Austin Songer
  • Home
  • Compliance Products
  • My Small Bio
Sign in Subscribe
Google Cloud Compute Engine: Service Accounts and Scopes
Compute Engine

Google Cloud Compute Engine: Service Accounts and Scopes

Instance 1 - Read-Only Create a Compute Engine instance with a Storage
Read More
Austin Songer
Creating a Network Security Group with Inbound and Outbound Rules in Azure
DNS

Creating a Network Security Group with Inbound and Outbound Rules in Azure

After you follow these steps, you will have a better understanding of
Read More
Austin Songer
Database

What are the several indicators of compromise(IOC) that organizations should monitor?

* Unusual Outbound Network Traffic * HTML Response Sizes * Geographical Irregularities * Increases in Database
Read More
Austin Songer
False Negative

What is the difference between a false positive and false negative in IDS?

* A false positive is considered to be a false alarm and false
Read More
Austin Songer
Ensuring Compliance with Azure Policies
Audit

Ensuring Compliance with Azure Policies

After this you will know how to create two common Azure objects,
Read More
Austin Songer
IDS

What is the difference between IDS and IPS?

IDS is Intrusion Detection System and it only detects intrusions and the
Read More
Austin Songer
Encryption

What is the difference between Symmetric and Asymmetric encryption?

Basis of ComparisonSymmetric EncryptionAsymmetric EncryptionEncryption keySame key for encryption & decryptionDifferent keys
Read More
Austin Songer
ACK

What is a three-way handshake process?

It’s called three-way handshake because three segments are exchanged between the
Read More
Austin Songer
Risk

What is the difference between Threat, Vulnerability, and Risk?

* Threat: Someone with the potential to cause harm by damaging or destroying
Read More
Austin Songer
Metasploit

Metasploit: Finding Password in Windows Password Hash File

With the meterpreter shell session open meterpreter > hashdump The contents of
Read More
Austin Songer

Required Studying Material to become a Azure Security Engineer

Manage Identity and Access (20-25%) Configure Microsoft Azure Active Directory for workloads
Read More
Austin Songer

Web Application Vulnerability Testing Checklist

Need help combating vulnerabilities? Click here for the ultimate web application vulnerability
Read More
Austin Songer
Austin Songer © 2025
Powered by Ghost