Erich Winkler
Subscribe
Sign in
Home
Notes
Chat
Quiz Hub 📝
Buy Me a Coffee ☕️
Certification Hub 📚
Archive
About
Latest
Top
Discussions
Access Controls: Who Gets the Keys?
There are many ways to decide who gets access to what. But once you make those decisions, a tougher question comes up: how do I enforce the rules you I…
7 hrs ago
•
Erich Winkler
1
Share this post
Erich Winkler
Access Controls: Who Gets the Keys?
Copy link
Facebook
Email
Notes
More
July 2025
Cybersecurity Controls from Zero to Hero
There are hundreds of ways to protect your assets, but without a clear way to categorize them, it all gets confusing very quickly. If you're serious…
Jul 28
•
Erich Winkler
13
Share this post
Erich Winkler
Cybersecurity Controls from Zero to Hero
Copy link
Facebook
Email
Notes
More
2
Security Policies, Standards, and Procedures: The Boring Stuff That Actually Saves You
Sometimes the boring stuff you avoid the most is exactly what saves you. Boring doesn’t mean useless. Serious about cybersecurity? Read this!
Jul 21
•
Erich Winkler
17
Share this post
Erich Winkler
Security Policies, Standards, and Procedures: The Boring Stuff That Actually Saves You
Copy link
Facebook
Email
Notes
More
7
What does CEO have to do with cybersecurity, and who CPO even is?
Week 3 of my CISSP journey just finished and it’s time for me to sum it up. I moved from basic terms such as vulnerability or threat to roles and their…
Jul 14
•
Erich Winkler
8
Share this post
Erich Winkler
What does CEO have to do with cybersecurity, and who CPO even is?
Copy link
Facebook
Email
Notes
More
3
Week 3 of My CISSP Journey: From Motivation to Discipline
Three weeks into my CISSP prep, the honeymoon phase is over — and the real grind begins. In this post, I reflect on what’s working, what’s hard, and the…
Jul 11
•
Erich Winkler
8
Share this post
Erich Winkler
Week 3 of My CISSP Journey: From Motivation to Discipline
Copy link
Facebook
Email
Notes
More
Threat ≠ Risk ≠ Vulnerability: Why CISSP Basics Matter More Than You Think
In my first week of CISSP prep, I went back to the basics, simply because I know how easily they’re misunderstood. This post is about the four terms…
Jul 7
•
Erich Winkler
9
Share this post
Erich Winkler
Threat ≠ Risk ≠ Vulnerability: Why CISSP Basics Matter More Than You Think
Copy link
Facebook
Email
Notes
More
June 2025
My First Week of CISSP Prep – What I’ve Learned So Far
I’ve survived my first week of CISSP prep. What did I learn? Before diving into the domains, I had to revisit the one concept everything else builds on…
Jun 30
•
Erich Winkler
3
Share this post
Erich Winkler
My First Week of CISSP Prep – What I’ve Learned So Far
Copy link
Facebook
Email
Notes
More
My CISSP Journey Begins – Why I’m Doing This and What You Can Expect
I’ve officially started my journey to become CISSP-certified and I’m going all in. What does it mean? It means 3 months of focused and structured…
Jun 26
•
Erich Winkler
5
Share this post
Erich Winkler
My CISSP Journey Begins – Why I’m Doing This and What You Can Expect
Copy link
Facebook
Email
Notes
More
1
May 2025
Certification Authorities (CAs): What is it and why do we need it?
Let’s find out what is the role of certification authorities in today’s world and why their are crucial for us.
May 10
•
Erich Winkler
1
Share this post
Erich Winkler
Certification Authorities (CAs): What is it and why do we need it?
Copy link
Facebook
Email
Notes
More
3 reasons why you should always use 2FA
Ever wondered why your bank asks for more than just a password? The reason is simple, in today’s world, a password alone just isn’t enough.
May 2
•
Erich Winkler
1
Share this post
Erich Winkler
3 reasons why you should always use 2FA
Copy link
Facebook
Email
Notes
More
How phishing works in 5 steps
List of things that not only Cybersecurity specialist should know about fishing.
May 1
•
Erich Winkler
2
Share this post
Erich Winkler
How phishing works in 5 steps
Copy link
Facebook
Email
Notes
More
April 2025
Introduction to the TCP/IP Model
Let’s take a look at TCP/IP model that powers the internet as we know it! Discover why understanding it is essential for every cybersecurity and IT…
Apr 26
•
Erich Winkler
2
Share this post
Erich Winkler
Introduction to the TCP/IP Model
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts