Best Practices to Secure Data in a K-12 Environment

1. Implement Strong Access Controls

  • Role-Based Access Control (RBAC): Ensure that only authorized personnel have access to sensitive data. Assign permissions based on roles and responsibilities.
  • Multi-Factor Authentication (MFA): Require MFA for accessing sensitive systems and data to add an extra layer of security.

2. Regular Security Training and Awareness

  • Staff Training: Conduct regular cybersecurity training sessions for teachers, administrators, and support staff to recognize phishing attempts, social engineering, and other common threats.
  • Student Awareness: Educate students about safe online behaviors, the importance of password security, and how to avoid suspicious links and downloads.

3. Use Strong Password Policies

  • Complex Passwords: Enforce the use of strong, complex passwords that include a mix of letters, numbers, and special characters.
  • Password Management: Encourage the use of password managers to help staff and students manage their passwords securely.

4. Network Security

  • Firewalls: Deploy firewalls to protect the school’s network from unauthorized access and malicious traffic.
  • Intrusion Detection and Prevention Systems (IDPS): Implement IDPS to monitor and respond to potential threats in real time.
  • Segmentation: Segment the network to limit access to sensitive data and reduce the attack surface.

5. Data Encryption

  • Encryption at Rest and in Transit: Ensure that all sensitive data is encrypted both when stored and when transmitted over the network.
  • Secure Communication Channels: Use secure protocols like HTTPS, SSL/TLS, and VPNs for remote access and data transfer.

6. Regular Updates and Patch Management

  • Software Updates: Keep all software, including operating systems, applications, and security tools, up to date with the latest patches and security fixes.
  • Automated Patch Management: Use automated tools to manage and apply patches consistently and promptly.

7. Regular Backups and Disaster Recovery Planning

  • Data Backups: Perform regular backups of critical data and store them securely offsite or in the cloud.
  • Disaster Recovery Plan: Develop and regularly test a disaster recovery plan to ensure quick recovery from data breaches, ransomware attacks, or other disruptions.

8. Endpoint Security

  • Antivirus and Anti-Malware: Install and maintain up-to-date antivirus and anti-malware solutions on all devices.
  • Mobile Device Management (MDM): Use MDM solutions to manage and secure mobile devices used by students and staff.

9. Application Security

  • Secure Software Development: Ensure that applications developed or used by the school follow secure coding practices and are regularly tested for vulnerabilities.
  • Third-Party Applications: Vet and monitor third-party applications for security compliance before integrating them into the school’s IT environment.

10. Physical Security

  • Secure Access to Facilities: Implement physical security controls like locks, access badges, and surveillance cameras to protect areas where sensitive data is stored.
  • Device Management: Ensure that devices such as laptops, tablets, and USB drives are securely stored and tracked.

11. Incident Response and Management

  • Incident Response Plan: Develop and maintain a comprehensive incident response plan outlining steps to take in the event of a data breach or security incident.
  • Regular Drills: Conduct regular incident response drills to ensure that staff are prepared to handle security incidents effectively.

12. Compliance and Auditing

  • Regulatory Compliance: Ensure compliance with relevant regulations such as FERPA (Family Educational Rights and Privacy Act) and COPPA (Children’s Online Privacy Protection Act).
  • Regular Audits: Conduct regular security audits and assessments to identify and address vulnerabilities and ensure ongoing compliance with security policies.

Discover & Fingerprint: Nmap flags you should actually know (and when to use them)

Discovery and fingerprinting are where recon stops being guesswork and starts being a map. Over the next few weeks I’ll dig into Nmap and other recon tools — for now, here’s a compact, practical list of Nmap switches worth committing to memory for pentesting exams and real-world ops. Don’t just memorize the letters — learn the purpose and the use case.

Basic target input / listing

  • nmap -iL targets.txt
    Scan targets from a file. Use when you have a long list to automate.
  • nmap -iR 100
    Scan 100 random hosts. Good for practice/learning about global scanning patterns in a lab.
  • nmap 192.168.1.10 -sL
    List-only — no probes. Use to verify target resolution without touching ports.

Host discovery vs port scan

  • nmap 192.168.1.1/24 -sn
    Ping/host discovery only (no port scan). Fast way to find live hosts on a subnet.
  • nmap 192.168.1.1-5 -Pn
    Skip host discovery (treat hosts as up). Useful when ICMP/ARP are blocked but you still want to try ports.

Port specification

  • nmap 192.168.1.1 -p 21
    Scan a single port (FTP, in this example).
  • nmap 192.168.1.1 -p 21-100
    Scan a specific port range. Use when you want targeted scanning (faster than full 65k).

Service & OS fingerprinting

  • nmap 192.168.1.1 -sV
    Service/version detection. Helps identify vulnerable versions (e.g., out-of-date FTP/SSH).
  • nmap 192.168.1.1 -O
    Remote OS detection (TCP/IP stack fingerprinting). Useful when you need OS-level attack vectors.
  • nmap 192.168.1.1 -A
    Aggressive: OS detection + version detection + scripts + traceroute. Good for a quick, deep look — loud and obvious on the network.

Timing / IDS evasion

Timing templates adjust scan speed and stealth. Choose based on network reliability and detection risk.

  • -T0 Paranoid — ultra-slow. Used to evade IDS or noisy logging systems.
  • -T1 Sneaky — very slow.
  • -T2 Polite — slows scans to reduce bandwidth/impact on target.
  • -T3 Normal — default.
  • -T4 Aggressive — faster, assumes stable network.
  • -T5 Insane — very fast; only on extremely reliable links or internal lab networks.

Memory tricks & practical tips

  • I/O flags: -iL = Input List. File-based scanning automation.
  • List-only: -sL — “List targets only.” No probing.
  • Host discovery: -sn = scan no ports (ping only).
  • Skip discovery: -Pn = treat hosts as Up (No ping).
  • Service info: -sV for service Version, -O for OS.
  • One-shot vs range: -p 21 vs -p 21-100. Single vs range.
  • Aggressive -A = one-shot deep recon; loud but thorough.
  • Timing -T# = speed vs stealth. 0 is slowest/most stealthy; 5 fastest.

Mini workflows (real use-cases)

  • Quick inventory on a subnet:
    nmap 10.0.0.0/24 -sn → find live hosts, then nmap -sV -p 22,80,443 <host> for details.
  • When ICMP blocked:
    nmap -Pn -p 1-1000 <host> → skip discovery, probe ports directly.
  • Stealth check in an IDS lab:
    nmap -T1 -sV <host> → slow timing to reduce IDS noise.
  • Full noisy recon in a lab environment:
    nmap -A -T4 <target> → quick comprehensive view.

Closing — don’t memorize blindly

The exam question isn’t “what flag is X” — it’s “which flag solves this problem.” Memorize the purpose and practice applying them in labs. Over the coming weeks I’ll publish deeper examples for each of these switches, show script usage, and map Nmap output to real exploitation workflows.

CompTIA Pentest+ and the CEH exam in the works + some fitness follies

Well, well, well, the world has changed a lot since my last post. Definitely have a lot of irons in the fire as the old saying goes. Currently working on the PenTest+ certification from CompTIA. I’ll be following that up with the CEH exam. Between those two certs I’ll be working on and getting the ISACA’s Cybersecurity Audit Certificate. 2024 is shaping up to be another great year!

Hit a new deadlift PR at 521/237

Playing a little catchup

A lot has been going on over the last 6 months or so. One of the primary things is that I’ll be doing is taking the ISC(2) Certified Cloud Security Professional exam on 4 NOV.

What does the CCSP cover you might ask?

Domain 1 covers architecture, concepts, and design. Domain 1 also includes cloud computing concepts which covers broad network access, on-demand services, resource pooling, rapid elasticity, multi-tenancy and more. It also includes cloud service models, IaaS, storage types, volume storage, object storage, PaaS, storage types and more.

The cloud service deployment model covers public cloud, private cloud, hybrid cloud, community cloud, management plane, and virtualization.

The things that are covered in the rest of Domain 1 are:
Security aspects of virtualization – Type 1 and Type 2 hypervisors.
Principles of secure cloud computing – covering roles and responsibilities, design principles and Identity and Access Management (IAM).

Design requirements – covering requirements analysis, functional requirements, inventory, valuation and more. Cloud model boundaries were also covered as well as the cloud service models, IaaS, PaaS and SaaS. Protecting sensitive information portion covered hardening, encryption, layer defense, common threats, secure data life cycles and more. And finally, the Threat Modeling portion of Domain 1 includes STRIDE, DREAD, the OWASP Top 10 security threats and the CSA Top 9 risks.

I’ll outline Domain 2 tomorrow along with some other important details.

Ive also been able to make back to CrossFit on a regular basis. Ive also been able to get out on the water a little more often and once I pass this exam in November I’ll take a couple months off and then at the beginning of the year go ALL IN on Heath Adams Practical Network Penetration Testing certification. After that I will take a nice long break from taking certification exams.

Today as a break from studying I took a nice long walk and I found this cool writing spider along the way.

Nice easy two hour stroll through the eastern pinelands
Our old friend the writing spider

And, it’s kind of fitting that I haven’t posted any sort of lifting videos in…forever, and when I finally get back to training that I end up posting a lifetime PR for my deadlift at 517#. Easy day.

lifting is the source

Until next time…

Another beautiful day in the country

Physical training for the day:

A1. Incline curls 10, 10, 10, 10 – :03 second lowering/eccentric load; rest 0
A2. Seated hammer curls 20, 20, 20, 20; rest 0
A3. Standard EZ bar curl 20, 20, 20, 20; rest 2mins
B1. Bench dips 20 x 3; rest 0
B2. Banded press downs 20, 20, 20; rest 0 – pause for two deep nasal breaths at the top of every 5th rep
B3. Triceps push-ups max effort/push to failure; rest 2mins
C1. EZ bar close grip curls 15, 15, 15; rest 0 – try to stay at the same weight for all 3 movements
C2. EZ bar drag curls 15, 15, 15; rest 0
C3. EZ bar overhead triceps exts. 20, 20, 20; rest 1
+
7 n 7 for 7
7 Hang power cleans & push press
7 walk out burpees without the pushup

On Monday I accepted an offer to begin teaching, part-time, for Chegg/Thinkful.com in their Cyber Security program. I’m really looking forward to helping the next wave of cyber sec professionals. It’ll be another great way to help keep up with current trends, continue to reinforce the fundamentals, and also share past and present experiences with a wide swath of new IT pros. Who knows, before long I just might be able to start posting videos of training and teaching again.

Current affairs:

The bravest are surely those who have the clearest vision of what is before them, glory and danger alike, and yet notwithstanding, go out to meet it.

Peter Onuf’s Jefferson & Reclaiming 1619

Pelosi & Congress Claims Sovereign Immunity in Federal Court to Keep January 6 Videos and Emails Secret

Hawks Smear War Opponents Again by Ted Galen Carpenter

Putin Wants His Own Monroe Doctrine by Patrick J. Buchanan

Rep after Rep — Easy Day

Don’t no rep me

When I first wrote this, I wasn’t chasing promotions or algorithms. I was just trying to keep showing up to train, to learn, to get a little better each day. Back then, “rep after rep” was more than a training mantra. It was a way to stay grounded when progress felt invisible.

The hardest part wasn’t physical. It was the repetition, the daily grind that felt endless. Whether I was refining form under the barbell or troubleshooting code that refused to run, the challenge was the same: staying patient when nothing seemed to move forward.

Some days you make the lift. Some days the lift makes you. But the point is always to come back tomorrow.

At some point, I stopped expecting each session, physical or mental, to feel like a breakthrough. The breakthrough was the habit itself. The more I showed up, the more the process began to reveal patterns: what worked, what didn’t, and how small adjustments compound over time.

In strength and in cybersecurity, consistency is the quiet multiplier. Each drill, each review, each run-through, one more rep toward mastery.

That same mindset carries through everything I do now — training teams, hardening systems, or writing content. I don’t chase perfect outcomes anymore. I look for steady iterations. A little tighter form. A cleaner line of code. A stronger policy.

That’s how resilience is built, not simply through intensity, but through consistency.

Progress doesn’t shout. It stacks. And one day, you realize the work that used to test you has become the warm-up.

Training for the day:

7 mins of:

7 Banded Sumos

7 Banded bodyweight squats w/moderate band

7 Calf raises

+

A. Back Squat 10, 10,10,10; rest 2/2:30 – 10 RM-ish

B1. Heels elevated air squats x 10 x 3; rest :10

B2. RDL w/an empty bar, sweep away — lumbar focus x 15 x 3; rest 1

C. SL RDL stability, unloaded x 10 x 3; — 5 per leg; rest 1

+

10min alt EMOM:

20 Step-ups – 10 per

15 push-ups

Martial skill work — 5 x 5 min rounds of Z2-Z4 striking, upper push/pull bodyweight movements in trapping/grappling range, and take down defense/sprawling/working underhook escapes et cetera.

Today in my world of Linux and pentesting I worked on building out an Active Directory Lab and worked on the initial attack vectors when attacking an AD based system. Things like LLMNR Poisoning, Capturing NTLMv2 Hashes with Responder, Password Cracking with Hashcat, LLMNR Poisoning Defense, SMB Relay Attacks, Discovering Hosts with SMB Signing Disabled, Start SMB Relay Attack Defenses, & Gaining Shell Access.

Current affairs:

We Got Him (Again, and Again, and Again): On the Latest ISIS Takedown In a Long Line of American Military Actions by Andrew Bacevich

Virginia Supreme Court throws out challenge to Youngkin mask order

Bombshell Proof The ATTACK On Joe Rogan Is Politically Funded! This Is Deeper Than Spotify!

Boom: Rumble offers Joe Rogan $100M to leave Spotify…

And of course, the twat waffle who is Jonah Goldberg, is returning to his roots.

水滸傳
The Outlaws of the Marsh

Keep moving dirt

closer to the way

Training:
A1. Seated Arnold rotations x 20, 20, 20; rest :30
A2. Banded triceps press down 20, 20, 20; rest 1
B1. SA DB row x 10-12 reps x 3; @31X1 on the first 5 reps rest :10 secs b/t arms
B2. Snatch grip BTN press w/an empty bar x 15 x 3; rest 1
C1. Assisted pullups using barbell and feet in pullup cage x 6-8 x 3; rest :0
C2. DB push press 15, 15, 15; rest 1
D1. DB shrugs 30, 30, 30, 30; rest :30
D2. Banded upright row 25, 25, 25, 25; rest 90

5 sets of :30secs of work/:30 secs of rest
:30secs KBS – 2pd.
:30secs rest
:30 secs pushups
:30secs rest
:30 secs DB RDL – 55/h
:30secs rest
:30secs 24” box step-ups
:30secs rest

Today’s professional training covered Linux User Accounts and Groups along with Managing File Ownership and Permission. Then in network penetration we covered privilege using Sudo + about hour of training over at tryhackme.

Current Affairs:

The Media Outlets Demanding Joe Rogan’s Removal from Spotify Spread Far More Disinformation

Today in Syria 13 people killed, including six children and four women, during a SF pre-dawn raid targeting ISIS leader Abu Ibrahim al-Hashimi al-Qurayshi.

Johns Hopkins Study: Lockdowns Only Reduce Mortality by 0.2 Percent – good thing they didn’t announce this study on Rogan’s show.

Trudeau’s lies about Freedom Convoy/Canadian truckers show he’s just gaslighting the everyday working man

CORONAVIRUS — Majority of Canadians Now Want COVID Rules to End After Trucker Revolt — Massive 15 point swing in sentiment suggests trucker are not “fringe minority.”

Energy is similar to the bending of a crossbow; decision, to the releasing of a trigger. -- Sun Wu
Energy is similar to the bending of a crossbow; decision, to the releasing of a trigger.

Work more, talk less

this is the way

Warm-up – 10 mins of:
5 air squats
10 banded shoulder pass-throughs
15 banded good mornings
30 Shoulder ROT/stability – 10 to horizontally to the chest, 10 semi-vertically front/down to clavicles, 10 BTN, then…

7 sets of:
6 goblet reverse lunges per leg
3 goblet step-ups per leg
3 goblet squats
6 SA KB Press per arm
6 SA KB Row per arm
6 SA KB Swing per arm

Martial skill work

45 mins of JKD and Wing Chun striking + short-range kicking and counter wrestling

Today’s studies included:
Linux: working toward mastery of the CLI & searching and extracting data from files and archiving. I also focused my practical network penetration testing studies to privilege escalation in a Linux environment.

Bipartisan Congressional War Drums Are Beating Again

The GOAT calls it a career — Tom Brady officially announced he is retiring today.

Just Do Work

Get after it

Find it in you

Today I spent a few hours prepping for the Practical Network Penetration Testing certification.

Today’s course material focused on Reconnaissance. Topics included Passive Reconnaissance, Identifying the Target(s), Discovering Email Addresses, Gathering Breached Credentials with Breach-Parse, Hunting for Breached Credentials with DeHashed, Hunting Subdomains, Identifying Website Technologies, Overall Information Gathering with Burp Suite, Google Fu and everyone’s favorite Utilizing Social Media to find out about all of your friends and neighbors – should be highly informative.

But first! To get my mind right I was able to hit the gym again🤙🏽 — today’s training was:

Upper pressing and scapular stability work

A1. Strict shoulder press – 2 x 10 warm up sets with an empty bar
– then 15, 15, 15; rest 0

A2. Banded upright row 20, 20, 20; rest 0

A3. DB Shrugs 30, 30, 30; rest :90

B1. Strict DB press 15, 15, 15; rest 0

B2. Plate bus drivers 20, 20, 20; rest 0

B3. Front plate raises 20, 20, 20; rest 2

C1. Partial rear delt flies – bottom – 20, 20, 20; rest 0

C2. Full ROM rear delt flies 10, 10, 10; rest 0

C3. Partial laterals – top –5, 5, 5; – perfect controlled reps so you can feel the squeeze at the very top; rest 0

C4. Face pulls 20, 20, 20; rest :90

+

5 sets of:

:20sec AB pedal at 80% effort

15pushups

10 swings

-rest as necessary