I recently wrapped up a truly impactful series of four courses on LinkedIn Learning that have fundamentally shifted my perspective on modern cybersecurity. This wasn’t just about collecting certificates; it was a deliberate journey to connect the dots between strategic business governance (GRC), technical risk management, and proactive security operations (Threat Hunting). Here’s a breakdown […]
The Algorithm Wars: Why ECC Dominates RSA in Modern Cryptography
In the foundational layer of digital security, two giants have long battled for supremacy in public-key cryptography: RSA (Rivest–Shamir–Adleman) and ECC (Elliptic Curve Cryptography). Both are essential for securing TLS/SSL connections, digital signatures, and key exchange, but in recent years, ECC has emerged as the clear winner, especially in resource-constrained environments. For security professionals, understanding […]
Mastering the Chaos: Completing Jason Dion’s Incident Response Planning Course
In the realm of cybersecurity, the only acceptable posture is readiness. When a cyberattack inevitably strikes, the difference between a controlled situation and an organizational crisis lies entirely in the quality of your Incident Response (IR) plan. That’s why I recently dedicated time to completing the Incident Response Planning course on LinkedIn Learning, led by […]
Uh Oh, You Think You’ve Been Hacked? Here’s What to Do
Uh Oh, You Think You’ve Been Hacked? Here’s What to Do So, you suspect something’s amiss. Maybe your computer is running slower than usual, strange pop-ups are appearing, or your sensitive data might be compromised. The dreaded “I’ve been hacked” feeling might be setting in. Don’t panic! While a data breach can be stressful, taking […]
Setting Up a Jellyfin Server on Ubuntu with TrueNAS Storage
Jellyfin is an open-source media server that provides a powerful and customizable alternative to popular options like Plex. This guide will walk you through setting up a Jellyfin server on an Ubuntu machine with your media library stored on a TrueNAS server. Why Jellyfin? Setting Up Jellyfin on Ubuntu Integrating with TrueNAS Benefits of Using […]
Completed Requirements for “Proofpoint Certified Phishing Specialist 2024”
I’m proud to have completed the Proofpoint Certified Phishing Specialist 2024 certification. This program has equipped me with the knowledge and skills to effectively identify and mitigate phishing threats. By leveraging Proofpoint’s innovative solutions, I can now help organizations like yours improve their cybersecurity posture and protect their valuable assets from these ever-evolving attacks. Verify
Completed Proofpoint Essentials Level 1 Technical Training
Completed Requirements for “Proofpoint Certified Ransomware Specialist” by Proofpoint
Completed “Kaseya Certified Technician for BMS” by Kaseya University
Completed Devotional Plan “Friendship—It’s Complicated” on Bible.com’s YouVersion App
We all want friendships in which we can avoid the drama, create authentic connection, and fulfill our purpose together. So what do we do with the mess, the wounds from past relationships, and the opinions of others? Join Andi Andrew for this 10-day study where we’ll share honest stories, study scripture, ask the hard questions, […]