Started Study on Dec 10, 2025
←
Common Acronyms and Ports
- HTTP (Hypertext Transfer Protocol) - Port 80
- HTTPS (Hypertext Transfer Protocol Secure) - Port 443
- FTP (File Transfer Protocol) - Port 21
- SSH (Secure Shell) - Port 22
- Telnet - Port 23
- DNS (Domain Name System) - Port 53
- SMTP (Simple Mail Transfer Protocol) - Port 25
- POP3 (Post Office Protocol version 3) - Port 110
- IMAP (Internet Message Access Protocol) - Port 143
- RDP (Remote Desktop Protocol) - Port 3389
- SMB/CIFS (Server Message Block/Common Internet File System) - Port 445
- NTP (Network Time Protocol) - Port 123
- DHCP Client/Server - Ports 67 and 68
- POST - Power-on Self-test
- IOPS - Input/Output Operations Per Second
- RAID - Redundant Array of Independent Disks
- SMART - Self monitoring, analysis, and reporting technology
- APIPA - Automatic Private IP Addressing
- SSID - Service Set Identifier
- MBR - Master boot record
- SODIMM - Small Outline Dual Inline Memory Module
- ONT - Optical Network Terminal (fiber modem)
- ADF scanner - Automatic Document Feeder
- ECC: Error correction code RAM can funtion with a failed memory chip
Extra: Random Facts
- DDR4 RAM: 288 pins | SDRAM: 168 Pins | DDR: 184 pins | DDR2: 240 pins | DDR3: 240 pins
Section 9: Cloud Computing
Cloud Characteristics
- On-demand self-service - Access resources anytime without human interaction
- Broad network access - Available over internet from any device
- Resource pooling - Provider shares resources among multiple customers (multi-tenancy)
- Rapid elasticity - Quickly scale up or down based on demand
- Measured service - Pay only for resources consumed; usage is metered and monitored
- Redundancy - Built-in backup and disaster recovery capabilities
Cloud Deployment Models
- Public Cloud - Open to public; resources managed by provider (AWS, Azure, Google Cloud)
- Private Cloud - Dedicated to single organization; more control, more expensive
- Hybrid Cloud - Mix of public and private; flexibility for sensitive + non-sensitive workloads
- Community Cloud - Shared by specific organizations with common interests
Cloud Service Models
- IaaS (Infrastructure as a Service) - Virtualized computing over internet (VM, storage, networking)
- Examples: AWS EC2, Azure VMs, Google Compute Engine
- User manages: Applications, data, runtime, OS | Provider manages: Hardware, networking
- PaaS (Platform as a Service) - Development platform in the cloud
- Examples: AWS Elastic Beanstalk, Azure App Service, Heroku
- User manages: Applications, data | Provider manages: Everything else
- SaaS (Software as a Service) - Applications delivered via web (ready to use)
- Examples: Microsoft 365, Google Workspace, Salesforce, Slack
- Provider manages: Everything | User manages: Nothing (just uses it)
Virtual Desktop Infrastructure (VDI)
- Desktop operating system and applications hosted centrally on servers
- Users access desktop via thin client device or web browser
- Benefits: Centralized management, security, reduced client complexity, BYOD support
- Thin clients - Minimal hardware; most processing done on server
- Fat clients - More processing power; some work done locally
- Scalability - Easily add/remove users without deploying new hardware
- Security advantage - All data stays on server; nothing stored on client device
Cloud Storage Services
- Cloud backup - Automated data backup to cloud storage; disaster recovery
- Examples: AWS Backup, Azure Backup, Carbonite
- Cloud sync services - Synchronize files across devices (OneDrive, Google Drive, Dropbox)
- Cloud file sharing - Share files securely with others; versioning and access control
- Accessibility - Access files from anywhere with internet connection
- Cost-effective - No need to buy/maintain physical storage infrastructure
- Scalability - Easily increase storage capacity as needed
Using the Cloud
- SaaS examples: Email (Microsoft 365), productivity (Google Workspace), CRM (Salesforce)
- IaaS examples: Web applications, APIs, database services, development environments
- PaaS examples: Web/mobile app development, data analytics platforms
- Subscription management - Monitor usage and costs; manage licenses and users
- Security considerations: Data encryption, identity management, compliance requirements
- Bandwidth requirements - Reliable internet connection needed; latency affects performance
- Vendor lock-in - Difficult to switch providers; plan data migration strategy
Section 10: Networking Basics
Networking Hardware
- Switch - Forwards frames based on MAC addresses (Layer 2); connects devices on LAN
- Router - Forwards packets based on IP addresses (Layer 3); connects networks
- Hub - Legacy device; broadcasts to all ports (no intelligence)
- Bridge - Connects and filters traffic between network segments (Layer 2)
- Modem - Modulates/demodulates signal; converts ISP signal to usable data
- Repeater - Amplifies signal to extend range (Layer 1)
- Access Point (AP) - Wireless transmitter; extends network wirelessly
- Network Interface Card (NIC) - Hardware that connects device to network
Network Types
- LAN (Local Area Network) - Small area, high speed, single organization
- WAN (Wide Area Network) - Large geographic area, lower speeds, connects LANs
- PAN (Personal Area Network) - Very small area (Bluetooth, personal devices)
- MAN (Metropolitan Area Network) - City-sized, larger than LAN, smaller than WAN
- WLAN (Wireless LAN) - Wireless version of LAN, uses WiFi/802.11
- CAN (Campus Area Network) - Networks across buildings/campus
Internet of Things (IoT)
- Network of physical devices connected to internet, collecting/sharing data
- Examples: Smart home devices, wearables, industrial sensors, smart thermostats
- Low bandwidth requirements, often battery-powered
- Security concerns: Default credentials, lack of updates, vulnerable protocols
- Common protocols: WiFi, Bluetooth, Zigbee, Z-Wave, LoRaWAN
- Often requires dedicated networks/subnets for security isolation
Twisted Pair Cables
- Two insulated wires twisted together; twisting reduces electromagnetic interference (EMI)
- UTP (Unshielded Twisted Pair) - No shield, cheaper, susceptible to interference
- STP (Shielded Twisted Pair) - Metal foil/braid shield around pairs, more expensive
- UTP most common for LANs (Ethernet); STP used in industrial/high-interference areas
- Contains 4 pairs (8 wires total); each pair has specific twist rate
- Copper wire conducts electrical signals; plastic insulation prevents signal loss
T568A and T568B Standards
- Wiring standards for RJ45 connectors on Ethernet cables
- T568A: White-Green, Green, White-Orange, Blue, White-Blue, Orange, White-Brown, Brown
- T568B: White-Orange, Orange, White-Green, Blue, White-Blue, Green, White-Brown, Brown
- Straight-through cable - Both ends same standard (most common); host to switch
- Crossover cable - One end T568A, other T568B (rare); switch to switch, host to host
- Consistency matters more than which standard chosen (follow one throughout)
Optical Cabling
- Uses light pulses transmitted through glass/plastic fiber; immune to EMI
- Single-Mode Fiber (SMF) - Single light path, long distance, expensive; used for WAN
- Multi-Mode Fiber (MMF) - Multiple light paths, shorter distance, cheaper; used for LAN
- Advantages: High bandwidth, long distance, no EMI, no crosstalk, secure (light stays inside)
- Disadvantages: Expensive, fragile, requires specialized equipment for installation/repair
- LC and SC connectors most common; connectors must match fiber type
Coaxial Cabling
- Center conductor, insulation, braided shield, outer jacket; resists EMI better than UTP
- RG-6 - Modern standard, used for cable TV, internet (75 ohms)
- RG-59 - Older standard, legacy systems (75 ohms)
- RG-58 - Thin coaxial, legacy networking (50 ohms)
- Connectors: BNC (legacy), F-type (cable TV), RCA
- Limited bandwidth compared to twisted pair; mostly replaced by modern cables
Networking Tools
- Cable Stripper - Removes outer jacket from cables
- Crimper - Attaches RJ45 connectors to cable ends
- Punch-down Tool - Connects wires to punchdown blocks in wall jacks/patch panels
- Cable Tester - Verifies cable continuity and pin order
- Multimeter - Tests voltage, continuity, resistance
- Tone Generator/Probe - Traces cables through walls (tone generator and probe pair)
- Network Analyzer/Certifier - Advanced testing (length, attenuation, crosstalk)
Building & Testing Networks
- Building cable: Strip jacket → separate pairs → arrange per 568A/B → insert in RJ45 → crimp
- Proper technique prevents signal degradation: Don't untwist more than 0.5 inches
- Testing cable: Use cable tester to verify all 8 pins connected correctly
- Common cable issues: Crossed pairs, reversed polarity, open circuit, short circuit
- Network wiring: Run cables through conduit/raceway; avoid near power lines (EMI)
- Max distance for Twisted Pair: 100 meters (328 feet); SMF: 40+ km
- Proper documentation: Label all cables and ports; maintain cable maps
Section 11: Wireless Networks
Wireless Frequencies
- OFDM (Orthogonal Frequency Division Multiplexing) - most common standard
- 2.4GHz band - channels 1, 6, 11 (non-overlapping)
- 5GHz band - Less interference, higher speeds, shorter range
- 6GHz band - WiFi 6e and 7, newer standard with even less interference
Wireless Standards
- 802.11a - 5GHz, 54Mbps | 802.11b - 2.4GHz, 11Mbps | 802.11g - 2.4GHz, 54Mbps
- 802.11n (WiFi 4) - 2.4/5GHz, 600Mbps, MIMO
- 802.11ac (WiFi 5) - 5GHz, 1Gbps+, MU-MIMO
- 802.11ax (WiFi 6) - 2.4/5/6GHz, 10Gbps+, OFDMA
- 802.11be (WiFi 7) - 2.4/5/6GHz, 30Gbps+
- MIMO - Multiple antennas for increased throughput
- MU-MIMO - Multiple users simultaneously
Section 14: Network Configuration
DHCP
- Dynamic Host Configuration Protocol
- Automates process of assigning IP addresses to network devices
- Uses UDP ports 67 (server) and 68 (client)
- Scope is list of available IP addresses within a subnet
- Leases are temporary IP assignments with expiration times
- DORA process: Discover, Offer, Request, Acknowledge
- Discover: Client broadcasts request for IP address
- Offer: DHCP server offers an available IP address
- Request: Client formally requests the offered IP
- Acknowledge: Server confirms and assigns the IP
- Static/Reserved assignments made for specific devices (servers, printers)
- Uses MAC address to ensure device always gets same IP
- IP Helper/DHCP Relay forwards DHCP requests across subnets
- Lease renewal occurs at 50% of lease time
DNS
- Translates human-readable domain names to IP addresses
- Uses UDP port 53 (TCP port 53 for zone transfers)
- Hierarchical structure: Root servers → TLD (.com, .org, .net) → second-level (example.com)
- Subdomains are subdivisions (mail.example.com)
- DNS caching and TTL (Time to Live) improve performance
- Recursive lookup - Client asks resolver; resolver does all work
- Iterative lookup - Client resolver does more work, getting referrals
- Provides partial answers or referrals on how to find it
- Refers to other DNS servers for next step
- Spreads the load across multiple servers
- Client does more of the work
DNS Records
- A record - IPv4 address mapping (most common)
- AAAA record - IPv6 address mapping
- CNAME record - Domain alias (www.example.com → example.com)
- MX record - Mail server with priority (lower = higher priority)
- TXT record - Text data for SPF, DKIM, DMARC, verification
- NS record - Authoritative name servers for domain
- PTR record - Reverse DNS (IP to domain)
Email Authentication
- SPF - Identifies authorized mail servers via DNS TXT record
- DKIM - Cryptographic signatures on emails; public key in DNS
- DMARC - Policy for failed SPF/DKIM checks (none/quarantine/reject)
VLAN
- Virtual Local Area Network - Logical segmentation of physical network
- Segments at Layer 2 (Data Link layer)
- Improves security and reduces broadcast traffic
- VLAN IDs: 1-4094 (VLAN 1 is default)
- VLAN trunking - Multiple VLANs on single physical link (802.1Q)
- Trunk ports - Carry multiple VLANs | Access ports - Single VLAN
- Inter-VLAN routing requires Layer 3 device (router or L3 switch)
VPN
- Virtual Private Network
- Extends a private network over a public network (like the Internet)
- Encrypts traffic to ensure confidentiality and security
- Creates secure tunnel for data transmission
- Site-to-site VPN
- Connects entire networks together over the Internet
- Router-to-router connection
- Always-on connection between offices
- No client software needed on individual computers
- Client-to-site VPN (Remote Access VPN)
- Connects individual clients/users to a corporate network
- Requires VPN client software on user's device
- Used by remote workers to access company resources
- Connection initiated by user when needed
- Clientless VPN (SSL VPN)
- No dedicated client software or hardware required
- Uses standard web browser for access
- Portal-based access to specific applications
- Limited functionality compared to full VPN client
- Full tunnel VPN
- All network traffic is routed through the VPN
- Maximum security - all data is encrypted
- Can slow down internet browsing
- Company has visibility of all traffic
- Split tunnel VPN
- Only some traffic (corporate resources) goes through the VPN
- Other traffic (personal browsing) goes directly to Internet
- Better performance for general internet use
- Less secure - some traffic not protected by VPN
- Common VPN protocols: IPSec, SSL/TLS, OpenVPN, L2TP, PPTP
- VPN concentrator handles multiple VPN connections
Section 15: Network Servers and Services
File and Print Servers
- File servers provide centralized storage for network users
- SMB/CIFS protocol used for Windows file sharing
- Port 445 (SMB/CIFS)
- NFS (Network File System) used for Linux/Unix file sharing
- Print servers centralize print management and reduce client-side processing
- Permissions: Share-level vs. NTFS permissions (most restrictive wins)
- UNC paths for mapping drives: \\server\share
Web Servers
- Provides access to websites via HTTP or HTTPS
- Port 80 (HTTP) and port 443 (HTTPS)
- Common platforms: Apache, IIS (Internet Information Services), and NGINX
- Uses HTML, CSS, and JS
- HTTPS uses SSL/TLS for encryption and security
- Web services: REST APIs and SOAP
- Certificate management is critical for HTTPS
Email Servers
- SMTP (Simple Mail Transfer Protocol) server
- Responsible for sending mail
- Port 25 (standard SMTP), Port 587 (SMTP with TLS)
- POP3 (Post Office Protocol)
- Port 110 (POP3), Port 995 (POP3S secure)
- Emails are deleted from server as they're received
- Downloads mail to local device
- IMAP (Internet Message Access Protocol)
- Keeps your mail on the server
- Able to manage your mail from any device
- Port 143 (IMAP), Port 993 (IMAPS secure)
- Synchronizes mail across multiple devices
- Microsoft Exchange
- Handles all 3 types and ports
- Spam filtering: SPF, DKIM, and DMARC help prevent spam and spoofing
AAA Servers
- Authentication Authorization Accounting Servers
- Centralized way of managing network security and access
- Authentication focuses on verifying identities of users
- Increase security using MFA and digital certificates
- Authorization defines permissions for an authenticated user
- Accounting tracks and logs all user's activity
- Remote Auth Dial-in User Service (RADIUS)
- Combines authen + author into single process over UDP
- Uses ports 1812 (authentication) and 1813 (accounting)
- Terminal Access Controller Access-Control System (TACACS+)
- Separates all three steps for more flexibility over TCP
- Port 49, Cisco proprietary
- Encrypts entire payload (more secure than RADIUS)
- Use cases: Network access control, VPN authentication, wireless security
Database Servers
- System designed to store, organize, and retrieve data
- Relational databases use SQL (Structured Query Language)
- Examples: SQL Server, MySQL, Oracle, PostgreSQL
- Ideal for inventory management and customer records
- NoSQL - MongoDB, Cassandra
- Unstructured or semi-structured data
- Best for real-time analytics and social media platforms
- In-memory databases - Memcache, Redis
- Store data in RAM for best performance
- Databases Store, Process, and Secure data
- Common ports: MySQL (3306), SQL Server (1433), PostgreSQL (5432)
- Backup importance: Transaction logs, full vs. incremental backups
NTP Servers
- Network Time Protocol
- Ensures synchronized time across devices
- Port 123 (UDP)
- Increases security by ensuring logs are properly timed
- Stratum levels indicate time source accuracy (Stratum 0 = atomic clock, lower is better)
- Critical for: Authentication protocols, certificate validation, accurate logging
- Prevents time-based security vulnerabilities
Syslog Servers
- Centralized logging from multiple network devices
- Protocol: Syslog uses UDP port 514
- Severity levels: 0 (Emergency) to 7 (Debug)
- Level 0 = most critical, Level 7 = least critical
- Collects logs from routers, switches, firewalls, servers
- Use cases: Security monitoring, troubleshooting, compliance auditing
- Makes it easier to correlate events across multiple systems
Proxy Servers
- Acts as intermediary between clients and servers
- Forward proxy: Client requests go through proxy to internet
- Protects client identity and provides content filtering
- Reverse proxy: External requests go through proxy to internal servers
- Protects internal servers and provides load balancing
- Benefits: Content filtering, caching, anonymity, bandwidth control
- Common port: 8080 (though can vary)
- Can improve performance by caching frequently accessed content
Load Balancers
- Distributes network traffic across multiple servers
- Load balancing methods: Round-robin, least connections, weighted distribution
- Round-robin: Cycles through servers in order
- Least connections: Sends to server with fewest active connections
- Benefits: High availability, scalability, eliminates single point of failure
- Types: Layer 4 (transport layer) vs. Layer 7 (application layer)
- Layer 4 is faster but less intelligent
- Layer 7 can make decisions based on content
- Increases uptime and performance
Unified Threat Management (UTM)
- All-in-one security appliance combining multiple security features
- Includes: Firewall, antivirus, IPS/IDS (Intrusion Prevention/Detection)
- Also includes: Content filtering, spam filtering, VPN capabilities
- Pros: Simplified management, single vendor, easier updates
- Cons: Single point of failure, can be expensive, may have performance bottlenecks
- Good for small to medium businesses wanting comprehensive security
- Reduces complexity of managing multiple separate security devices
ICS/SCADA
- ICS = Industrial Control Systems
- SCADA = Supervisory Control and Data Acquisition
- Used to monitor and control industrial processes
- Use cases: Power grids, manufacturing plants, water treatment facilities
- Often controls critical infrastructure
- Security concerns: Air-gapping recommended, legacy protocols are vulnerable
- Many systems run outdated software that can't be easily patched
- Uses specialized/proprietary protocols (Modbus, DNP3)
- High-value targets for cyberattacks due to critical nature
- Safety is paramount - security measures must not interfere with operations
Embedded Systems
- Computer systems with dedicated functions within larger systems
- Purpose-built for specific tasks rather than general computing
- Examples: Smart TVs, IoT devices, automotive systems, medical devices, printers
- Characteristics: Limited resources, specific purpose, often real-time operation
- Typically run specialized firmware rather than full operating systems
- Security issues: Difficult to update/patch, often forgotten in security planning
- May lack traditional security features due to resource constraints
- Can be entry points for attackers if not properly secured
- Important to change default credentials and keep firmware updated
Legacy Systems
- Older systems still in use despite newer alternatives being available
- Risks: Unsupported OS, no security patches, compatibility issues with modern systems
- May use outdated protocols or encryption methods
- Why they persist: High replacement cost, "if it ain't broke" mentality, specialized software dependencies
- Business-critical applications may only run on old systems
- Mitigation strategies: Network segmentation, virtual machines, air-gapping
- Isolate from internet and modern network when possible
- Document legacy systems and create transition plans
- Consider virtualization to preserve functionality while improving security
Section 16: Laptops and Mobile Devices
Display Types
- LCD (Liquid Crystal Display) - Most common, uses backlight, lower power than older tech
- LED (Light Emitting Diode) - Type of LCD with LED backlight; brighter and more efficient
- OLED (Organic LED) - Self-emitting pixels, better contrast, thinner, more expensive
- IPS (In-Plane Switching) - Better viewing angles than TN, more accurate colors
- TN (Twisted Nematic) - Cheaper, faster response time, poor viewing angles
- VA (Vertical Alignment) - Good contrast, response time between IPS and TN
Display Attributes
- Resolution - Pixels per inch (PPI); higher = sharper image
- Brightness - Measured in nits; higher brightness for outdoor visibility
- Contrast ratio - Difference between black and white; higher = better image quality
- Color depth - Number of colors displayable (8-bit, 10-bit,...)
- Refresh rate - Hz frequency (60Hz, 144Hz); higher for gaming/smooth motion
- Panel size - Diagonal measurement (13", 15", 17" common for laptops)
- Aspect ratio - Width to height (16:9, 16:10, 4:3)
Mobile Device Components
- Digitizer - Converts tactile input into digital signals
- Accelerometer - Detects device orientation and movement
- Gyroscope - Measures angular velocity and rotation
Mobile Device Wireless Connectivity
- WiFi - 802.11a/b/g/n/ac/ax; connects to local networks and internet
- Bluetooth - 2.4GHz; short-range wireless for peripherals (headphones, keyboards)
- NFC (Near Field Communication) - Very short range (10 cm); contactless payments
- Cellular (3G/4G/5G) - Mobile network connectivity; varies by provider
- GPS - Global Positioning System for location services and navigation
- Airplane mode - Disables all wireless transmission for flight compliance
Mobile Device Wired Connectivity
- USB-C - Modern standard; supports charging, data transfer, video output
- Lightning - Apple proprietary connector; used on iPhones and iPads
- Micro-USB - Older standard; still common on some Android devices
- 3.5mm headphone jack - Legacy audio input; declining in modern devices
- USB On-the-Go (OTG) - Allows mobile devices to act as host for USB peripherals
- HDMI - Video output; usually via adapter for mobile devices
Port Replicators & Docking Stations
- Port replicator - Extends ports without additional power; portable
- Docking station - More comprehensive; includes power, video, audio, USB hubs
- Benefits: Single connection to peripherals; keyboard, mouse, monitor, etc.
- Types: USB-C docks, proprietary docks, universal docks
- Video output - HDMI, DisplayPort, or VGA via dock to external monitors
- Power delivery - Charges laptop while docked
- Common for office setups - Transform portable device into desktop workstation
Section 16: Mobile Device Management and Synchronization
Mobile Device Synchronization
- Process of keeping data consistent across multiple devices
- Ensures same information available on phone, tablet, computer
- Can be automatic (real-time) or manual (on-demand)
- Requires account setup (Apple ID, Google Account, Microsoft Account)
- Cloud-based synchronization most common method today
- Sync conflicts occur when same data modified on multiple devices
- Most systems use "last write wins" or manual conflict resolution
- Benefits: Data backup, accessibility, consistency across devices
Data for Synchronization
- Contacts
- Name, phone numbers, email addresses, physical addresses
- Synced via iCloud, Google Contacts, Microsoft 365
- Calendar
- Events, appointments, reminders, recurring meetings
- Can sync personal and work calendars separately
- Email
- Messages, folders, drafts, sent items
- IMAP keeps email synced across all devices
- POP3 downloads and removes from server (no sync)
- Photos and Videos
- Camera roll, albums, edited images
- iCloud Photos, Google Photos, OneDrive
- Can consume significant storage and bandwidth
- Applications
- App installations, settings, and preferences
- Purchased apps available on all devices
- App data may or may not sync depending on app
- Documents
- Files, PDFs, office documents, notes
- iCloud Drive, Google Drive, OneDrive, Dropbox
- Bookmarks and Browsing Data
- Browser favorites, history, saved passwords
- Syncs via browser accounts (Chrome, Safari, Edge)
- Passwords and Credentials
- Saved login information, Wi-Fi passwords
- Keychain (Apple), Password Manager (Google)
- Should be encrypted for security
Synchronization Methods
- Cloud-based synchronization
- Most common modern method
- Data stored on remote servers (iCloud, Google Drive, OneDrive)
- Automatic sync when connected to internet
- Requires account login and internet connectivity
- Pro: Accessible anywhere, automatic backup
- Con: Requires internet, privacy concerns, storage limits
- USB synchronization
- Physical connection between device and computer
- Uses iTunes (Apple) or manufacturer software (Samsung Smart Switch)
- Manual process - user initiates sync
- Pro: No internet required, faster for large files, more control
- Con: Must be physically connected, manual process
- Wireless synchronization
- Sync over Wi-Fi or Bluetooth without cables
- iTunes Wi-Fi Sync, Android Wi-Fi sync
- Devices must be on same local network
- Pro: Convenient, no cables needed
- Con: Slower than USB, must be on same network
- Desktop synchronization software
- Dedicated applications for managing sync
- Examples: iTunes, Samsung Smart Switch, OneDrive desktop app
- Provides more control over what syncs
- Exchange/ActiveSync
- Microsoft's protocol for enterprise sync
- Syncs email, calendar, contacts for corporate accounts
- Push notifications for real-time updates
- Commonly used in business environments
MDM and MAM
- MDM (Mobile Device Management)
- Centralized management of mobile devices in organization
- Controls entire device - settings, apps, security policies
- Enforces security policies: encryption, password requirements, screen lock
- Remote wipe capability if device lost or stolen
- Application management: push, update, remove apps remotely
- Can configure Wi-Fi, VPN, email settings automatically
- Geolocation and tracking of corporate devices
- Used for company-owned devices (COBO - Corporate Owned, Business Only)
- MAM (Mobile Application Management)
- Manages and secures specific applications, not entire device
- Controls only corporate apps and data, not personal apps
- Used for BYOD (Bring Your Own Device) scenarios
- Separates corporate data from personal data (containerization)
- Can selectively wipe only corporate data
- Less invasive than MDM for employee privacy
- Applies policies to specific apps (disable copy/paste, screenshots)
- Common MDM/MAM solutions
- Microsoft Intune, VMware Workspace ONE, MobileIron
- Apple Business Manager, Google Workspace
- Key features to remember for exam:
- Remote wipe (factory reset device remotely)
- Geofencing (restrict device use by location)
- Screen lock and password enforcement
- Application whitelisting/blacklisting
- Content filtering and access restrictions
Multifactor Authentication (MFA)
- Requires two or more verification factors to access account
- Significantly more secure than password alone
- Three categories of authentication factors:
- Something you know: Password, PIN, security question
- Something you have: Phone, token, smart card, hardware key
- Something you are: Fingerprint, face recognition, iris scan, voice
- Two-Factor Authentication (2FA)
- Subset of MFA using exactly two factors
- Most common: Password + SMS code or app-generated code
- Common MFA methods on mobile devices:
- SMS/Text message codes (least secure MFA method)
- Authenticator apps: Google Authenticator, Microsoft Authenticator, Authy
- Push notifications to mobile device
- Biometric authentication: Fingerprint (Touch ID), Face recognition (Face ID)
- Hardware tokens: YubiKey, RSA SecurID
- Time-based One-Time Password (TOTP)
- Generates temporary codes that expire (usually 30-60 seconds)
- Used by authenticator apps
- Works offline - doesn't require cellular connection
- Biometric authentication on mobile
- Fingerprint scanners (capacitive or ultrasonic)
- Facial recognition (2D or 3D mapping)
- Faster and more convenient than typing passwords
- Biometric data stored in secure enclave on device
- MFA best practices:
- Always enable MFA when available, especially for email and financial accounts
- Authenticator apps more secure than SMS
- Save backup codes in secure location
- Register multiple devices for account recovery
Location Services
- Determines device's geographic location using various methods
- GPS (Global Positioning System)
- Most accurate method (within 5-10 meters)
- Uses satellites to triangulate position
- Requires clear view of sky, drains battery
- Works without cellular or Wi-Fi connection
- Cellular tower triangulation
- Uses cell tower signals to estimate location
- Less accurate than GPS (100-1000 meters)
- Works indoors, uses less battery than GPS
- Requires cellular connection
- Wi-Fi positioning
- Uses nearby Wi-Fi access points to determine location
- Accurate in urban areas (20-50 meters)
- Works indoors where GPS doesn't
- Must have Wi-Fi enabled (doesn't need to be connected)
- Location services features:
- Find My Device/Find My iPhone - locate lost or stolen device
- Geotagging - adds location data to photos and posts
- Navigation and mapping applications
- Location-based reminders and automation
- Geofencing - triggers actions when entering/leaving area
- Privacy considerations:
- Apps request permission to access location
- Options: Always, While Using App, Never, Ask Next Time
- Can disable location services entirely in settings
- Review which apps have location access regularly
- Remote wipe and device tracking
- Requires location services enabled beforehand
- Can remotely lock, display message, or erase device
- Apple: Find My iPhone/iPad
- Android: Find My Device
- Must be signed into iCloud or Google account
Mobile Email Configuration
- Three main email protocols for mobile devices:
- IMAP (Internet Message Access Protocol)
- Port 143 (standard), Port 993 (IMAPS with SSL/TLS)
- Keeps email on server - syncs across all devices
- Preferred for mobile devices
- Can access same email from phone, tablet, and computer
- Folder structure maintained across devices
- POP3 (Post Office Protocol version 3)
- Port 110 (standard), Port 995 (POP3S with SSL/TLS)
- Downloads email to device and typically removes from server
- Not ideal for multiple devices
- Older protocol, less commonly used today
- Can be configured to leave copy on server
- SMTP (Simple Mail Transfer Protocol)
- Port 25 (standard), Port 587 (with TLS), Port 465 (SSL)
- Used only for sending email (outgoing mail server)
- Must configure separate incoming server (IMAP or POP3)
- Exchange ActiveSync
- Microsoft's protocol for corporate email
- Syncs email, calendar, contacts, tasks
- Push email - instant delivery of new messages
- Port 443 (HTTPS)
- Commonly used in enterprise environments
- Requires Exchange server or Microsoft 365/Office 365
- S/MIME (Secure/Multipurpose Internet Mail Extensions)
- Encrypts and digitally signs email messages
- Requires digital certificate for encryption
- Ensures confidentiality and authenticity
- Used in corporate and high-security environments
Configuring Mobile Email
- Basic configuration requirements:
- Email address and password
- Incoming mail server address (IMAP or POP3)
- Outgoing mail server address (SMTP)
- Username (usually email address)
- Port numbers for each protocol
- SSL/TLS security settings
- Common email providers and settings:
- Gmail: imap.gmail.com (993), smtp.gmail.com (587)
- Outlook/Office 365: outlook.office365.com (993/587)
- Yahoo: imap.mail.yahoo.com (993), smtp.mail.yahoo.com (587)
- iCloud: imap.mail.me.com (993), smtp.mail.me.com (587)
- Security settings:
- Always use SSL/TLS encryption when available
- SSL (Secure Sockets Layer) - older encryption method
- TLS (Transport Layer Security) - newer, more secure
- Authentication type: Password, OAuth, certificate-based
- Corporate email configuration:
- Usually requires Exchange ActiveSync or similar protocol
- May need to accept security policies (MDM enrollment)
- Server address typically: mail.company.com or outlook.company.com
- Domain\username format may be required
- VPN may be required for external access
- Automatic configuration:
- Autodiscover service automatically finds server settings
- Many email apps detect settings by email address
- Manual configuration needed if autodiscover fails
- Troubleshooting email configuration:
- Verify username and password are correct
- Check incoming and outgoing server addresses
- Confirm port numbers and SSL/TLS settings
- Disable firewall/antivirus temporarily to test connectivity
- Verify account is enabled on mail server
- Check for app-specific passwords (Gmail, Yahoo with 2FA)
- Ensure device has internet connectivity
- Mobile email app features:
- Push vs. Fetch: Push delivers instantly, Fetch checks periodically
- Sync settings: How far back to sync emails (days/weeks/all)
- Signature configuration for sent messages
- Multiple account support in single app
- Notification settings per account
Extra: Printer Troubleshooting
Common Printer Issues and Solutions
- Garbled characters: Bad or corrupted drivers, bad print job reset printer
- Vertical lines: Laser printer, foreign matter on roller, yank toner and replace
- Wrong print color: Driver, lost one of the colors
- Blank pages: Thermal no heating element, laser primary carona dead
- Streak: Inkjet, clogged print heads or misaligned nozzles
- Faded prints: Laser low on toner, impact ribbon running out, inkjet clogged jets
- Ghost images: Laser clean rubber drum
- Toner not fused to paper: replace fuser assembly
- Creased paper: Pickup rollers at different stability
- Grinding noise: Carriage jam, paper jam, bad driver | Reset printer, update driver, clear jams
- Unrecognized tray: Reset tray | Clear debris
- Connectivity: Check cables, turned on, hibernating | Check power and network
- Print Queue Frozen: Queue blocked, jams, low ink/toner | Restart, clear queue
- Poor print quality: Check ink/toner levels, clean print heads, adjust print settings
- Printer not responding: Verify power and connections, restart printer and computer
- Network printing problems: Check network connection, ensure printer is on same network
- Slow printing: Reduce print quality settings, check for large print jobs in queue
- Wireless printing issues: Reconnect to Wi-Fi, check signal strength, restart router
- Error messages: Refer to printer manual or manufacturer support for specific error codes
- Print spooler issues: Restart print spooler service on computer
- Compatibility issues: Ensure printer is compatible with operating system version