

Sep 11, 2020
Quick CISSP Infographic for IPv6
Click here for the full PDF of the IPV6 infographic
5,728 views


Sep 1, 2020
Stories of a CISSP: CBC vs CTR
If you recognize the terms CBC and CTR from the blog post title already, GREAT job! It means you have been really studying Domain 3:...
8,834 views

Apr 7, 2020
Firewall Deployment Architectures Video
Firewall Deployment Architectures Part 1 Firewall Deployment Architectures Part 2 Become a member of Study Notes and Theory to view more...
1,484 views

Sep 24, 2019
Stories of a CISSP: IPS Locks Out Firewall
https://sc1.checkpoint.com/sc/SolutionsStatics/sk110683/Example.png 11:00 P.M. Tuesday I had 98% iPhone battery life left, but wanted to...
2,048 views

Aug 16, 2018
Stories of a CISSP: Symmetric Key Recovery
Source: https://sc1.checkpoint.com/documents/R76/CP_R76_VPN_AdminGuide/13847.htm The Situation You can learn a lot about encryption, ...
1,371 views

Aug 2, 2018
Symmetric Key Encryption
I was fortunate enough to work in the security industry while studying for the CISSP. Dealing with firewalls and creating VPNs was a...
1,800 views


May 12, 2018
Stories of a CISSP: TCP Handshake
A full YouTube video of this blog post can be found here: https://youtu.be/aMEPK0L0d0U When there are network connectivity issues, the...
2,133 views


Mar 6, 2018
Practice Question: VPN Tunnels
Just one word on a CISSP exam question can either provide you the correct answer, or throw you off completely. Let's go over an example. ...
1,791 views

Jan 25, 2018
The TCP Handshake
For more CISSP network security videos, become a member: https://www.studynotesandtheory.com/signup
4,320 views


Aug 7, 2017
Quick Breakdown of OSI Model
The OSI Model is used to describe how data moves from your networked computer to an application in another network. Instead of trying to...
6,837 views