Saturday, May 22, 2021

Materi Microsoft Access : How to create filter and an advanced filter to field



How to filter by a field in Datasheet view

  1. Select the field you want to filter by, and then click Filter in the Sort & Filter group on the Home tab.
  2. In the menu that Access displays, clear the check box for Select All.
  3. Select the check box for each field value you want to view, and then click OK


How to filter by selection in Datasheet view
  1. Select the value or the portion of a value you want to use as the filter.
  2. In the Sort & Filter group on the Home tab, click Selection.
  3. In the menu Access displays, select the expression for the filter (Equals, Does Not Equal, or another filtering option).
  4. Click Toggle Filter to remove the filter from the table.

How to filter by form
  1. In the Sort & Filter group on the Home tab, click Advanced and then click Filter By Form.
  2. In the Filter by Form window, on the Look for tab, enter the value in the field or fields you want to use as the filter. 
  3. Click the Or tab to set up OR conditions. 
  4. In the Sort & Filter group, click Toggle Filter to apply the filter. Click Toggle Filter again to remove the filter.

How To create an advanced filter
  1. On the Home tab, in the Sort & Filter group, click Advanced,and then click Advanced Filter/Sort.
  2. In the Advanced Filter/Sort window, in the Field row in the grid, select the fields you want to use in the filter.
  3. In the Criteria row, specify the expression to use in the filter.
  4. In the Sort & Filter group, click Toggle Filter to apply the filter. Click Toggle Filter again to remove the filter.

Friday, May 21, 2021

Materi Sertifikasi : Ethical Hacking Associate (EHA) Certification Exam Objectives



The Ethical Hacking Associate certification demonstrates an individual’s knowledge in information security and network security, including the tools and methodologies of a malicious hacker, but in a lawful and legitimate manner. This credential certifies individuals at an entrylevel of network security discipline of ethical hacking from a vendorneutral perspective.

ETHICAL HACKING ASSOCIATE EXAM OBJECTIVES

A. Threat Analysis

  1. Apply procedural concepts necessary to identify attackers through threat modeling
  2. Interpret incoming and outgoing data to determine authorized and unauthorized usage
  3. Apply procedural concepts necessary to identify vulnerabilities in information systems
  4. Apply procedural concepts necessary to conduct risk assessments for networks and information-based systems
  5. Given a scenario, determine the appropriate encryption and decryption methods
  6. Apply procedural concepts necessary to find and contain malware and viruses

B. Auditing, Documentation, and Logs

  1. Interpret current laws and regulations to provide updates to organizational security policies
  2. Given a scenario, determine the appropriate method to assist with new software development and end user testing
  3. Troubleshoot various security products and systems to validate their functions

C. Operate, Maintain, and Install

  1. Given a s scenario, determine the appropriate method to implement security protocols and management for popular operating systems
  2. Given a scenario, determine how to defend against different types of attacks
  3. Apply procedural concepts necessary to configure security systems and validate the security

D. Infrastructure and Deployment

  1. Determine the appropriate method to conduct penetration tests to assess weaknesses and vulnerabilities
  2. Given a scenario, analyze network security breaches
  3. Apply procedural concepts necessary to conduct different types of social engineering

E. Identification, Authentication, and Authorization

  1. Apply procedural concepts necessary to identify different methods of identification, authentication and authorization
  2. Apply procedural concepts necessary to identify the appropriate placement of biometric devices

F. Cryptography

  1. Identify different types of cryptography
  2. Given a scenario, determine the appropriate cryptography

Learn more at: www.certiport.com/EC-Council.