RAID BASICS: WHAT IS RAID?

REDUNDANT ARRAY INDEPENDENT DISKS

RAID LEVELS

🔷️RAID 0

PROS: INCREASED SPEED

CONS: NO REDUNDANCY

🔷️RAID 1

PROS: FAULT TOLERANCE

CONS: HIGHER COSTS

🔷️RAID 5

PROS: PARITY

CONS: LOWER PERFORMANCE

🔷️RAID 6

PROS: TWO TIMES PARITY

CONS:LOWER PERFORMANCE

🔷️RAID 10

PROS: REDUNDANCY AND SPEED

CONS: HIGH COSTS

🗝 LOOKING FOR ONLINE I.T CERTIFICATION TRAINING? VISIT ITMASTERKEY.COM TO ENROLL INTO A SELF PACED COURSE

No alternative text description for this image

CompTIA CASP+ Acronyms

Looking for CYSA+ acronyms? https://certification.tips/2020/02/18/comptia-cysa-acronyms

2FA Two-Factor Authentication

3DES Triple Digital Encryption Standard

AAA Authentication, Authorization and Accounting

AAR After Action Report

ACL Access Control List

AD Active Directory

AES Advanced Encryption Standard

AH Authentication Header

AJAX Asynchronous JavaScript and XML

ALE Annualized Loss Expectancy

AP Access Point

API Application Programming Interface

APT Advanced Persistent Threat

ARO Annualized Rate of Occurrence

ARP Address Resolution Protocol

ASLR Address Space Layout Randomization

AUP Acceptable Use Policy

AV Antivirus

B2B Business-to-Business

BCP Business Continuity Planning

BGP Border Gateway Protocol

BIA Business Impact Analysis

BIOS Basic Input/Output System

BPA Business Partnership Agreement

BPM Business Process Management

BYOD Bring Your Own Device

CA Certificate Authority

CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart

CASB Cloud Access Security Broker

CBC Cipher Block Chaining

CCMP Counter-Mode/CBC-Mac Protocol

CCTV Closed-Circuit Television

CERT Computer Emergency Response Team

CFB Cipher Feedback

CHAP Challenge Handshake Authentication Protocol

CIA Confidentiality, Integrity and Availability

CIFS Common Internet File System

CIRT Computer Incident Response Team

CISO Chief Information Security Officer

CLI Command Line Interface

CMDB Configuration Management Database

CMS Content Management System

COOP Continuity of Operations

COPE Corporate Owned, Personally Enabled

COTS Commercial Off-the-Shelf

CRC Cyclical Redundancy Check

CredSSP Credential Security Support Provider

CRL Certification Revocation List

CRM Customer Resource Management

CSP Cloud Service Provider

CSP Cryptographic Service Provider

CSRF Cross-Site Request Forgery

CTR Counter Mode

CVE Collaborative Virtual Environment

CYOD Choose Your Own Device

DAC Discretionary Access Control

DAM Database Activity Monitoring

DAR Data at Rest

DDoS Distributed Denial of Service

DEP Data Execution Prevention

DES Digital Encryption Standard

DHCP Dynamic Host Configuration Protocol

DKIM Domain Keys Identified Mail

DLL Dynamic Link Library

DLP Data Loss Prevention

DMZ Demilitarized Zone

DNS Domain Name Service

DOM Document Object Model

DoS Denial of Service

DRP Disaster Recovery Plan

DSA Digital Signature Algorithm

EAP Extensible Authentication Protocol

ECB Event Control Block

ECC Elliptic Curve Cryptography

EDR Endpoint Detection Response

EFS Encrypted File System

EMI Electromagnetic Interference

ERP Enterprise Resource Planning

ESA Enterprise Security Architecture

ESB Enterprise Service Bus

ESP Encapsulated Security Payload

EV Extended Validation (Certificate)

FDE Full Disk Encryption

FIM File Integrity Monitoring

FTP File Transfer Protocol

GPG GNU Privacy Guard

GPO Group Policy Object

GPU Graphic Processing Unit

GRC Governance, Risk and Compliance

GRE Generic Routing Encapsulation

GUI Graphical User Interface

HDD Hard Disk Drive

HIDS Host-based Intrusion Detection System

HIPS Host-based Intrusion Prevention System

HMAC Hashed Message Authentication Code

HOTP HMAC-based One-Time Password HSM Hardware Security Module

HSTS HTTP Strict Transport Security

HVAC Heating, Ventilation and Air Conditioning

IaaS Infrastructure as a Service

ICMP Internet Control Message Protocol

ICS Industrial Control System

IDE Integrated Development Environment

IdM Identity Management

IdP Identity Provider

IDS Intrusion Detection System

IETF Internet Engineering Task Force

IKE Internet Key Exchange

IM Instant Messaging

IMAP Internet Message Access Protocol

INE Inline Network Encryptor

IOC Indicator of Compromise

IoT Internet of Things

IP Internet Protocol

IPMI Internet Protocol Multicast Initiative

IPS Intrusion Prevention Systems

IPSec Internet Protocol Security

IR Incident Response

IRC Internet Relay Chat

IS-IS Intermediate System to Intermediate System

ISA Interconnection Security Agreement

ISAC Information Sharing Analysis Center

ISMS Information Security Management System

ISP Internet Service Provider

IV Initialization Vector

JSON JavaScript Object Notation

KDC Key Distribution Center

KPI Key Performance Indicator

KRI Key Risk Indicator

KVM Keyboard, Video, Mouse

LAN Local Area Network

L2TP Layer 2 Tunneling Protocol

LDAP Lightweight Directory Access Protocol

LEAP Lightweight Extensible Authentication Protocol

LTE Long-Term Evolution

LUN Logical Unit Number

MAC Mandatory Access Control

MAC Media Access Control

MAC Message Authentication Code

MAM Mobile Application Management

MAN Metropolitan Area Network

MBR Master Boot Record

MD5 Message Digest 5

MDM Mobile Device Management

MEAP Mobile Enterprise Application Platform

MFA Multifactor Authentication

MFD Multifunction Device

MITM Man in the Middle

MOA Memorandum of Agreement

MOU Memorandum of Understanding

MPLS Multiprotocol Label Switching

MSA Master Service Agreement

MSCHAP Microsoft Challenge Handshake Authentication Protocol

MSS Managed Security Service

MSSP Managed Security Service Provider

MTA Message Transfer Agent

MTBF Mean Time Between Failure

MTD Maximum Tolerable Downtime

MTP Media Transfer Protocol

MTTR Mean Time to Recovery

MTU Maximum Transmission Unit

NAC Network Access Control

NAS Network Attached Storage

NAT Network Address Translation

NDA Non-Disclosure Agreement

NFC Near Field Communication

NFS Network File System

NGFW Next Generation Firewall

NIDS Network Intrusion Detection System

NIPS Network Intrusion Prevention System

NIST National Institute of Standards and Technology

NLA Network-Level Authentication

NOS Network Operating System

NSP Network Service Provider

NTFS New Technology File System

NTLM New Technology LAN Manager

NTP Network Time Protocol

OCSP Online Certificate Status Protocol

OLA Operating-Level Agreement

OOB Out-of-Band

OS Operating System

OSI Open Systems Interconnection

OSPF Open Shortest Path First

OTP One-Time Password

OVAL Open Vulnerability Assessment Language

OWASP Open Web Application Security Project

P2P Peer-to-Peer

PaaS Platform as a Service

PAP Password Authentication Protocol

PAT Port Address Translation

PBKDF2 Password-Based Key Derivation Function 2

PBX Private Branch Exchange

PCI-DSS Payment Card Industry Data Security Standard

PDP Policy Distribution Point

PEAP Protected Extensible Authentication Protocol

PEP Policy Enforcement Point

PFS Perfect Forward Secrecy

PGP Pretty Good Privacy

PII Personal Identifiable Information

PIP Policy Information Point

PIR Post Incident Report

PKI Public Key Infrastructure

PLC Programmable Logic Controller

POC Proof of Concept

POTS Plain Old Telephone Service

PPP Point-to-Point Protocol

PPTP Point-to-Point Tunneling Protocol

PSK Pre-Shared Key QA Quality Assurance

QoS Quality of Service

R&D Research and Development

RA Recovery Agent

RA Registration Authority

RADIUS Remote Authentication Dial-in User Server

RAID Redundant Array of Inexpensive/Independent Disks

RAS Remote Access Server

RBAC Role-Based Access Control

RBAC Rule-Based Access Control

RDP Remote Desktop Protocol

REST Representational State Transfer

RFC Request for Comments

RFI Request for Information

RFID Radio Frequency Identification

RFP Request for Proposal

RFQ Request for Quote

ROI Return on Investment

RPO Recovery Point Objective

RSA Rivest, Shamir and Adleman

RTBH Remotely Triggered Black Hole

RTO Recovery Time Objective

RTP Real-time Transport Protocol

S/MIME Secure/Multipurpose Internet Mail Extensions

SaaS Software as a Service

SAML Security Assertions Markup Language

SAN Subject Alternative Name

SAN Storage Area Network

SAS Statement on Auditing Standards

SATCOM Satellite Communications

SCADA Supervisory Control and Data Acquisition

SCAP Security Content Automation Protocol

SCEP Simple Certificate Enrollment Protocol

SCP Secure Copy SCSI Small Computer System Interface

SDL Security Development Life Cycle

SDLC Software Development Life Cycle

SED Self-Encrypting Drive

SELinux Security Enhanced Linux

SFTP Secure File Transfer Protocol

SHA Secure Hashing Algorithm

SIEM Security Information Event Management

SIM Subscriber Identity Module

SIP Session Initiation Protocol

SLA Service-Level Agreement

SLE Single Loss Expectancy

SMB Server Message Block

SMS Short Message Service

SMTP Simple Mail Transfer Protocol

SNAT Source Network Address Translation

SNMP Simple Network Management Protocol

SOA Service-Oriented Architecture

SOA Start of Authority

SOA Statement of Applicability

SOAP Simple Object Access Protocol

SOC Security Operations Center

SOC Service Organization Controls

SOE Standard Operating Environment

SOP Standard Operating Procedure

SOW Statement of Work

SOX Sarbanes-Oxley Act of 2002

SP Service Provider

SPIM Spam over Internet Messaging

SPML Service Provisioning Markup Language

SRTM Security Requirements Traceability Matrix

SRTP Secure Real-Time Protocol

SRV Service Records

SSD Solid State Drive

SSDLC Security System Development Life Cycle

SSH Secure Shell

SSID Service Set Identifier

SSL Secure Sockets Layer

SSO Single Sign-On

SSP Storage Service Provider

TACACS Terminal Access Controller Access Control System

TCO Total Cost of Ownership

TCP/IP Transmission Control Protocol/Internet Protocol

TKIP Temporal Key Integrity Protocol

TLS Transport Layer Security

TOC/TOU Time of Check/Time of Use

TOS Type of Service

TOTP Time-based One-Time Password

TPM Trusted Platform Module

TSIG Transaction Signature Interoperability Group

TTR Time to Restore

UAC User Access Control

UAT User Acceptance Testing

UDP User Datagram Protocol

UEFI Unified Extensible Firmware Interface

UPS Uninterruptable Power Supply

URL Universal Resource Locator

USB Universal Serial Bus

UTM Unified Threat Management

VDI Virtual Desktop Infrastructure

VLAN Virtual Local Area Network

VM Virtual Machine

VMFS VMware File System

VNC Virtual Network Connection

VoIP Voice over IP

VPN Virtual Private Network

VRRP Virtual Router Redundancy Protocol

vSAN Virtual Storage Area Network

VTC Video Teleconferencing

vTPM Virtual Trusted Platform Module

WAF Web Application Firewall

WAP Wireless Access Point

WAYF Where Are You From

WEP Wired Equivalent Privacy

WIDS Wireless Intrusion Detection System

WIPS Wireless Intrusion Prevention System

WMI Windows Management Interface

WPA Wireless Protected Access

WRT Work Recovery Time

WSDL Web Services Description Language

XACML eXtensible Access Control Markup Language

XHR XMLHttpRequest

XMPP eXtensible Messaging and Presence Protocol

XSS Cross-Site Scripting

Looking for online I.T. training? Visit itmasterkey.com

CompTIA CYSA+ Acronyms

Looking for security+ acronyms?

https://certification.tips/2020/01/26/comptia-security-acronyms/(opens in a new tab)

ACL Access Control List

ARP Address Resolution Protocol

BYOD Bring Your Own Device

CIS Center for Internet Security

CoBiT Control Objectives for Information and Related Technology

CCTV Closed-Circuit Television

CRM Customer Relations Management

DDoS Distributed Denial of Service

DNS Domain Name Service

EMET Enhanced Mitigation Experience Toolkit

FISMA Federal Information Security Management Act

FTK Forensic Tool Kit

FTP File Transfer Protocol

HBSS Host Based Security System

HIDS Host Intrusion Detection System

HIPS Host Intrusion Prevention System

HR Human Resources

ICS Industrial Control Systems

IDS Intrusion Detection System

IMAP Internet Message Access Protocol

IOC Indicator of Compromise

IPS Intrusion Prevention System

ISO International Organization for Standardization

ITIL Information Technology Infrastructure Library

LDAP Lightweight Directory Access Protocol

MAC Mandatory Access Control

MD5 Message Digest 5

MOA Memorandum Of Agreement

MOU Memorandum Of Understanding

MRTG Multi Router Traffic Grapher

NAC Network Access Control

NAXSI Nginx Anti XSS & SQL Injection

NIC Network Interface Card

NIDS Network Intrusion Detection System

NIST National Institute of Standards & Technology

OEM Original Equipment Manufacturer

OSSIM Open Source Security Information Management

OWASP Open Web Application Security Project

PAM Pluggable Authentication Module

PCA Prinicpal Component Analysis

PCI Payment Card Industry

PHI Protected Health Information

PII Personally Identifiable Information

RACI Responsible, Accountable, Consulted and Informed

RADIUS Remote Authentication Dial-In User Service

SABSA Sherwood Applied Business Security Architecture

SANS System Administration, Networking, and Security Institute

SCADA Supervisory Control and Data Acquisition

SCAP Security Content Automation Protocol

SDLC Software Development Life Cycle

SEO Search Engine Optimization

SHA Secure Hash Algorithm

SIEM Security Incident and Event Manager

SLA Service Level Agreement

SOC Security Operations Center

SPF Sender Policy Framework

SSH Secure Shell

SSL Secure Sockets Layer

TACACS+ Terminal Access Controller Access Control System Plus

TFTP Trivial File Transfer Protocol

TLS Transport Layer Security

TOGAF The Open Group Architecture Framework

USB Universal Serial Bus

VAS Vulnerability Assessment System

VDI Virtual Desktop Infrastructure

VLAN Virtual Local Area Network

VPN Virtual Private Network

WAF Web Application Firewall

Looking for online I.T. training? Visit itmasterkey.com

CompTIA Cloud+ Acronyms

Looking for Linux+ acronyms? Follow this link https://certification.tips/2020/02/02/linux-acronyms/(opens in a new tab)

AAA Authentication, Authorization, and Accounting

ACL Access Control List

AES Advanced Encryption Standard

API Application Programming Interface

APM Application Performance Monitor

ARP Address Resolution Protocol

BCP Business Continuity Plan

BGP Border Gateway Protocol

BIA Business Impact Analysis

BLOB Binary Large Object

BMR Bare Metal Restore

BPaaS Business Process as a Service

CAB Change Advisory Board

CaaS Communication as a Service/ Computing as a Service

CapEx Capital Expenditures

CAS Content Addressed Storage

CASB Cloud Access Security Broker

CI/CD Continuous Integration/Continuous Deployment

CIFS Common Internet File System

CIIS Client Integration Implementation Service

CLI Command Line Interface

CMDB Configuration Management Database

CM Configuration Management

CMP Cloud Management Platform

CMS Content Management System

CNA- Converged Network Adapter

CNAME Canonical Name

COLO Co-location

COOP Continuity of Operations Plan

CPU Central Processing Unit

CRL Certificate Revocation List

CRM Customer Relationship Management

CSA Cloud Systems Administrator

CSP Cloud Service Provide

DaaS Desktop as a Service

DAC Discretionary Access Control

DAS Direct Attached Storage

DBA Database Administrator

DBaaS Database as a Service

DBMS Database Management Server

DES Data Encryption Standard

DFS Distributed File System

DHCP Dynamic Host Configuration Protocol

DIMM Dual In-line Memory Module

DLP Data Loss Prevention

DMZ Demilitarized Zone

DNS Domain Name Service

DR Disaster Recovery

DRaaS Disaster Recovery as a Service

DRP Disaster Recovery Plan

DSA Distributed Services Architecture

ECAB Emergency Change Advisory Board

ECC Elliptic Curve Cryptography

FAT File Allocation Table

FC Fibre Channel

FCIP Fibre Channel over IP

FCoE Fibre Channel over Ethernet

FIM File Integrity Monitoring

FTP File Transfer Protocol

FTPS FTP over SSL

GPT GUID Partition Table

GPU Graphics Processing Unit

GRE Generic Routing Encapsulation

GUI Graphical User Interface

HA High Availability

HBA Host Bus Adapter

HDFS Hadoop Distributed File System

HIPS Host Intrusion Prevention System

HTTPS Hypertext Transfer Protocol Secure

IaaS Infrastructure as a Service

IAM Identity and Access Management

ICMP Internet Control Management Protocol

IDP Intrusion Detection and Prevention

IDS Intrusion Detection System

IFCP Internet Fibre Channel Protocol

IGRP Interior Gateway Routing Protocol

IOPS Input/output Operations Per Second

IPC Instructions Per Cycle

IPMI Intelligent Platform Management Interface

IPS Intrusion Protection System

IPSec Internet Protocol Security

IQN Initiator Qualified Name

IRM Information Rights Management

ISP Internet Service Provider

iSCSI Internet Small Computer Systems Interface

ISNS Internet Storage Name Service

ITIL Information Technology Infrastructure Library

JBOD Just a Bunch of Disks

JSON JavaScript Object Notation

KMS Key Management System

KVM Keyboard Video Mouse

L2TP Layer 2 Tunneling Protocol

LAN Local Area Network

LDAP Lightweight Directory Access Protocol

LUN Logical Unit Number

MAC Mandatory Access Control

MBR Master Boot Record

MDF Main Distribution Facility

MFA Multifactor Authentication

MPIO Multipath Input/Output

MPLS Multiprotocol Label Switching

MSP Managed Service Provider

MTBF Mean Time Between Failure

MTTF Mean Time To Failure

MTTR Mean Time To Recovery

MTU Maximum Transmission Unit

NAC Network Access Control

NAS Network Attached Storage

NAT Network Address Translation

NFS Network File System

NFV Network Function Virtualization

NIC Network Interface Controller

NIS Network Information Service

NOC Network Operations Center

NPIV N_Port ID Virtualization

NTFS New Technology File System

NTLM NT LAN Manager

NTP Network Time Protocol

NVMe Non-Volatile Memory Express

ODBC Open Database Connectivity

OLA Operational Level Agreement

OpEx Operating Expenditure

OS Operating System

OSPF Open Shortest Path First

OVA Open Virtual Appliance

OVF Open Virtualization Format

P2P Physical to Physical

P2V Physical to Virtual

PaaS Platform as a Service

PAC Proxy Automatic Configuration

PAM Pluggable Authentication Modules

PAT Port Address Translation

PBX Private (or Public) Branch Exchange

PCI Payment Card Industry

PCS Private Cloud Space

PII Personally Identifiable Information

PIT Point-in-Time

PKI Public Key Infrastructure

PSK Pre-Shared Key

QA Quality Assurance

QoS Quality of Service

RAID Redundant Array of Inexpensive Disks

RBAC Role-Based Access Control

RC5 Rivest Cipher 5 RDP Remote Desktop Protocol

ReFS Resilient File System RIP Routing Information Protocol

RPO Recovery Point Objective

RTO Recovery Time Objective

SaaS Software as a Service

SAML Security Assertions Markup Language

SAN Storage Area Network

SAS Serial Attached SCSI

SATA Serial Advanced Technology Attachment

SCP Session Control Protocol

SCSI Small Computer System Interface

SDLC Software Development Life Cycle

SDN Software Defined Network

SED Self-Encrypting Drive

SFTP Secure FTP

SHA Secure Hash Algorithm

SIEM Security Incident Event Manager

SIP Session Initiation Protocol

SLA Service Level Agreement

SMB Server Message Block

SNMP Simple Network Management Protocol

SOP Standard Operating Procedure

SSD Solid State Disk

SSH Secure Shell

SSL Secure Sockets Layer

SSO Single Sign-On

TCO Total Cost of Operations

TCP Transmission Control Protocol

TKIP Temporal Key Integrity Protocol

TLS Transport Layer Security

TPM Trusted Platform Module

TTD Technical Training Device

TTL Time To Live

UAT User Acceptance Testing

UDP Universal Datagram Protocol

UPS Universal Power Supply

UTA Universal Target Adapter

V2P Virtual to Physical

V2V Virtual to Virtual

VAT Virtual Allocation Table

VCPU Virtual CPU

VDI Virtual Desktop Infrastructure

VHD Virtual Hard Disk

VLAN Virtual LAN

VM Virtual Machine

VMDK Virtual Machine Disk

VMFS Virtual Machine File System

VNC Virtual Network Computing

VNIC Virtual NIC

VoIP Voice over IP

VPC Virtual Private Cloud

VPN Virtual Private Network

VRAM Virtual RAM

VRF Virtual Routing and Forwarding

VRR Vulnerability Remediation Request

VSAN Virtual SAN

vSwitch Virtual Switch

VTL Virtual Tape Library

VXLAN Virtual Extensible Local Area Network

WAF Web Application Firewall

WAN Wide Area Network

WMI Windows Management Implementation

WWNN World Wide Node Name

WWPN World Wide Port Name

WWUI World Wide Unique Identifier

XaaS Anything as a Service

ZFS Z File System

Looking for online I.T. training? Visit itmasterkey.com

HIGHEST PAYING I.T. CERTIFICATIONS 2020

This are all averages. Depending on location you may make less and in some cases you may make more

10. CISSP

Awesome video by Jon Good

CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL

This certification is meant for senior level security professionals. For individuals looking to obtain CISSP you’ll need to have several years of security experience to be successful.

National Average Salary

120,000$

9. AWS Certified Solutions Architect

AWESOME VIDEO BY I.T. CAREER QUESTIONS

AMAZON WEB SERVICES

With many organizations moving towards cloud computing there’s no wonder this certification is in the Top 10. With Amazon being an absolute behemoth in the tech space, getting AWS certified will definitely make you stand out.

National Average Salary

110,000$

8. Google Certified Professional Cloud Architect

AWESOME VIDEO BY DANIEL BOURKE

With google becoming a verb, it’s also become one of the top 100 best places to work.

National Average Salary

105,000$

7. Big Data Certification

AWESOME VIDEO BY EDUREKA

Big data analysts understand the volume, velocity, and variety of data.

National Average Salary

130,000$

6. Data Science Certification

AWESOME VIDEO BY 365 DATA SCIENCE

Data scientists are extremely proficient at dissecting data

National Average Salary

118,000$

5. Certified In Risk And Information Systems Control

AWESOME VIDEO BY ISACA

This certification validates the testers knowledge about industry leading knowledge and practices when it comes to information Systems.

NATIONAL AVERAGE SALARY

107,000$

4. Certified Information Security Manager

AWESOME VIDEO BY SMART IT INFO TECH

The CISM covers topics such as incident management , program development, risk management, and security governance.

National Average Salary

130,000$

3. Project Management Professional

AWESOME VIDEO BY CHRIS DANIEL

PMP is not an I.T. specific certification. The PMP demonstrates your project knowledge and experience.

National Average Salary

113,00$

2. Certified Scrum Master

AWESOME VIDEO BY EDUREKA

The CSM mostly revolves around software development.

National Average Salary

118,000$

1. Certified Ethical Hacker

AWESOME VIDEO BY FREECODECAMP

An ethical hacker makes organizations aware of vulnerabilities and exploits.

Looking for a study group? Join ours here https://bit.ly/2pk8p3Y