Skip to content
crmnuggets

CRMNUGGETS

RELIGION. DIGITAL MARKETING. PROJECT MANAGEMENT. ITIL 4 AND MORE

  • Home
  • ABOUT
  • CRM
    • SCRUM
    • ITIL 4
  • STC 30
  • PROJECT MANAGEMENT
  • RCCG SOD
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
  • MORE
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME

Category: COMPUTER SECURITY

MTA 98-360: Configuring Profiles In Windows 8.1
COMPUTER SECURITY

MTA 98-360: Configuring Profiles In Windows 8.1

  There are two types of accounts that can be added to a device running Windows 8.1: a Microsoft account and a local account. In this project, you will add…

Adeniyi SalauApril 7, 2023September 26, 2023
MTA 98-360: Configuring the Start Menu In Windows 8.1
COMPUTER SECURITY

MTA 98-360: Configuring the Start Menu In Windows 8.1

MTA 98-360: Configuring the Start Menu     Description: One of the major adjustments from moving to Windows 7 to Windows 8 was the disappearance of the Start button from…

Adeniyi SalauApril 7, 2023September 26, 2023
MTA 98-368: Joining a Device to a Network In Windows 8.1
COMPUTER SECURITY

MTA 98-368: Joining a Device to a Network In Windows 8.1

  When a device is first configured, it actually belongs to a network called a workgroup. A workgroup is a peer-to-peer network in which devices can communicate and share information…

Adeniyi SalauApril 7, 2023September 26, 2023
MTA 98-368: Configuring The Control Panel in Windows 8.1
COMPUTER SECURITY

MTA 98-368: Configuring The Control Panel in Windows 8.1

  In this exercise, you will review some of the different ways in which you can access the Control Panel. You will also look through the different Control Panel views,…

Adeniyi SalauMarch 22, 2023September 27, 2023
MTA 98-368: Obtaining A Microsoft Account In Windows 8.1
COMPUTER SECURITY

MTA 98-368: Obtaining A Microsoft Account In Windows 8.1

  In order to best utilize features on any Windows device (such as a Surface, Windows Phone, or Xbox), you will need to have a Microsoft account. This account, which…

Adeniyi SalauMarch 22, 2023September 27, 2023
Understanding Common Worm Pattern In Cybersecurity
COMPUTER SECURITY

Understanding Common Worm Pattern In Cybersecurity

Types of Malware End devices are especially prone to malware attacks. Therefore, the focus of this topic is on threats to end devices. Malware is short for malicious software or…

Adeniyi SalauSeptember 28, 2022October 2, 2023
Threat Intelligence Service In Network Security
COMPUTER SECURITY

Threat Intelligence Service In Network Security

There is a need for vendors to have a catalogue of known viruses so that they can profile them and share their knowledge with others. The Threat Intelligence Department always…

Adeniyi SalauSeptember 17, 2022October 2, 2023
Understanding SOAR In Network Security
COMPUTER SECURITY

Understanding SOAR In Network Security

SOAR stands for Security Orchestration, Automation, and Response. The term is used to describe three software capabilities – threat and vulnerability management, security incident response and security operations automation. SOAR…

Adeniyi SalauSeptember 17, 2022October 2, 2023
Understanding SIEM In Network Security
COMPUTER SECURITY

Understanding SIEM In Network Security

Understanding SIEM In Network Security       Security Information and Event Management was introduced in 2005 It analyses security alerts in real-time. Fundamentally, SIEM does three things. Alert, normalize…

Adeniyi SalauSeptember 17, 2022October 2, 2023
Analysing Secured Email Gateway For Networks
COMPUTER SECURITY

Analysing Secured Email Gateway For Networks

  Your email is the very first thing people did when the world when online in the 90s. It comes with very little bandwidth because technology allows for very little…

Adeniyi SalauSeptember 17, 2022October 2, 2023
Understanding Sandbox Technology For Networks
COMPUTER SECURITY

Understanding Sandbox Technology For Networks

Sandbox Technology is a means of isolating applications or data in a virtual environment in order to see how it will behave. It also networks security experts to discover whether…

Adeniyi SalauSeptember 17, 2022October 2, 2023
Some Data Backup Checklists For Users
COMPUTER SECURITY

Some Data Backup Checklists For Users

In many of my previous articles, I have discussed it that you need to make sure that you backup your data. When you do data backup, you are protecting your…

Adeniyi SalauSeptember 17, 2022October 2, 2023
6 Common Threats To Wireless Networks
COMPUTER SECURITY

6 Common Threats To Wireless Networks

   In my previous articles, I have talked about all that you need to know about Home Networks. In this article, I want to look at all that you need…

Adeniyi SalauSeptember 17, 2022October 2, 2023
How To Use Windows Easy Transfer
COMPUTER SECURITY

How To Use Windows Easy Transfer

In my previous article, I have talked about some of the facts that you need to know about computer network security generally. In this article, I want to throw more…

Adeniyi SalauSeptember 17, 2022October 2, 2023
10 Types Of Network Security Threats
COMPUTER SECURITY

10 Types Of Network Security Threats

When it comes to the process of connecting two or more computers together, there are some risks that are associated with it which you have to be aware of. I…

Adeniyi SalauSeptember 17, 2022October 2, 2023
How To Use Firewall And Anti-Virus For Device Protection
COMPUTER SECURITY

How To Use Firewall And Anti-Virus For Device Protection

A firewall is a part of the computer system or network that is designed to block unauthorised access from devices. In this article, I want to talk about some of…

Adeniyi SalauSeptember 17, 2022October 2, 2023
4 Major Types Of Threat Actors In Cyber Attacks
COMPUTER SECURITY

4 Major Types Of Threat Actors In Cyber Attacks

Threat actors include but are not limited to, amateurs, hacktivists, organized crime groups, state-sponsored, and terrorist groups. Threat actors are individuals or groups of individuals who perform cyberattacks. Cyberattacks are…

Adeniyi SalauSeptember 17, 2022October 2, 2023
Understanding Network Representation For Networks
COMPUTER SECURITY

Understanding Network Representation For Networks

Network architects and administrators must be able to show what their networks will look like. They need to be able to easily see which components connect to other components, where…

Adeniyi SalauSeptember 16, 2022October 2, 2023
Understanding Human-Based Social Engineering
COMPUTER SECURITY

Understanding Human-Based Social Engineering

In my previous article, I have talked more about social engineering and some of the reasons why you need to keep your personal data and identity secured. In this article,…

Adeniyi SalauSeptember 16, 2022October 2, 2023
Facts About Identity Theft In Computer Security
COMPUTER SECURITY

Facts About Identity Theft In Computer Security

In my previous articles, I have talked about some of the facts that you need to know about how you can secure yourself online. Please note that the mistake that…

Adeniyi SalauSeptember 16, 2022October 2, 2023

Posts pagination

Previous 1 2 3 4 5 Next

SEARCH THROUGH OUR BLOG

new

NAVIGATE HERE

CHECK THIS

Copyright © 2025 CRMNUGGETS