From f7df0acc90f4d7f454ad9884c0edb5b73a83ffb9 Mon Sep 17 00:00:00 2001 From: Gertscc <167881368+Gertscc@users.noreply.github.com> Date: Wed, 8 Jan 2025 06:06:14 +0100 Subject: [PATCH] fix: remove unrelated content Deleted content which had nothing to do with this topic. --- .../cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md b/src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md index 44e2a0d13..5a7d7aa1c 100644 --- a/src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md +++ b/src/data/roadmaps/cyber-security/content/cism@s86x24SHPEbbOB9lYNU-w.md @@ -2,9 +2,7 @@ The Certified Information Security Manager (CISM) is an advanced cybersecurity certification offered by ISACA that focuses on information security management. It is designed for professionals who have a strong understanding of information security and are responsible for overseeing, designing, and managing an organization's information security programs. -Common ports are standardized communication endpoints used by various network protocols and services. In cybersecurity, understanding these ports is crucial for configuring firewalls, detecting potential threats, and managing network traffic. Some widely used ports include 80 and 443 for HTTP and HTTPS web traffic, 22 for SSH secure remote access, 25 for SMTP email transmission, and 53 for DNS name resolution. FTP typically uses port 21 for control and 20 for data transfer, while ports 137-139 and 445 are associated with SMB file sharing. Database services often use specific ports, such as 3306 for MySQL and 1433 for Microsoft SQL Server. Cybersecurity professionals must be familiar with these common ports and their expected behaviors to effectively monitor network activities, identify anomalies, and secure systems against potential attacks targeting specific services. - Learn more from the following resources: - [@official@CISM Website](https://www.isaca.org/credentialing/cism) -- [@article@Certified Information Security Manager (CISM)](https://www.techtarget.com/searchsecurity/definition/certified-information-security-manager-CISM) \ No newline at end of file +- [@article@Certified Information Security Manager (CISM)](https://www.techtarget.com/searchsecurity/definition/certified-information-security-manager-CISM)