John King, CISSP, PMP, CISM

John King currently works in the greater Los Angeles area as a ISSO (Information Systems Security Officer). John has a passion for learning and developing his cyber security skills through education, hands on work, and studying for IT certifications.
Top 7 Cyber Certifications Ranked by Average Earning Potential in 2023

Top 7 Cyber Certifications Ranked by Average Earning Potential in 2023

Cybersecurity is a rapidly growing field, with the need for qualified professionals to protect against cyber-attacks and data breaches increasing every day...

How DoS Attacks are Conducted

How DoS Attacks are Conducted

A denial of service (DoS) attack is a cyber attack that involves flooding a computer system or network with traffic in an attempt to disrupt or disable...

Cookies and Computer Security

Cookies and Computer Security

ookies are small text files that are stored on a user's computer by a website. They are used to remember information about the user, such as their...

The History of Ransomware

The History of Ransomware

The history of ransomware can be traced back to the late 1980s and early 1990s, when it was first used as a tool for extortion. At that time, ransomware...

DNS Explained in Simple Terms

DNS Explained in Simple Terms

The Domain Name System (DNS) is a required component of the modern internet. It is essentially a directory of all the website names and addresses on the internet and acts as a

AI Cyber Attacks – The Future of Hacking

AI Cyber Attacks – The Future of Hacking

I-powered cyberattacks are a growing concern in the world of cybersecurity. These attacks leverage artificial intelligence and machine learning algorithms...

Quantum Networking Explained in Simple Terms

Quantum Networking Explained in Simple Terms

Quantum networking is a field of research that aims to develop technologies for transmitting and processing information using the principles of quantum...

Zero Trust – Explained in Simple Terms

Zero Trust – Explained in Simple Terms

ero trust is a newer security model that assumes that all users and devices, whether inside or outside of an organization's network, are untrusted and must...

Everything You Need to Know about APT1

Everything You Need to Know about APT1

APT1, also known as the Comment Crew or the Shanghai Group, is a Chinese state-sponsored hacking group that has been active since 2006. The group is likely...

Everything you Need to Know about Fuzz Testing

Everything you Need to Know about Fuzz Testing

Fuzz testing, also known as fuzzing or brute force testing, is a software testing technique that involves providing invalid, unexpected, or random data...

SQL Injection in Simple Terms

SQL Injection in Simple Terms

SQL injection is a cyber attack in which an attacker inserts malicious code into a database through a website or application. The attacker does this by,,,

What is Kubernetes in Simple Terms?

What is Kubernetes in Simple Terms?

Kubernetes is an open-source container orchestration system that was developed by Google but is now maintained by the Cloud Native Computing Foundation...

What is a Virus in Simple Terms?

What is a Virus in Simple Terms?

A computer virus is a kind of malicious software designed to infect and infiltrate computer systems, often without the knowledge or consent of the user. Once...