVM
Labeling
Live Failover
Log Analysis
Logins
Mean Time To Recover - MTTR
Media Destruction
Media Failures
Media Integrity
Memory
Memory Dump
Mirroring
Misconfigured RAID
Mismatched Drives
Monitoring
Monitoring Tools
Network Address Translation - NAT
Network Attached Storage - NAS
Network Cabling
Network File System - NFS
Network Port Security
Network Time Protocol
Open Files
Open Ports
OS Hardening
OS Not Found
Overprovisioning
Partition Errors
Password Policies
Patch Update Failure
PCI
Per Concurrent User
Personally Identifiable Information - PII
Port Scanners
POST Errors
Power Cabling
Power Connector Tyres
Power Supplies
Power On Self Test - POST
Predictive Failures
Production - Non Production Impact
Purple Screen
Rack Balancing
Rack Layout
Rack Mount
Racking
Rail Kits
Random Lockups
Read-Write Errors
Recovery
Redundant Power
Reflective Glass
Regular Testing Intervals
Remote Control Access
Remove Drive Access
Remote Power On-Off
Restore Failures
Restore Methods
Rotation Per Minute - RPM
Safe Mode
Scope Based
Secure Digital - SD
Sensors
Seperate Circuits
Seperate Geographic Locations
Serial ATA - SATA
Serial Attached SCSI - SAS
Serial Connectivity
Serial Numbers
Server Chassis Types
Server Components
Server Configurations
Server Decommissioning
Server Lifting Techniques
Service Level Agreement - SLA
Service Manuals
Set BIOS Password
Set Boot Order
Shared Storage
SIEM
Simulated Failover
Single User Mode
Site Types
Slow File Access
Snapshot
Sniffers
Solid State Device - SSD
Split Encryption Key Tokens
Synchronous - Asynchronous
Synthetic Full
System Crash
System Lockups
System Logs
System Time
Tabletops
Theft
Tower
Two-Person Integrity
Unable To Access Files
Unable To Log On
Unable To Mount The Device
Unable To Reach Remote Subnets
Unified Extensible Firmware Interface - (UEFI)
Unit Sizes
Universal Serial Bus - USB
Unknown Host
Unsuccessful Backup
Unwanted Access Methods
Unwanted Duplications
Unwanted Publications
Upgrades
Uptime Requirements
User Account Control - UAC
User Activity
User Groups
Utilization
Ventilation
Verify Non-Utlization
Virtual Administration Console
Virtual Networking
Virtual Switches
Warranty
Basic Of Cloud Computing A-Z
Learn Now
Curriculum
2.5 Hard Drive
3.5 Hard Drive
Access Controls
Access Points
Account Life-Cycle Management
Account Lockout Policy
Account Mismatches
Adaptive Optimization
Advanced Cloud Services
Advanced Technology eXtended - ATX
Affinity
Agent Based Scans
Alerting
Alternate Locations
Application Delivery Controller - ADC
Application Monitoring
Auto Scaling
Availability
Backup And Restore Policies
Backup Objects
Backup Targets
Backup Types
Ballooning
Bandwidth Issues
Baselines
Beta - Versions
Billing Issues
Block Migration
Blue - Green Upgrades
Buckets
Capacity
Certificate Management
Chargebacks
CI - CD
Clock Speed
Cloud Access Security Broker - CASB
Cloud Bursting
Cloud Resources Services
Cloud Services Budgetary
Cloud Service Models
Cloud Within A Cloud
Cloud-To-Cloud Migrations
Cluster Placement
CMDB
Collaboration Service
Collectors
Colocation
Common Internet File System
Common Messaging Methods
Communications Services
Compromised Certificates
Compromised Key
Compute
Compute Resource
Configuration Files
Configure Secrets
Configure Variables
Confirming Completion Of Backups
Connectivity
Connectivity Issues
Containers
Content Delivery Network - CDN
Core - Based
Cost Issues
Creating Internal APIs
Credentialed Scans
Cross Platform Virtualization
Cross Service Migrations
CSP Outages
Data Breaches
Database Dumps
Database Migrations
DDoS Protection
Deactivate Default Accounts
Default Routes
Deploying VMs
Deprecated Features
Desktop Virtualization
Device Drivers
Digital Signatures
Directory And Identity Services
Directory Security Groups
Disaster Recovery - DR
Discretionary Access
DNS over HTTPS (DoH)
DNS over TLS (DoT)
DNS Records
DNS Security - DNSSEC
Domain Name Service - DNS
Double Data Rate 3 - DDR3
Double Data Rate 4 - DDR4
Double Data Rate 5 - DDR5
DR Kits
Dual - Channel
Dynamic Allocation
ECC RAM
Elasticity Usages
Email Services
Expired Certificates
Expired Key
Exposed Endpoints
External Attacks
Failed Load Balancing
Feature Mismatch
Federations
Fibre Channel - FC
File Integrity Monitoring - FIM
File Migration
File Subscription Service
File Synchronization
Filesystem
File System Backup
Firmware Upgradation
Firmwares
Flushdns
Front Ends
Generic Routing Encapsulation (GRE)
GENEVE
Geographical Datacenter Requirements
Hardened Baselines
Hashing Algorithms
HDD Form Factor
High Availability
Horizontal Scaling
Hot Fixes
Hub - Spoke
Hyperconverged
Hypervisors
Infrastructure As A Service - IaaS
Identification - Authorization
Identity Management
IDS
Incidents
Incorrect IP Address
Incorrect IP Space
Incorrect Subnet Issues
Incorrectly Administered Firewall
Incorrectly Configured Load Balancing
Information Technology eXtended - ITX
Infrastructure As Code - IAC
Infrastructure Components Monitoring
Ingress- Egress Traffic
Insecure Ciphers
Instructions Per Cycle - IPC
Insufficient Capacity
Integration Of Platforms
Internet Mail Access Protocol - IMAP
Intrusion Detection Systems - IDS
Intrusion Protection System
IP Address Changes
IP Address Management
ISP Outages
Key Based Authentication
Key Management
Licensing
Licensing Issues
Load Balancers
Location Backup
Location Backup
Log Scrubbing
Logical Access Management
LongTerm Support - LTS
M.2 Devices
Maintainance Mode
Managed Switches
Mandatory Access Control
Metered Utilization
Micro-Segmentation
Migration Of Platforms
Migration Of Vendors
Misapplied Policies
Misconfigured Certifications
Misconfigured Key
Misconfigured Policies
mSATA
Multicloud
Multifactor Authentication - MFA
n-1 Policy
Network Access Control - NAC
NetStat
Network Bandwidth
Network Flows
Network Interface Controllers
Network Latency
Network Requirements
Network Security Groups
Network Services
Network Time Security - NTS
Network Troubleshooting Tools
Network Types
Non-Discretionary Access
Non-Relation Migration
Non-Volatile Memory Express - NVME
NVMe-oF
Object Backup
Object Migration
On-Premises-Cloud Sites
Open Source Drivers
OpenSSL Client
Optical Network Terminal - ONT
Orchestration Sequencing
OS Templates
Overall Utilization
OverSubscription
P2V Migration
Platform As A Service - PaaS
PaaS Migration
Packet Analyzer
Packet Brokers
Pass Through
Password Complexity Policy
Patching Failures
PCI Express - PCIe
Peering
Peering Issues
Performance Capacity Planning
Performance Degradation
Performance Monitoring
Performance Testing
Persistant Storage
PoE Standards
Point-To-Point Tunnelling Protocol - PPTP
Point-To-Point VPN
Point-To-Site VPN
Policies
Port 110
Port 143
Port 22
Port 23
Port 25
Port 3389
Port 389
Port 443
Port 445
Port 53
Port 80
Post Deployment Validation
Production Upgrades
Protocols
Provisioning Resources
Provisioning - Deprovisioning Accounts
Proxy
QA Upgrades
Quad Channel
Quality Assurance
RAID - 0, 1, 5, 6, 10
Rapid Elasticity
Read Write Operations Per Second
Redundant Power Supply
Region-Zones
Relational Migration
Removable Storage
Requirement Analysis
Restoration Methods
Restore Backups
Restore Files
Retention Policy
Revoked Key
Rollbacks
Rolling Upgrades
Rollups
Routine Operations
S.M.A.R.T Failure
SaaS Migrations
SAML
Sandbox
Scaling
Scaling Configurations
Scheduled Updates
Secure Scripting
Security Patches
Security Requirements
Serverless Application
Serverless Cloud Services
Severity Categorization
Shared GPU
Shared Resources
Showbacks
Signature Updates
Simultaneous Multi-Threading - SMT
Single Channel
Sizing
SLA Policy
Socket-Based
Software Defined Storage - SDS
Software Defined Networking - SDN
Solution Templates
SR - IOV
SDD Form Factors
Stateful Service
Storage Components
Storage Compression
Storage Deduplication
Storage Migrations
Subnetting
Synthetic Full Backup
System Load
Tagging
Tenants
Testing Requirements
Thick Provisioning
Thin Provisioning
Thresholds
Time Synchronization Issues
Tracert
Triple Channel
Trust Certificates
Trust Key
Two-Factor Authentication
Type 1 Hypervisor
Type 2 Hypervisor
Unencrypted Data
Unmanaged Switches
Unsupported Protocols
Upgrading Methods
Usability Testing
User Density
User Permissions
User Group Policy
V2V Migration
VDI In The Cloud
VDI On Premises
Vendor Drivers
Version Mismatch
Versioning
Vertical Scaling
Virtual Appliances
Virtual CPU - vCPU
Virtual Extensible LAN - VXLAN
Virtual GPU
Virtual Network Interface Controller
Virtual Patches
Virtual Private Cloud - VPC
Virtual Routing
VMs
VoIP Service
Whitelisting - Blacklisting
Wireless Internet Service Provider - WISP
Zoning
Basics Of Networking A - Z
Learn Now
Curriculum
1000BASE-LX
1000BASE-SX
1000BASE-T
100BASE-FX
100BASE-SX
100BASE-TX
10BASE-T
10GBASE-SR
10GBASE-T
40GBASE-T
2.4 GHz
5GHz
3G 4G 5G
1st Layer - Physical
2nd Layer - Data Link
3rd Layer - Network
4th Layer - Transport
5th Layer - Session
6th Layer - Presentation
7th Layer - Application
802.11 Standards
802.1Q
802.1X
Acceptable Use Policy
Access Control List
Active-Active
Active-Passive
AC WiFi 5
Address Resolution Protocol - ARP
Administrative Distance
Advanced Encryption Standard - AES
Angled Physical Contact - APC
Antenna Cable Attenuation
Antenna Placement
Antennas
AnyCast
ARP Spoofing
Asset Disposal
Asset Tags
Asymmetrical Routing
Attenuation
Audit Logs
Authentication Header - AH
Authentication Methods
Auto Medium Dependent Interface Crossover - MDI - X
Automatic Private IP Addressing - APIPA
AX WiFi 6
Bad Ports
Badge Readers
Bandwidth
Bandwidth Management
Bandwidth Speed
Baseline Configurations
Basic Service Set
Biometrics
Bix
Border Gateway Protocol - BGP
Botnet
Bridge
Bring Your Own Device - BYOD
Broadcast
Broadcast Storm
Bus Topology
Cable Crimper
Cable Management
Cable Modem
Cable Stripper
Cable Tester
Campus Area Network - CAN
Canonical Name - CNAME
Captive Portal
Cat 5
Cat 5e
Cat 6
Cat 6a
Cat 7
Cat 8
Certification Issues
Change Default Passwords
Change Default VLAN
Channel Bonding
Channel Utlilization
Channels
Classful A, B, C, D, E
Classless
Classless Inter-Domain Routing
Clientless VPN
Client Server Architecture
Client-To-Site VPN
Clusters
Coaxial
Code Division Multiple Access - CDMA
Cold Site
Collisions
Command Line Tool
Confidentiality Integrity Availability - CIA
Configurations
Connectionless
Connection Oriented
Connectors
Console Cable
Control Layer
Control Plane Policing
CPU - Usage
CRC Errors
Crossover Cables
CSMA - CD
Cutters
Cyclic Redundancy Checks - CRCs
Data Encapsulation
Data Loss Prevention
Deauthentication
Decapsulation
Decibel Loss
Default Gateway
Defense In Depth
Demarcation Point
Denial-Of-Service - DoS
DHCP Relay
Digital Subscriber Line - DSL
Disable Unneeded Network Service - DUNS
Disable Unneeded Switchports
Distance Vectors
Distributed Denial-Of-Service - DDoS
Distributed Layer
DNS Caching
DSL Modem
Dual Stack
Duplexing
Duplicate IP Address
Duplicate MAC Address
Dynamic ARP Inspection
Dynamic Assignment
Dynamic Host Configuration Protocol - DHCP
Dynamic Routing
Effective Isotropic Radioactive Power - EIRP
Enable DHCP Snooping
Encapsulation Errors
Encryption Standards
Enhanced Form Factor Pluggable - SPF+
Enhanced Interior Gateway Routing Protocol - EIGRP
Enhanced Quad Small Factor Pluggable - QSFP+
Environmental Sensors
Ethernet Header
Ethernet Standards
Evil Twin
Exclusion Ranges
Explicit Deny
Extended Service Set
Factory Reset
Fiber Networking
Fiber Distribution Panel
Fiber Light Meter
File Transfer Protocol - FTP
Fire Suppressions
Firewalls
Firmware Management
First Hop Redundancy Protocol - FHRP
Forward Lookup
F- Type Connector
Fusion Splicers
Gateway
Global System For Mobile Communications
Guest Network Isolation
Hostname
Host Site
Hub
HVAC
Hybrid Topology
Hypertext Transfer Protocol - HTTP
ifconfig
IMAP
Implicit Deny
In-Band
Incident Response
Incorrect DNS
Incorrect Pinout
Incorrect VLAN
Independent Basic Service Set
Infrastructure Layer
Interface Status
Intermediate Distribution Frame - IDF
Internet Control Message Protocol - ICMP
Internet Protocol Header
Internet Protocol Security - IPSec
Internet Small Computer Systems Interface - iSCSI
Intrusion Prevention System - IPS
ip
IP Scanner
IP Spoofing
ipconfig
iPerf
IPv4
IPv4 Subnetting
IPv6
Iterative Lookup
Jitter
Jumbo Frames
Kerberos
Krone
Latency
Layer 2 Switches
Lease Time
Leased Line
Least Privilege
Link Aggregation Control Protocol - LACP
Link Local
Link State
Local Area Network - LAN
Local Authentication
Local Connector - LC
Locking Cabinets
Log Reviews
Logging Levels
Long Term Evolution - LTE
Loopback Adapter
Low Optical Link Budget
MAC Filtering
MAC Spoofing
Mail Exchange - MX
Main Distribution Frame - MDF
Management Information Bases - MIB
Management Plane
Maximum Transmission Unit - MTU
Mean Time To Repair - MTTR
Mechanical Transfer - MT
Media Access Control - MAC
Media Converter
Mesh Topology
Metro - Optical
Metropolitan Area Network - MAN
Missing Route
Motion Detection
Multi User MIMO - MU-MIMO
Multicast
Multicast Flooding
Multimeter
Multimode
MultiPathing
Multiple Input - Multiple Output
Multiple Internet Service Provider - MISP
Multipoint Generic Routing Encapsulation - mGRE
Multiprotocol Label Switching - MPLS
Multitenancy
MySQL
Name Server - NS
Neighbour Discovery Protocol
NetFlow Analyzers
NetFlow Data
Network Device Backup
Network Device Logs
Network Diagrams
Network Function Virtualization
Network Interface Card - NIC
Network Metrics
Network Segmentation Enforcement
Networking Devices
nmap
nslookup
Object Identifiers - OIDs
On-Premises Servers
Open Shortest Path First - OSPF
Orchestration
OSI Model
OTDR
Out-Of-Band
Packet Capture
Patch Panel
Payload
Peer-To-Peer
Performance Sensors
Perimeter Network
Personal Area Network - PAN
Physical Access Control Devices
PiggyBacking
Plenum
Polarization
Port Address Translation - PAT
Port Aggregation
Port Configurations
Port Mirroring
Port Tagging
Post Office Protocol v3 - POPv3
Posture Assessment
Power Distribution Unit - PDU
Power Levels
Power Over Ethernet - PoE
Pre-Shared Keys
Private Network
Private VLANs
Protocol Analyzer
Provider Links
Proxy Server
Public Network
Punchdown Block
Punchdown Tool
Recursive Lookup
Redundant Hardware
Registered Jack - RJ
Regulatory Impacts
Remote Access Policy
Remote Authentication Dial-In-User Service - RADIUS
Remote Desktop Gateway
Remote Desktop Protocol - RDP
Repeater
Reverse DNS
RF Attenuation
RFC1918
Ring Topology
Risk Management
RJ11
RJ45
Roaming
Rogue Access Point
Rogue DHCP
Role Based Access Control
Rollover Cable
Root DNS Servers
Routers
Router Advertisement
Router Advertisement - RA - Guard
Routing Internet Protocol - RIP
Routing Loops
Routing Tables
Runts
Satellite
Scope Options
Secure File Transfer Protocol - SFTP
Secure Shell - SHH
Secure SNMP
Secure Socket Layer - SSL
Security Implications
Security Policies
Send-Recieve Traffic
Server Message Block - SMB
Service Models
Service Set Identifier - SSID
Session Initiation Protocol - SIP
Security Levels
Shielded Cable
Show Config
Show Interface
Show Route
Signal Loss
Simple Mail Transfer Protocol - SMTP
Simple Network Management Protocol
Single Sign-On - SSO
Single Mode
Site-To-Site VPN
Small Form Factor Pluggable
Smartjack
SMTP TLS
Software - Defined Wide Area Network - SDWAN
Spanning Tree Protocol
Spectrum Analysers
Speed Duplex
Spine-Leaf
SQLNet
Star Topology
Start Of Authority - SOA
Stateless Address Autoconfiguration
Static Assignment
Static Routing
Static Indicators
Storage Area Network - SAN
Straight Tip - ST
Stratum
Structured Query Language - SQL
SubInterfaces
Subnet Mask
Supervisory Control and Data Accquisition
Switches
Switching Loops
Tamper Detection
TCP Flags
TCP IP
tcpdump
Telnet
Temporal Key Integrity Protocol - TKIP
Terminal Emulator
Threat Assessment
Threats - Internal External
Three Tiered
Throughput
TIA - EIA - 568A
TIA - EIA - 568B
Time-To-Live - TTL
Tone Generator
Top-Of-Rack Switching
Traffic Flows
Traffic Logs
Traffic Shaping
Transrecievers
Transmission Control Protocol - TCP
Transport Layer Security - TLS
Trivial File Transfer Protocol - TFTP
Tunnelling
Twinaxial
Twisted Pair
TX-RX
Ultra Physical Contact - UPC
Unicast
Uninterruptable Power Supply - UPS
Unshielded Cable
Uptime-Downtime
User Datagram Protocol - UDP
Virtual Desktop
Virtual IP - VIP
Virtual Network Computing - VNC
Virtual Network Interface Card
Virtual Private Network - VPN
Virtual Router Redundancy Protocol - VRRP
VLAN Hopping
Voice Gateway
Voice VLAN
VPN Headend
vSwitch
Vulnerabilities
Vulnerability Assessment
Warm Site
Wavelength Division Multiplexing
Wide Area Network - WAN
WiFI Protected Access
Wipe Configurations
Wire Map
Wireless Client Isolation
Wireless LAN Controller
Wireless Local Area Network - WLAN
Wiring Diagram
WPA2 Personal
Wrong SSID
Zero Trust
Zone Transfers
Basics of CyberSecurity A - Z
Learn Now
Curriculum
Cer Format
Access Control List - ACL
Access Control Schemes
Access Control Vestibules
Access Policies
Account Audits
Account Permissions
Account Policies
Account Types
Account Reconnaissance
Active - Passive Balancing
Administrator
Advanced Persistent Threat - APT
Adversarial Artificial Intelligence
Adversary Tactics Techniques Procedures
Air Gap
Alerts
Annualized Loss Expectancy - ALE
Annual Rate Of Occurence - ARO
Anonymization
nything As A Service - AAAS
API Attacks
API Configurations
API Inspections
API Integrations
Appliance Firewalls
Application Approved List
Application Blocklist
Application Log Files
Application Security
Application Vulnerability
Arduino
ARP Poisoning
Artifacts
At Rest Data Protection
Attack Frameworks
Attribute Based Access Control - ABAC
Attribute Of Actors
Authentication
Authentication Applications
Authentication Authorization Accounting - AAA
Authentication Log Files
Authentication Protocols
Authorized Hackers
Auto Update
Autopsy
Availability Loss
Backdoor Malware
Bandwidth Monitors
Baseband Ratio
Bash Script Execution Attack
Birthday Cryptographic Attacks
Block List
Bluejacking Attack
Bluesnarfing Attack
Blue Team Exercise
Bollards
Boot Attestation
Boot Integrity
Boot Security
Bots
BPDU Guard
Brute Force
Bug Bounty
Camoflauge
Captive Portals
Card Cloning
Carrier Unlocking
CASB
CBC MAC Protocol
Center For Internet Security
Certificate Attributes
Certificate Chaining
Certificate Formats
Certificate Revocation List - CRL
Challenge Handshake Authentication Protocol - AHAP
Channel Overlaps
Checksums
chmod
Choose Your Own Device - CYOD
Cipher Suites
Client Side Execution
Client Side Validation
Closed Circuit Television - CCTV
Cloud Based Vulnerabilities
Cloud Control Matrix - CCM
Cloud Security Alliance
Cloud Security Controls
Cloud Vectors
Cloud Based Attacks
Code Repositories
Code Reuse
Code Signing
Cold Aisle
Cold Site Resiliency
Collision Cryptographic Attacks
Commanding - Controlling
Common Vulnerabilities and Exposures - CVE
Common Vulnerabilities and Scoring - CVS
Communications Considerations
Competitors Threats
Compute Constraints
Conditional Access
Configuration Management
Consensus
Container Security
Continous Delivery
Continous Deployment
Continous Integration
Continous Monitoring
Continous Validation
Control Risk
Controller And Access Point Security
Corrective Control Type
Counterintelligence
Credential Harvesting
Credential Policies
Criminal Syndicates Threats
Cross Site Request Forgeries - CSRF
Cross Site Scripting
Crossover Error Rate
Crypto Constraints
Cryptographic Attacks
Cryptographic Protocols
Cryptomalware
Cuckoo
curl
Custom Firmwares
Cyber Kill Chain
Cybersecurity Assessment Tool
Cybersecurity Framework - CSF
Cybersecurity Insurance
Dark Webs
Data Breach Laws
Data Exfilteration
Data Exposure
Data Loss Prevention
Data Masking
Data Protection Officer - DPO
Data Sanitation
Data Sovereignty
Data Steward
Dead Code
Demilitarized Zone - DZ
Deny List
Deployment Models
Deprovisioning
Detective Control Type
Deterrent Control Type
Device Credentials
DHCP - Snooping
Dictionary Attack
Differential Backup
Direct Access Vectors
Directionary Traversal
Dissociation Attack
Discretionary Access Control
Disk Encryption
Distinguished Encoding Rules
DNS Log Files
DNS Poisoning
DNS Sinkhole
dnsenum
Domain Hijacking
Domain Name Resolution
Domain Name System
Domain Name System Security Extensions - DNSSE
Domain Validation
Downgrade Cryptographic Attacks
Driver Manipulation
Dumpster Diving
Dynamic Code Analysis
Dynamic Link Library - DLL
Dynamic Resource Allocation
EAP
EAP FAST
EAP TLS
EAP TTLS
East West Traffic
E-Discovery
Eliciting Information
Elliptic Curve Cryptography
Email Metadata
Encapsulating Security Payloads
End-Of-Life - EOL
End-Of-Service Life - EOSL
Endpoint Detection and Response
Endpoint Protection
Environmental Disasters
Ephemeral
Error Handling
Event Logs
Evil Twin Attack
Exploitation Frameworks
Extensible Authentication Protocol - EAP
Extensible Markup Language - XML
External Risks
Extranet
Facial Security
Fake Telemetry
False Acceptance
False Negatives
False Positives
False Rejections
Field Programmable Gate Array
File Manipulations
File Metadata
File Repositories
File Transfer Protocol Secure - FTPS
Fileless Virus
Filesystem Permissions
Firewall Rules
Fog Computing
Foot Printing
Forensics
Forward Proxy Servers
FTK Imager
Full Device Encryption
Full Disk Encryption - FDE
Full Tunnel
Functional Recovery Plans
Gait Analysis
General Data Protection Regulation
Generic Accounts
Generic Credentials
Geofencing
Geographic Dispersal
Geographical Considerations
GeoLocation
GeoTagging
Global Positioning System
Governance Data
GPS Tagging
grep
Guest Accounts
Hacktivists Threats
Hardware Firewalls
Hardware Root Of Trust
Heat Maps
HMAC Based - HOTP
Homomorphic Encryption
Honeyfiles
Honeynets
Honeypots
Host Based Firewall
Host Based Intrusion Detection System
Host Based Intrusion Prevention System
Host Aisle
Hot Site Resiliency
Hotspot
hping
HSM
HTTP Headers
Identity Fraud
Identity Provider
Identity Theft
Impact Assessments
Improper Patch Agreement
Incident Response Plans
Incident Response Process
Incremental Backup
Industrial Camoflauge
Industrial Control Systems - ICS
Information Life Cycle
Inherent Risk
Initialization Vector Attack
Input Validations
Insider Threats
Installations Considerations
Integer Overflow
Intelligence Fusion
Internal Disasters
Internet Message Access Protocol
Internet Of Things - IoT
Intranet
Intrusive Vulnerability
Invoice Scams
IP - Schema
IP Theft Risks
IPFIX
IPSec
Iris
Jailbreaking
Jamming Attack
journalctl
Jump Servers
Key Escrow
Key Exchange
Key Stretching
Key Loggers
Keys Management
Knowledge Based Authentication
Known Environment
Last Good Known Environment
Lateral Movements
Layer 2 Attacks
Layer 2 Tunnelling Protocol - L2TP
Legacy System Risks
Licensing Risks
Lightweight Cryptography
Lightweight Directory Access Protocol
Live Boot Media
Load Balancing
Lockout
Log Aggregations
Log Collectors
Log Files
Logger
Logic Bombs
Longevity
Loop Prevention
Low Latency
MAC - Filtering
MAC Cloning
MAC Flooding
Macros Script Execution Attack
Malicious Code
Malicious Flash Drive
Malicious Universal Serial Bus - USB
Malwares
Man In The Browser Attack - MiTB
Managed Security Service Provider - MSSP
Managed Service Provider - MSP
Mean Time Between Failures - MTBF
Measured Boot
Memdump
Memory Leak
Memory Management
Metadata
MicroSD Hardware Security Module
Microservices
Mobile Application Management - MAM
Mobile Device Management - MDM
Monitoring Services
Multipurpose Internet Mail Extensions
NarrowBand
NAS Backup
NAT Gateway
Near Field Communication Attack - NFCA
Nessus
netcat
Netflow
Network Address Allocation
Network Based Intrusion Detection System
Network Based Intrusion Prevention System
Network Layer DDoS
Network Log Files
Network Segmentation
Next Generation Firewall
Next Generation Secure Web Gateway
NIC Teaming
Non-Intrusive Vulnerability
Network Of Breaches
NXLog
OAuth
Object Deference
Offline Attacks
Offsite Storage Backup
On Path Attack
On Premises Vulnerabilities
Online Attacks
Online Certificate Status Protocol
On Premises Attacks
Opal
Open Source Intelligence
Open Systems Interconnections
Open Web Application Security Project
OpenID
Open SSL
Operational Technology - OT
Over The Air - OTA
P12 Format
P7B Format
Pagefile
Partially Known Environment
Pass The Hash Attack
Passive Reconnaissance
Password Attacks
Password Authentication Protocol
Password Complexity
Password Crackers
Password History
Password Keys
Password Reuse
Password Vaults
Pathping
Personal Information Exchange - PFX
Pharming
Phishing Simulators
Physical Attacks
Ping
Pinning
Pivoting
Plaintext Attacks
Playbooks
Pointer Deference
Port Security
Port Scanning
Port Taps
Post Office Protocol - POP
Potentially Unwanted Programs - PUPs
Powershell
Powershell Script Execution Attack
Predictive Analysis
Preventive Control Type
Privacy Enhanced Mail - PEM
Privacy Enhancing Technologies
Private Information Sharing Centers
Private Subnets
Protected Cable Distribution
Protected Extensible Authentication Protocol
Pseudo Anonymization
Public Information Sharing Centers
Public Key Infrastructure - PKI
Public Subnets
Pulverizing
Purple-Team Exercise
Push Notifications
Python Script Execution Attack
Qualitative Risk Assessment
Quantitative Risk Assessment
Rainbow Table
Ransomware
Real Time Operating System - RTOS
Recovery Point Objective - RPO
Recovery Time Objective - RTO
Redundancy
Remote Access
Remote Access Trojan - RAT
Remote Wipe
Removable Media Vector
Replay Attack
Requests For Comments - RFC
Request Forgeries
Residual Risk
Resource Exhaustion
Retention Policies
Reverse Proxy Servers
Revert To Known State
Revoke Certificates
RFID
RFID Attack
Rich Communication Services - RCS
Risk Analysis
Risk Assessment Types
Risk Awareness
Risk Control Assessment
Risk Management Framework - RMF
Risk Management Strategies
Risk Matrix
Risk Register
Rogue Access Point Attack
Role Based Access Control
Roots Account Credential
Rooting
Rootkit
Route Security
rsyslog
Rule Based Access Control
Runbooks
Sandboxing
Scalability
Screened Subnet
Script Execution
Script Kiddies Treats
Secure Cookies
Secure Data Destruction
Secure Real Time Transport Protocol
Security Assertion Markup Language - SAML
Security Constraints
Security Groups
Security Information And Event Management
Security Log Files
Security Of Machine Learning Algorithms
Security Orchestration Automation Response
Self Encrypting Drive - SED
Semi Authorized Hackers
Server Side Execution
Server Side Request Forgeries - SSRF
Server Side Validation
Serverless Architecture
Service Accounts Credentials
Session Replays
sFlows
Shared Accounts
Shared Credentials
Shimming
Short Message Services - SMS
Shredding
Sideloading
SIEM Dashboards
Simultaneous Authentication Of Equals
Single Loss Expectancy - SLE
SIP - Traffic
Site Resiliency
Shimming
Smart Card Authentication
Smart Cards
Smart Meters
Smishing
Snapshot Backup
SNMPv3
Social Engineering Principles
Social Media Analysis
Social Media Vectors
Software As A Service - SAAS
Software Defined Visibility - SDV
Software Development Kits - SDK
Software Firewalls
Spam
Spam Over Instant Messaging
Spear Phishing
Split Tunnel
Spraying
Spyware
SSH File Transfer Protocol - SFTP
SSH Keys
SSL Stripping
Staging
Standard Naming Conventions
Stateful Firewalls
Static Code Analysis
Steganography
Storage Area Network Backup
Storage Encryption
Storage High Availability
Storage Permissions
Storage Replication
Storage Segmentation
Structured Threat Information Exchange - STIE
Subscriber Identity Module - SIM
Supply Chain Attacks
Supply Chain Vectors
Surveillance Systems
Syslog
syslog - ng
System Log Files
System On Chip - SOC
TACACS+
TAILS
Tape Backup
TAXII
Tcpreplay
Thin Client
Third Party Updates
Third Party Credential
Threat Feeds
Threat Hunting
Threat Intelligence Sources
Time Based - TOTP
Time Offset
Time Stamps
Time Synchronization
TLS Inspection
Token Key
TPM
Transit Gateway
Trends
Trojans
Trust Models
Trusted Platform Models - TPM
Two Person Integrity
Typosquatting
Unauthorized Hacking
Unencrypted Attacks
Unified Endpoint Management - UEM
Unified Threat Management
Unknown Environment
Unsecure Root Accounts
URL - Redirection
URL Filter
USB Data Blocker
User Behaviour Analysis
VBA Script Execution Attack
Vendor Specific Guides
Version Control
Virtual Desktop Infrastructure - VDI
Virtual Firewalls
Virtual Local Area Network - VLAN
Vishing
VM Escape Protection
VPC Endpoint
Vulnerability Feeds
Vulnerability Scans
Vulnerable Databases
WAP Placement
War Driving
War Flying
Warm Site Resiliency
Watering Hole Attack
Weak Configurations
Weak Encryptions
Weak Keys
Weak Patch Management
Web Application Firewall
Web Application Vulnerability
Web Log Files
Web Metadata
Whaling
White-Team Exercise
WiFi Analyzers
WiFi Direct
WiFi Protected Access 2 - WPA2
WiFi Protected Access 3 - WPA3
WiFi Protected Setup
WinHex
Wireless Attacks
Wireless Vectors
Wiresharks
Worms
Zero Day
ZigBee
Basics of AI / ML / Data Science
Learn Now
Curriculum
.tde files
AB Testing Techniques
Ad - Hoc
Advanced Machine Learning
Advanced Charts
Advanced Data Analysis
Advanced Data Structures
Advanced Hashing Techniques
Aggregate Functions
Aggregations
AI Bias
AI Fairness
AI Future Trends
AI Generative Tools
Alphanumeric
Anaconda
Analysis Types
Apache Spark
Apex
Application Programming Interface - APIs
Application Of Hash Tables
Application Of Queues
Application Of Stacks
Applied Analytics
Approximation Methods
Area Charts
ARIMA Explanatory Variables
ARIMA Model Calculations
ARIMA Models
Array Overview
Arrays
Assess Data Quality
Auto Complete
Automating Tasks
Automation Bot
Average Probability
Average Lines
AVL Lines
B - Trees
B+ Trees
Background Image
Back-Propagation
Backtracking
Backtracking Algorithm
Bar Chart
Bard
Basic Charts
Bayes Theorem
Bellman - Ford Algorithm
BI Reports
Bias - Fairness
Big Data
Binary Search Tree
Binary Tree Traversals
Binary Trees
Bing
Binomial
Bins
Blend Data
Bottom N
Box Plots
Breadth First Search - BFS
Bubble Chart
Business Case Studies
Cardinality
CartPole
Central Tendency
Chi-Squared
Chloropeth Maps
Classification Models
Cleansing Datasets
Cloud Based
Cloud Deployments
Clustering
Code Automation
Cohort Orientation
Column Level Shading
Column Level Bands
Columns
Combining Sheets
Combo Chart
Comma Delimited
Compliance Reports
Compound Growth Rate
Comprehensive Data Structures
Computer Vision
Concatenation
Conditional Formatting
Conditional Loops
Confidence Intervals
Configuring Filter Settings
Conformity
Connect To Relational Databases
Connect To Extracts
Connect To Hyper Files
Connect To Spreadsheets
Connecting Dataset
Consistent Hashing
Containerizing ML Models
Containers - Layout Options
Convolutional Neural Network - CNN
Creating Dashboards - Stories
Creating Visuals
Creating Aliases
Creating Joins
Cross Validation
CRUD
Currency
Custom Geocoding
Custom Table Calculations
Custom Sort
Custom SQL Queries
Customer Experience Mapping
Customer Support Bot
DALL-E
Dashboard Actions
Dashboard Stories
Data Accuracy
Data Acquisition
Data Analysis
Data Analysis - Numpy
Data Analysis - Pandas
Data Analytics Tools
Data Append
Data Attribute
Data Audits
Data Blending
Data Breach
Data Cleansing
Data Collection
Data Collection Methods
Data Completeness
Data Consistency
Data Constraints
Data Content
Data Deletion
Data Encryption
Data Exploration
Data File Formats
Data Filtering
Data Frame Programming
Data Frames
Data Integrity
Data Intrahops
Data Lake
Data Locality
Data Manipulation
Data Mart
Data Merge
Data Mining
Data Mode
Data Modelling
Data Modelling Techniques
Data Outliers
Data Preparation
Data Pre-Processing
Data Processing
Data Profiling
Data Retention
Data Schemes
Data Source
Data Structures
Data Transformation
Data Transmission
Data Types
Data Understanding
Data Visualization
Data Visualisation Basics
Data Visualisation Tools
Data Warehousing
Data Extract Refresh
Data Forecasting Model
Data Interpreter
Data Tables
Databases
Datorama
Dataset
Datatype Variation
Date Functions
Date Range
Date Values
Date Calculations
DateName
DateParse
DBMS
Debugging Techniques
Decision Tree Model
Decisions
Decision Control
Deep CNN
Deep Learning
Deep Learning Algorithms
Deep Q-Learning Algorithms
Default Field Properties
Delta Load
Density Maps
Derived Variables
Descriptive Statistics
Detrending
Dijkshetra's Algorithm
Dimension
Dimension Measures
Discrete Probability Distributions
Discrete-Continous
Dispersion
Displaying
Distribution
Distribution List
Distribution Bands
Domo
Double Ended Queue - Deque
Drill Down
Dual Axis Chart
Duplicate Data
Dynamic Programming
Dynamic Reports
EDA
Enabling Interactivity
Encoding the Data
Error - ANOVA
Essential Data Structures
Establishing Relationships
Ethical Challenges
Ethical Considerations
Ethical Implications
Ethical Limitations
Ethics of Generative AI
Evaluation Metrics
Exception Handling
Execution Plan
Exploratory Data Analysis
Exponentially Weighted Moving Average
Extract Filters In Tableau
Extract, Load, Transform - ELT
Feature Engineering
Feedback Loops in ML Deployment
Filled Maps
FIXED LOD Calculations
Flavors of Python
Flow Controls
Forms Menu
Frequency
Frozen Lake Equipment
F1 Score
Functions
Function Modules
Fundamentals Of Math
Fundamentals Of Probability
Fundamentals Of Statistics
Gantt Chart
Generative Adversarial Network - GAN
Generative AI
Generative Modelling
Geographic Map
Graph Neural Networks - GNN
Graph Size
Graphs
Greedy Algorithm
Gridlines
GROUP BY
Grouping
Groups
Haar Cascade
Hadoop
Hash Tables
Hashing
Hashing Techniques
Having Clauses
HBase
Heap
Hiding
Hierarchial Clustering
Hierarchies
High Dimensional Data Analysis
Highlight Table
Hyperparameter Tuning
Hypothesis Testing
Image Classification
Image Enhancement
Image Filtering
Image Processing
Image Recognition
Image Segmentation
Images
Imputation
Indexing
Inferential Statistics
Infographic
Information Retrieval
Inserting Cells
Integrated Prompt Engineering
Integration
Intelligent News Aggregator
Interview Bots
Invalid Data
Javascript Object Notation - JSON
Join Clause
JSON Data
K-means Clustering
K-Nearest Neighbour Model - KNN
Kart Model Business
Keras API
Key Performance Indicators - KPI
Key Value Pairs
Knowledge Discovery Bot
Kruskal's Algorithm
Labels
LangChain Concepts
LangChain Tools
Language Identification
Layout
LCS Algorithm
Learning Algorithms
Legends
Levenshtein Distance
Line Chart
Linear Algebra
Linear Regression
Link Prediction
Linked Lists
Lists
Live Data Feed
Live Connection
Local Storage
Log Based Differencing
Logical Functions
Logical Expressions
Logistic Regression
Looker
LookML
Loop Control
Machine Data
Machine Learning Pipelines
Macros
Managing Workloads
Manual ARIMA Parameter Selection
Map Data Geographically
Map Reduce
Map Reduce Use Cases
Map Reduce Architecture
Marketing Perfomance Analysis
Master Data Management
Master Slave Architecture
Matplotlib
Max
Mean
Median
Medical Survey
Microstrategy
Min
Minimum Spanning Tree
Minitab
Missing Values
ML Deployment Lifecycle
ML Deployments
MLP Architecture
Mode
Model Deployments
Model Evaluation
Model Management
Model Serialization
Model Training
Model Versioning
Modelling Techniques
Modules
MongoDB
MongoDB Shell
Month-To-Date
Moving Average Forecast
Moving Toolbars
Moving Average
Multimodal Models
Multiple Tables
Multivariate Time Series
Naive Bayes Model
Natural Language Models - NLM
Natural Language Processing - NLP
Natural Language Toolkit - NLT
Navigation
Navigation Buttons
Neural Network
Neural Network Architectures
N-GRAMS
NLP Spacey
Node Classification
Node Conformity
Non - Parametric Data
Non - Relational Databases
Normalization Constraint
Normalize Data
NoSQL
Number Functions
Numeric Data
Numerical Programming
NumPy
Object Localization
Observation
One Time Report
Online Analytical Processing - OLAP
Online Platform Metrics
Online Transactional Processing - OLTP
Open Ended Project
Operational Reports
Optimizing Models
Optimizing Models For Deployment
Padding
Pandas
Parametrization
Parsing
Pattern Searching
PCA
Percent Change
Percent Of Difference
Percent Of Total
Percentages
Percentile
Performance
Performance Analysis
Permutations - Combinations
Persisting RDD
Personalized News Recommendation
Pie Chart
Pivot Tables
Point-In-Time
Poission
Polygon Maps
Pooling
Population
Population - Sample
Power BI
PowerBI Services
Practice Aggregation Queries
Precision
Predicting Smartphone User Behaviour
Predictive Model
Prim's Algorithm
Principle Component Analysis - PCA
Probabilistic Graphical Models
Probability
Probability Distribution
Problem - Solving Techniques
Product Analytics
Product Usage Onboarding
Productionization
Profiling Datasets
Programming Environmental Setup
Programming Functions
Programming Fundamentals
Programming Modules
Pseudocode Flowcharts
Public Databases
P-Values
PySpark
Python
Python Data Types
Query Optimization
QuerySet
Queues
Random Forest
Range
Rapid Mining
RDD Programming
Real Time
Real-Time Projects
Real World Applications
Reasonable Expectations
Recoding Data
Record Link Restrictions
Recurrent Neural Networks
Recurring Reports
Recursion
Reduction
Redundant Data
Reference Bands
Reference Lines
Regression Models
Regular Expression
Reinforcement Learning
Relational DataBase Management System - RDBMS
Release Approvals
Reporting Techniques
Research Report
Responsible AI
Responsive Design
RESTful API
Revisiting HelpMate
Reward Discounting
Risk and Regulatory Reports
RHLF
RNN in skflow
Role Based Access Control - RBAC
Roll Up
Row Level Shading
Row Level Bands
Rows
Rows Failed
Rows Passed
R-Spark
Rule Based Systems
Running Total
Sample
SAS
Scaling Strategies
Scatter Plots
Scheme Designing
Seaborn
Security Requirements
Segment Tree
Semantic Search
Semantic Segmentation
Sequence Triggers
Sequential API
Sets
Shaping Data
Shaping Data By Pivots
Shared Drive
Sheet Selectors
Shortest Path Algorithms
Similarity Checks
Simple Computations
Simple Constants
Simple Regression
Simple Variables
Single Shot MultiBox Detector
Skflow
Sorting Data
Spacy
Spark
Spark Analytics
Spark RDD Programming
Spark SQL
Specialized Hardware
Specific Device Layouts
Specification Mismatch
Split
Sports Analytics
Spot Check
Spreadsheets
SQL Fundamentals
SQOOP
Stacked Chart
Stacks
Standard Deviations
Star Schema
Stata
Static Data
Static Report
Statistical Thinking
Statistics
Stemming
Stock Prices
Story Point
String Manipulation
String Functions
Strings
Strongly Connected Components
Structure The Data
Subqueries
Subset Of Records
Support Vector Machines - SVM
Survey
Swapping Sheets
Symbol Maps
Syntax
Tab Delimited
Tableau
Tableau Prep Workflow
Tableau Server
Taxi Environment
TensorBoard
Tensorflow
Text Analysis
Text File
Text Generation
Text PreProcessing Techniques
TF-IDF
TFLearn APIs
Time Series
Time Series Analysis
Time Series Classification
Time Series Data
Time Series Forecasting
Titles
Top N
Toxic Comments
Transformer Models
Transpose
Travelling Salesman Problem - TSP
Tree Map
Trees
Trend Lines
Trie
T-tests
Type 1 Errors
Type 2 Errors
Type Conversion Functions
Undefined Fields
Understanding AI Trends
Union Tables
Unstructured Data
User Group Based
User Guiding Sentences
Value Approximisation
Variables
Variance
Variational Autoencoders - VAEs
Video
Visual AI
Visual Analytics
Visual Representation
Visualisation
Waterfall
Waterfall Diagrams
Web Scraping
Web Services
Weight Initialization
WMS - Warehouse Management System
Word Cloud
Word2Vec
Year Over Year
Year To Date
Z-Score
Z-score method
error:
Content is protected !!