Jump to content

CoolIslandSongs

Members
  • Content Count

    25
  • Joined

  • Last visited

  • Days Won

    16

CoolIslandSongs last won the day on August 25 2018

CoolIslandSongs had the most liked content!

Community Reputation

2,234 Excellent

1 Follower

About CoolIslandSongs

  • Rank
    Member

Profile Information

  • Gender
    Not Telling
  • Location
    sw(config-line)#

Recent Profile Visitors

211 profile views
  1. I believe this might be it. Credit goes to TuPadre for the original share. [Hidden Content]
  2. I would start by looking for the 3502 APs and using the Virtual WLC. If 3502 APs are too expensive, 1140s and 1240s will do. You can also look at the 3602 and 3702, but they will be more expensive. 3502 shouldn't be more than $40.
  3. This is difficult share to continue to support due to size. What is the specific current request?
  4. ISO/IEC 27002:2013 provides guidelines for organizational information, security standards, and information security management practices, including the selection, implementation, and management of controls, taking into consideration the organization's information security risk environment. It is designed to be used by organizations that intend to: Select controls within the process of implementing an information security management system that is based on ISO/IEC 27001 implement commonly accepted information security controls develop their own information security management guideline [Hidden Content] ISO 31000:2018, Risk management – Guidelines, provides principles, framework and a process for managing risk. It can be used by any organization regardless of its size, activity or sector. Using ISO 31000 can help organizations increase the likelihood of achieving objectives, improve the identification of opportunities and threats and effectively allocate and use resources for risk treatment. [Hidden Content]
  5. This site uses the JS:MINER-C Trojan. Do not have active Javascript when/if accessing this website.
  6. The point of the question is to infer the difference between social engineering and phishing. While they are similar, they are not the same. This rules out DE and leaves AC as the most correct choices.
  7. The BGP book collection is nice.
  8. Good share, although there are some better 7200 files out there in the Cisco - Other section.
  9. Confirmed. These are IPexpert's CCIE Wireless V3 videos. This is only the first 178 videos which is all that have ever been found. Good share, but not INE.
  10. Only the first 178 videos have been shared in the wild. If I ever find more, I will upload them.
×
×
  • Create New...