Tags
Owner
Zach
Verification
- Cornell Method:
- Example 1:
- Example 2:
sqlCopy code
| Topic | Details | Summary |
|-------|-------------------------------------------------|-------------------------------------|
| OSI | Layered network model | Helps in understanding networking |
| Model | 1. Physical | 7 layers, each with specific roles |
| | 2. Data Link | |
cssCopy code
| Topic | Details | Summary |
|---------------------|-------------------------------------------------|-------------------------------------|
| Cybersecurity Threats | Types of threats: | Identifying common threats |
| | 1. Malware | Protecting against malware |
| | 2. Social Engineering | Understanding attack methods |