CISSP Mind Map – Physical Security

CISSP Physical SecurityI am happy to bring you the fourth Mind Map that covers the CISSP Certification. We have already brought you the Mind Map for BCP, Access Control Systems, and Application Development.

This Mind Map covers the Physical Security Domain out of the Common Body of Knowledge. Yep, this is the famous domain that everybody jokes about when studying for the CISSP. Guard Dogs, Security Guards, Security Lighting, it is all in this domain.

When taking the test, this domain was real easy. Just remember the values that are depicted in the Mind Map as well as the pros and cons of each type of Physical control and I am sure you will do just fine.

I have another six Mind Maps to do and I am just spacing them out, would love to hear some feedback. Lots of people download my Mind Maps but not many comment. Are they good? Any suggestions for improvements? Any suggestions for other Mind Maps? Anyway, until next time..

Please Download and Enjoy this Mind Map.

Mind Jet Recommended Blog

MindJet BlogI am happy to say that MindCert.com has been recommended by Mind Jet on their official Mind Jet Blog as a Recommended Mind Mapping Blog.

This Mind Map is a collection of the best community blogs on Mind Mapping and also people who use the Mind Manager Application.

As I have stated before, I use Mind Manager 6 for my Mac as my main Mind Mapping application and I also own Mind Manager 6 for Windows as well. They are awesome applications and Mind Jet are now getting involved more in the community and providing some great resources.

Be sure to check out the Mind Jet recommended Mind Manager blogs and follow the URLs to the other blogs about Mind Mapping.

Certified Ethical Hacker – Module 3 – Scanning Mind Map

Mind Map CEH ScanningI am pleased to bring you the next Mind Map for the Certified Ethical Hacker.

This Mind Map covers module 3 of the CEH curriculum. This is Scanning. This Mind Map and module covers the detection of live systems on a network as well as the detection of services on those systems. This is also known as port scanning, and one of the best port scanning tools is Nmap. Nmap is covered in depth within this Mind Map along with the command line options for performing different scans with it. As well as Nmap, other port scanning tools are reviewed as well as direct links to download them.

As always, I hope you enjoy this Mind Map and please comment to let me know your thoughts as you are all rather slow at letting me know if this work is appreciated.

Proceed to download the Mind Map on Scanning for the Certified Ethical Hacker.

MindJet Mind Manager 7 Announced

MindManager 7MindJet have today announced the latest update to their MindManager Mind Mapping application.

I have been using Mind Manager as my main Mind Mapping tool ever since I discovered it. I was involved in Mind Mapping long before the advent of computer based Mind Mapping applications but I soon found MindManager to be the most capable application.

Initially, I used MindManager on my PC with one of the very early versions. The 6.0 release was quite considerable as far as usability and it also brought support for Mac OS X. As I switched to the Mac around 18 months ago, this was a great relief. Upon switching, the only application that I missed from Windows was MindManger so I had to use MindManager from within a Windows Virtual machine on my Mac.

I was a beta tester for the Mac version and as soon as it came out, I bought it. The Mac version is not as fully featured as the Windows version but to be honest, it does 100% of what I need it to do and then some more!

Here is the lowdown on the new features of Mind Manager Pro 7.

MindManager Pro 7 for Microsoft Windows features a new interface based on the Microsoft Office Fluent™ UI – designed to enable people to quickly discover and utilize more capabilities within MindManager. New usability enhancements include easier browsing within the Ribbon which has logically grouped tabs, contextual tabs for better navigation, new map styles for faster formatting and enhanced ScreenTips, just to name a few.

The Mac version has the following features.

MindManager 7 Mac is the first upgrade to Mindjet’s successful Macintosh product, released in 2006. MindManager 7 Mac offers significant enhancements to improve ease of use and functionality. These include a powerful new way to select topics by rules, which can be saved and applied as filters; printing enhancements that allow users to print large maps across multiple pages and add headers and footers and borders to printed maps; enhanced import and export capabilities, including OPML, HTML, Text Outline and more. Mac version users can now instantly view maps in a new Outline View. There are also significant image library enhancements, allowing users to find images quickly using keywords or a zoom slider to enable multiple or up-close image views. MindManager 7 Mac also includes a new timer to keep meetings and brainstorming sessions on track and improved background image handling and main topic alignment.

I was a beta tester for both the Windows and Mac versions of MindManager 7 and I can recommend you to get it when it comes out. Release date is the 30th May 2007.

CISSP Mind Map – Business Continuity Planning and Disaster Recovery Planning

MindCert CISSP BCPThis is the third Mind Map out of ten in the CISSP Series.This Mind Map covers the Business Continuity Planning and Disaster Recover Planning domain on the Common Body of Knowledge (CBK).

This domain addresses the important of planning for business continuity and or a disaster. The domain covers the type of planning and suggests steps you should take to ensure that roles and responsibilities are allocated to staff members and that everybody knows what the plan is in the event of a disaster to cause the minimum impact to the operational effectiveness of an organization.

As always, I would love to hear any feedback you have about these Mind Maps or suggestions for improving them.

The Mind Map can be downloaded HERE.

Certified Ethical Hacker – Module 2 – Footprinting Mind Map

Hacking FootprintingI am happy to provide the second Mind Map for the Certified Ethical Hacker (CEH).

The second Mind Map from MindCert.com covers Footprinting. Footprinting is the initial reconnaissance that a hacker carries out in order to gleam information about the target of evaluation.

The type of information that is obtained through footprinting is normally in the public domain so this is classed as passive reconnaissance as you do not have to do anything active, against the target of evaluation at this point.

I hope you find this Mind Map useful, there are a lot more to come.

The Mind Map can be DOWNLOADED HERE

CISSP Mind Map – Application and Systems Development

This is the second Mind Map out of ten in the CISSP Series.

This Mind Map covers the Application and Systems Development domain on the Common Body of Knowledge (CBK).

This domain addresses the important security concepts that apply to application software development. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system security.

As always, I would love to hear any feedback you have about these Mind Maps or suggestions for improving them.

The Mind Map can be downloaded HERE.

CEH Study Tool – BackTrack

For those of you involved in the Certified Ethical Hacker certification, or interested in general network security, then be sure to check out BackTrack.

I used BackTrack as the basis for my studies towards the CEH exam which I successfully passed.

The CEH tests very heavy on security tools. A lot of these security tools are Linux based, and a lot of them are already installed on BackTrack. The ones which are not installed, can be, giving you a fantastic platform to base your studies.

Continue reading

Certified Ethical Hacker – Module 1 – Ethical Hacking Mind Map

In an earlier post today, I provided a review of the Certified Ethical Hacker certification from the EC-Council.

Well, as promised, I am starting to convert my Mind Maps to the Mind Cert format and this is my first one.

This Mind Map covers module 1 from the Certified Ethical Hacker exam blueprint. Module 1 is titled Ethical Hacking and it covers the terminology used to represent Ethical Hackers.

I would love to hear your viewpoints on the CEH and how many of you have passed the exam so please comment. Also, if you have any comments regarding my Mind Maps, suggestions for improvements, or requests for Mind Maps then be sure to let me know.

The Mind Map can be downloaded HERE.

Certified Ethical Hacker – CEH Review

Just thought I would take the time to provide a review on a certification I have recently studied for and successfully passed. This is the Certified Ethical Hacker from the EC-Council.

I had been getting more involved in security and vulnerability testing so I thought that looking for a certification that would help me learn these topics in a structured format would be good. I had heard about the Certified Ethical Hacker exam so I thought I would give that a go.

If you want to stop hackers from invading your network, first you’ve got to invade their minds.

There is not much available on the Internet about the CEH exam. It definitely does not have the traction or following of the Microsoft and Cisco exams, but if you are interested in network security, it is a fantastic learning opportunity and certification.

Continue reading