December 2022

The Open Systems Interconnection (OSI) Model

This post discusses the Open Systems Interconnection (OSI) Model. It constitutes Lesson 2 of the module How data flow through the Internet. Key concepts discussed in this post include the OSI model Physical layer, Data Link layer, Network layer, Transport layer, Session layer, Presentation layer, Application layer, and data encapsulation/de-encapsulation. You may also be interested […]

The Open Systems Interconnection (OSI) Model Read More »

Open-Systems-Interconnection-osi-1200x675px

Network devices and their functions

This post discusses network devices and their functions. It constitutes Lesson 1 of the module How data flow through the Internet. Key concepts discussed in this post include hosts, IP addresses, networks, repeaters, hubs, bridges, switches, and routers. You may also be interested in How data flow through the Internet. Learning objectives Some networking basics

Network devices and their functions Read More »

network-devices-their-functions-1200x838px

Compliance frameworks and industry standards

This post covers the background needed to understand the key cybersecurity compliance frameworks and industry standards recommended or required for organizations to implement to protect critical data – important knowledge no matter what cybersecurity role you have within an organization. Cybersecurity compliance frameworks and industry standards discussed include NIST, GDPR, ISO, SOC, HIPAA, and PCI. This post

Compliance frameworks and industry standards Read More »

Cybersecurity-Compliance-Frameworks-Industry-Standards-1200x800px

Job roles in IT and cybersecurity

This post gives a succinct overview of in-demand job roles in IT and cybersecurity. Key job responsibilities, skills, and certifications for the following IT and cybersecurity roles are covered: System Administrator, Network Administrator, Incident Responder, Penetration Tester, Cloud Engineer, Cybersecurity Manager, and Privacy Analyst. You may also be interested in IT career paths – everything you

Job roles in IT and cybersecurity Read More »

job-roles-it-cybersecurity-1200x821px

How to bully-proof higher education organizations – article digest

Zoé Ziani (2022) sheds light on why higher education is fertile ground for bullying behavior – and offers several suggestions for how to bully-proof higher education organizations. You may also be interested in Supervisor bullying in academia is alive and well – article digest. Research reveals that bullying behavior is more common in higher education than

How to bully-proof higher education organizations – article digest Read More »

bully-proof-higher-education-1200x675px

Supervisor bullying in academia is alive and well – article digest

Supervisor bullying in academia is alive and well, says Timothy Ijoyemi. In Times Higher Education, Ijoyemi (2021) writes that “the arrangements that trap PhD students in toxic relationships with abusive supervisors must be reformed” – and offers several practical suggestions to empower students to leave toxic relationships. You may also be interested in How to

Supervisor bullying in academia is alive and well – article digest Read More »

supervisor-bullying-academia-1200x801px

Key CCNA terms and concepts

This post focuses on key CCNA terms and concepts. This is a CCNA glossary for Cisco IT professionals. You may also be interested in How to get CCNA certification. CCNA glossary Application Programming Interfaces (APIs) and REST APIs: APIs are published instructions to interface with a product or service. APIs enable developers to assemble a

Key CCNA terms and concepts Read More »

key-ccna-terms-ccna-glossary-1200x1015px
Text copying is disabled!