Bilal Yousaf

CompTIA Security+ – Part 2: Operations & Incident Response, Risk Management

This is the second and final part of my CompTIA Security+ blog series.
In this post, I shared cybersecurity incidents, understand security tools, and manage risk and compliance in an organization.


1. Incident Response Steps

When a security incident happens (like a data breach), we follow these steps to handle it:


2. Digital Forensics Basics

Digital forensics helps us investigate cybercrimes by collecting and analyzing digital evidence.


3. SIEM (Security Information and Event Management)

SIEM tools collect and analyze logs from across your network to detect threats in real time.


4. MITRE ATT&CK Framework

MITRE ATT&CK is a public knowledge base of how attackers behave.


5. Risk Management

Risk management means identifying, assessing, and reducing risks in an organization.


Governance, Risk, and Compliance (GRC)


🧾 6. Policies, Procedures, and Frameworks

Formal rules and structures for managing IT security.


7. Regulations and Laws

These are legal requirements for organizations:


8. Risk Types and Responses


9. Security Awareness Training


Summary

In this part, we learned how companies detect and respond to cyber threats, manage risk, and follow compliance rules. This is a key skillset for any cybersecurity role.

If you missed Part 1, check it out here 🔗.


Thanks for reading! ~ Bilal Qazi

read more

CompTIA Security+ (Part 1)

Threats, Attacks, and Vulnerabilities | Architecture and Design | Implementation

Welcome to Part 1 of the CompTIA Security+. This blog post explains important topics for cybersecurity!


Threats, Attacks, and Vulnerabilities

Malware types
Viruses, worms, ransomware, and spyware that damage or steal from systems.

Phishing
Tricking users with fake emails or messages to get personal information.

Social engineering
Using human tricks (not tech) to get access to systems or data.

DoS/DDoS attacks
Flooding a network or website to make it crash or slow down.

Threat actors
People or groups who attack, like hackers or insider threats.

Threat vectors
Ways attackers use to reach and attack systems, like emails or USBs.

Penetration testing
Ethical hacking to find weak points in a system before real hackers do.

Vulnerability scanning
Using tools to detect known security issues in systems.


Architecture and Design

Secure network architecture
Planning networks in a safe way to reduce attack risk.

Cloud and virtualization security
Protecting data and systems running in the cloud or virtual environments.

Secure system design
Building systems with security features from the start.

Zero trust
Never trust anything by default — always verify first.

Defense in depth
Using many layers of security to protect a system.

Segmentation
Breaking a network into parts to stop threats from spreading.


Implementation

Secure protocols
Using safe communication methods like:

Wireless security
Protecting Wi-Fi using strong methods like WPA3 and enterprise mode.

Authentication and authorization
Checking who you are (auth) and what you can access (authz) with tools like MFA, RADIUS, LDAP.

Public Key Infrastructure (PKI)
A system that uses digital certificates to secure data and identity.

Network and host security
Using firewalls, IDS/IPS, and antivirus to protect devices and networks.


Stay connected for Part 2 of CompTIA Security+.

read more

Comptia Network+ (Part 2)

Network Security & Troubleshooting

Welcome to Part 2 of the CompTIA Network+ course This blog post covers two major topics of the Network+ course: Network Security and Network Troubleshooting. –

Network Security

Common Threats and Vulnerabilities

Security Devices and Technologies

Authentication and Access Control

Wireless Security

Network Segmentation and Isolation


Network Troubleshooting

Troubleshooting Methodology

  1. Identify the problem
  2. Establish a theory
  3. Test the theory
  4. Establish a plan
  5. Verify functionality
  6. Document findings

Common Tools

Common Issues


Author: Bilal Qazi

read more

CompTIA N+ (Part 1)

Easy Guide to Networking Basics *This is the first blog of the CompTIA Network+ Course, which is a beginner-level certification for entering the field of Cybersecurity.


Networking Fundamentals

Networking basics:
Understanding how computers connect and talk to each other in a network.

IP & MAC addresses:
IP addresses (IPv4/IPv6) are digital addresses for devices. MAC addresses are physical hardware IDs for each device.

Subnetting:
Breaking large networks into smaller sections for better performance and management.

OSI & TCP/IP models:
These are layered models that describe how data travels from one device to another.


OSI Model – Detailed Explanation

The OSI (Open Systems Interconnection) model explains how data moves in 7 layers. Each layer has a specific job.

  1. Physical Layer:
    Deals with physical connections like cables and signals. Sends raw bits (0s and 1s).
    Example: Ethernet cables, fiber optics, hubs

  2. Data Link Layer:
    Sends data between devices on the same network using MAC addresses.
    Example: Switches, MAC address, Ethernet

  3. Network Layer:
    Finds the best route for data using IP addresses.
    Example: Routers, IPv4, IPv6

  4. Transport Layer:
    Breaks data into smaller pieces and ensures it arrives correctly.
    Example: TCP, UDP

  5. Session Layer:
    Starts and manages communication between devices.
    Example: Login sessions, video/audio calls

  6. Presentation Layer:
    Formats, compresses, and encrypts data.
    Example: JPEG, MP4, SSL/TLS

  7. Application Layer:
    The layer you interact with through apps like browsers or email.
    Example: HTTP, FTP, DNS, Gmail, Chrom


TCP/IP Model

A simpler, 4-layer model used in real-world internet communication.

  1. Application Layer – Similar to OSI’s top 3 layers
  2. Transport Layer – Same as OSI
  3. Internet Layer – Like OSI’s Network Layer
  4. Network Access Layer – Combines OSI’s Data Link and Physical layers

Protocols:
Standard rules like DNS (website lookup), DHCP (auto IPs), HTTP/S (web browsing), FTP (file transfer), SNMP (monitoring).

Ports:
Special “gates” for communication. Examples:

Wireless tech:
Wi-Fi standards (802.11a/b/g/n/ac/ax), Bluetooth (short range), NFC (tap to pay), RFID (tags/scanning).

Cables:


Network Topologies – (Network Layout Designs)

Topologies describe how computers are arranged in a network. Different types suit different needs.


Tech (Virtualization, Cloud, Storage)

Virtualization:
Running multiple virtual computers (VMs) on one physical machine. Saves space and resources.

Cloud Storage:
Store files online (like Google Drive or Dropbox), accessible from anywhere.

SAN (Storage Area Network):
A high-speed storage network used by servers for fast access to data.

NAS (Network Attached Storage):
Like a mini file server — allows file sharing over a local network.


Network Implementations

Network devices:

Routing:

Switching:

Wireless setup:
SSID = Wi-Fi name
WPA2/WPA3 = Security
Channels = Control signal interference

WAN tech:

Network services:


**Stay tuned for Part 2 of CompTIA Network+ **


read more

CompTIA A+ (2nd Part)

My CompTIA A+ Journey – Final Blog Post! Today, I’ve shared various concepts from my CompTIA A+ course. It’s been an incredible learning journey, and this will be my final post where I’ll summarize what I’ve learned.

Here are the key topics I covered in my course: excerpt_separator:

Networking Concepts

Network Types: LAN (Local Area Network), WAN (Wide Area Network), MAN (Metropolitan Area Network), and PAN (Personal Area Network).

Protocols and Types: Key networking protocols like HTTP, HTTPS, FTP, SMTP, DNS, and DHCP.

Network Ports: Common ports like Port 80 (HTTP), Port 443 (HTTPS), Port 21 (FTP), etc.

SOHO Network: Small Office/Home Office networks that connect devices via routers and modems.

Network Hardware

Understanding the hardware that powers networks is essential. Here’s a breakdown:

Router: Connects local networks to the internet and assigns IP addresses.

Switch: Connects multiple devices in a LAN and helps manage traffic.

Hub: Basic network device that sends data to all devices.

Bridge: Used to connect different network segments.

Access Point: Allows wireless devices to connect to a network.

Data Synchronization

Data Synchronization ensures data is consistent across multiple devices. It’s essential for cloud computing and file-sharing systems.

Virtualization & Cloud Computing

SaaS, PaaS, IaaS: The different types of cloud services:

SaaS (Software as a Service) like Google Docs

PaaS (Platform as a Service) for developers like Heroku

IaaS (Infrastructure as a Service) like AWS, which offers virtual machines and storage

Operating System Basics

Command Line Tools: Essential for troubleshooting and administrative tasks.

Operating System Types & Features: Differences between Windows, macOS, and Linux, and their key features.

Control Panel & Settings: How to navigate and customize system settings.

System Utilities: Tools to optimize, clean, and manage your computer (e.g., Disk Cleanup, Task Manager).

Networking in OS: How operating systems manage networking, IP configuration, and DNS.

Security Settings: Adjusting firewall settings and other security measures.

Security Essentials

Types of Threats:

Malware: Viruses, Trojans, Ransomware, and Spyware.

Phishing: Tricks used by cybercriminals to steal sensitive information.

User Authentication:

Two-Factor Authentication (2FA) for additional security.

Biometrics: Using fingerprints, facial recognition, or other biometric methods for secure login.

Securing Devices & Networks:

Firewall: Crucial for protecting a network from unauthorized access.

Software Troubleshooting

OS Errors: Fixing common operating system errors such as Blue Screen of Death (BSOD), slow performance, and startup issues.

Application Issues: Solving app crashes, missing DLL files, or compatibility problems.

Conclusion – CompTIA A+ Journey Complete!

Today marks the end of my CompTIA A+ course, and it’s been an incredible journey. From networking basics to security threats, hardware, and troubleshooting, I’ve learned so much! This blog post summarizes the core concepts I covered in my studies.

Thank you for following along as I shared my learning. The knowledge I’ve gained will be valuable in my career as I step into the IT world. The journey doesn’t end here — it’s only the beginning. Stay tuned for more tech insights!

Thanks for reading my CompTIA A+ journey. Looking forward to learning even more! 🚀

read more

Comptia A+ (Part 1)

Basics of Hardware & Troubleshooting

Summary for Blog Introduction:

Welcome to my first blog post! I’m currently learning the CompTIA A+ course, and I’m excited to share what I’ve learned so far. This post includes key concepts about hardware components and troubleshooting techniques, which are the foundation for anyone starting their career in IT or computer support.

Key Topics & Points Covered:

1. Troubleshooting and Problem Identification

The first step in IT support is to understand and fix problems using a proper method.

2. Storage Devices

Storage devices are used to save data permanently or temporarily.

3. Processors and CPU

The CPU (Central Processing Unit) is the brain of the computer.

4. Input and Output Devices

Devices that help users interact with the system.

5. Adapter Cards

These are small circuit boards used to add extra functionality to a computer.

6. Understanding BIOS and CMOS

BIOS (Basic Input Output System) starts your computer and checks hardware.

7. Understanding the Motherboard

The motherboard connects all components of a computer together.

read more