<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Get Certified Get Ahead</title>
	<atom:link href="https://blogs.getcertifiedgetahead.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://blogs.getcertifiedgetahead.com/</link>
	<description>Helping people Get Certified so that they can Get Ahead.</description>
	<lastBuildDate>Wed, 16 Mar 2022 20:43:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://blogs.getcertifiedgetahead.com/wp-content/uploads/2020/10/cropped-favicon2-1-32x32.jpg</url>
	<title>Get Certified Get Ahead</title>
	<link>https://blogs.getcertifiedgetahead.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Life Events</title>
		<link>https://blogs.getcertifiedgetahead.com/life-events/</link>
					<comments>https://blogs.getcertifiedgetahead.com/life-events/#respond</comments>
		
		<dc:creator><![CDATA[Darril Gibson]]></dc:creator>
		<pubDate>Sun, 13 Mar 2022 00:16:08 +0000</pubDate>
				<category><![CDATA[Security+]]></category>
		<guid isPermaLink="false">https://blogs.getcertifiedgetahead.com/?p=14545</guid>

					<description><![CDATA[<p>You can rarely control what happens to you. The best you can do is control your response. From cradle to grave all of us experience life events. Sometimes they are little things that create indelible memories. Other times, they are major events that change our life&#8217;s trajectory. Little Joys and Life Events As an example,...</p>
<p>The post <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/life-events/">Life Events</a> appeared first on <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com">Get Certified Get Ahead</a> by <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/author/darrilblogs/">Darril Gibson</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogs.getcertifiedgetahead.com/life-events/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Server Redundancy and High Availability</title>
		<link>https://blogs.getcertifiedgetahead.com/server-redundancy-and-high-availability/</link>
					<comments>https://blogs.getcertifiedgetahead.com/server-redundancy-and-high-availability/#respond</comments>
		
		<dc:creator><![CDATA[Darril.]]></dc:creator>
		<pubDate>Sun, 02 Jan 2022 17:02:14 +0000</pubDate>
				<category><![CDATA[Security+]]></category>
		<guid isPermaLink="false">https://blogs.getcertifiedgetahead.com/?p=14537</guid>

					<description><![CDATA[<p>If you&#8217;re planning to take the SY0-601 version of the Security+ exam, you should understand how to implement secure network designs. This includes adding redundancy and fault tolerance. By adding redundancy into your systems and networks, you can increase the system’s reliability even when they fail. By increasing reliability, you increase a system’s resiliency or...</p>
<p>The post <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/server-redundancy-and-high-availability/">Server Redundancy and High Availability</a> appeared first on <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com">Get Certified Get Ahead</a> by <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/author/jaenaneronagmail-com/">Darril.</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogs.getcertifiedgetahead.com/server-redundancy-and-high-availability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Implementing Risk Analysis</title>
		<link>https://blogs.getcertifiedgetahead.com/implementing-risk-analysis/</link>
					<comments>https://blogs.getcertifiedgetahead.com/implementing-risk-analysis/#respond</comments>
		
		<dc:creator><![CDATA[Darril.]]></dc:creator>
		<pubDate>Sun, 31 Oct 2021 18:05:38 +0000</pubDate>
				<category><![CDATA[Security+]]></category>
		<guid isPermaLink="false">https://blogs.getcertifiedgetahead.com/?p=14507</guid>

					<description><![CDATA[<p>If you&#8217;re planning to take the SY0-601 version of the Security+ exam, you should understand risk management processes and concepts. This includes risk analysis processes that can identify potential issues that could negatively impact an organization’s goals and objectives. For example, can you answer this practice test question? Q. Maggie is performing a risk assessment...</p>
<p>The post <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/implementing-risk-analysis/">Implementing Risk Analysis</a> appeared first on <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com">Get Certified Get Ahead</a> by <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/author/jaenaneronagmail-com/">Darril.</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogs.getcertifiedgetahead.com/implementing-risk-analysis/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Implementing Secure Network Designs</title>
		<link>https://blogs.getcertifiedgetahead.com/implementing-secure-network-designs/</link>
					<comments>https://blogs.getcertifiedgetahead.com/implementing-secure-network-designs/#respond</comments>
		
		<dc:creator><![CDATA[Darril.]]></dc:creator>
		<pubDate>Mon, 11 Oct 2021 12:11:22 +0000</pubDate>
				<category><![CDATA[Security+]]></category>
		<guid isPermaLink="false">https://blogs.getcertifiedgetahead.com/?p=14488</guid>

					<description><![CDATA[<p>If you&#8217;re planning to take the SY0-601 version of the Security+ exam, you should understand how to implement secure network designs. This includes using advanced security devices to secure networks. For example, can you answer this practice test question? Q. Lenny noticed a significant number of logon failures for administrator accounts on the organization’s public...</p>
<p>The post <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/implementing-secure-network-designs/">Implementing Secure Network Designs</a> appeared first on <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com">Get Certified Get Ahead</a> by <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/author/jaenaneronagmail-com/">Darril.</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogs.getcertifiedgetahead.com/implementing-secure-network-designs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Command-Line Tools</title>
		<link>https://blogs.getcertifiedgetahead.com/understanding-command-line-tools/</link>
					<comments>https://blogs.getcertifiedgetahead.com/understanding-command-line-tools/#respond</comments>
		
		<dc:creator><![CDATA[Darril.]]></dc:creator>
		<pubDate>Mon, 04 Oct 2021 10:52:44 +0000</pubDate>
				<category><![CDATA[Security+]]></category>
		<guid isPermaLink="false">https://blogs.getcertifiedgetahead.com/?p=14418</guid>

					<description><![CDATA[<p>If you&#8217;re planning to take the SY0-601 version of the Security+ exam, you should understand how several command-line tools can help you assess organizational security. Administrators (and attackers) use many commands for network reconnaissance and discovery. Administrators use them for legitimate purposes, such as when troubleshooting. Attackers use them to gain more information about a...</p>
<p>The post <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/understanding-command-line-tools/">Understanding Command-Line Tools</a> appeared first on <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com">Get Certified Get Ahead</a> by <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/author/jaenaneronagmail-com/">Darril.</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogs.getcertifiedgetahead.com/understanding-command-line-tools/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Password Attacks</title>
		<link>https://blogs.getcertifiedgetahead.com/understanding-password-attacks/</link>
					<comments>https://blogs.getcertifiedgetahead.com/understanding-password-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Darril.]]></dc:creator>
		<pubDate>Mon, 27 Sep 2021 12:06:14 +0000</pubDate>
				<category><![CDATA[Security+]]></category>
		<guid isPermaLink="false">https://blogs.getcertifiedgetahead.com/?p=14405</guid>

					<description><![CDATA[<p>Password attacks attempt to discover, or bypass, passwords used for authentication on systems and networks, and for different types of files. Some password attacks are sophisticated cryptographic attacks, while others are rather simple brute force attacks. If you&#8217;re planning to take the SY0-601 version of the Security+ exam, you should understand potential indicators to determine...</p>
<p>The post <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/understanding-password-attacks/">Understanding Password Attacks</a> appeared first on <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com">Get Certified Get Ahead</a> by <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/author/jaenaneronagmail-com/">Darril.</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogs.getcertifiedgetahead.com/understanding-password-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Implementing Systems Securely</title>
		<link>https://blogs.getcertifiedgetahead.com/implementing-systems-securely/</link>
					<comments>https://blogs.getcertifiedgetahead.com/implementing-systems-securely/#respond</comments>
		
		<dc:creator><![CDATA[Darril.]]></dc:creator>
		<pubDate>Thu, 16 Sep 2021 11:20:28 +0000</pubDate>
				<category><![CDATA[Security+]]></category>
		<guid isPermaLink="false">https://blogs.getcertifiedgetahead.com/?p=14394</guid>

					<description><![CDATA[<p>Secure systems design concepts help ensure that computing systems are deployed and maintained in a secure state. If you&#8217;re planning to take the SY0-601 version of the Security+ exam, you should understand different methods used to implement systems securely. This includes several steps used to secure hosts. For example, can you answer this question? Q....</p>
<p>The post <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/implementing-systems-securely/">Implementing Systems Securely</a> appeared first on <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com">Get Certified Get Ahead</a> by <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/author/jaenaneronagmail-com/">Darril.</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogs.getcertifiedgetahead.com/implementing-systems-securely/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Identifying Common Use Cases</title>
		<link>https://blogs.getcertifiedgetahead.com/identifying-common-use-cases/</link>
					<comments>https://blogs.getcertifiedgetahead.com/identifying-common-use-cases/#respond</comments>
		
		<dc:creator><![CDATA[Darril.]]></dc:creator>
		<pubDate>Sun, 12 Sep 2021 18:33:31 +0000</pubDate>
				<category><![CDATA[Security+]]></category>
		<guid isPermaLink="false">http://blogs.getcertifiedgetahead.com/?p=11457</guid>

					<description><![CDATA[<p>If you&#8217;re planning to take the SY0-601 version of the Security+ exam, you should understand basics of cryptographic concepts such as common use cases. A use case typically describes an organizational goal. Many protocols mentioned in the CompTIA Security+ objectives support specific use cases. For example, can you answer this&#160; question? Q. You are tasked...</p>
<p>The post <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/identifying-common-use-cases/">Identifying Common Use Cases</a> appeared first on <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com">Get Certified Get Ahead</a> by <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/author/jaenaneronagmail-com/">Darril.</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogs.getcertifiedgetahead.com/identifying-common-use-cases/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Keeping OSs Secure</title>
		<link>https://blogs.getcertifiedgetahead.com/keeping-oss-secure/</link>
					<comments>https://blogs.getcertifiedgetahead.com/keeping-oss-secure/#respond</comments>
		
		<dc:creator><![CDATA[Darril.]]></dc:creator>
		<pubDate>Sun, 08 Aug 2021 17:22:52 +0000</pubDate>
				<category><![CDATA[Security+]]></category>
		<guid isPermaLink="false">https://blogs.getcertifiedgetahead.com/?p=13374</guid>

					<description><![CDATA[<p>Most operating systems (OSs) aren’t secure out of the box. Instead, administrators must take specific steps to secure them. If you&#8217;re planning to take the SY0-601 version of the Security+ exam, you should understand how to do so. For example, can you answer this question? Q. Security experts want to reduce risks associated with updating...</p>
<p>The post <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/keeping-oss-secure/">Keeping OSs Secure</a> appeared first on <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com">Get Certified Get Ahead</a> by <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/author/jaenaneronagmail-com/">Darril.</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogs.getcertifiedgetahead.com/keeping-oss-secure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Connecting Networks Using Routers</title>
		<link>https://blogs.getcertifiedgetahead.com/connecting-networks-using-routers/</link>
					<comments>https://blogs.getcertifiedgetahead.com/connecting-networks-using-routers/#respond</comments>
		
		<dc:creator><![CDATA[Darril.]]></dc:creator>
		<pubDate>Sun, 25 Jul 2021 21:04:55 +0000</pubDate>
				<category><![CDATA[Security+]]></category>
		<guid isPermaLink="false">https://blogs.getcertifiedgetahead.com/?p=13049</guid>

					<description><![CDATA[<p>If you&#8217;re planning to take the SY0-601 version of the Security+ exam, you should understand basic networking concepts, devices, and network topologies used within secure networks. For example, you may have spent a lot of time troubleshooting connectivity but rarely manipulated access control lists (ACLs) on a router or modified firewall rules. For example, can...</p>
<p>The post <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/connecting-networks-using-routers/">Connecting Networks Using Routers</a> appeared first on <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com">Get Certified Get Ahead</a> by <a rel="nofollow" href="https://blogs.getcertifiedgetahead.com/author/jaenaneronagmail-com/">Darril.</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blogs.getcertifiedgetahead.com/connecting-networks-using-routers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
