Lab Notes — November 3 2025

Overview

Security+ prep day emphasizing infrastructure hardening, career path mapping, and threat modeling fundamentals. Conversations covered salary benchmarking for sysadmin and pentester roles, long-term certification trajectory, and foundational technical concepts like RTOS vulnerabilities and AES encryption standards.


1. Security+ Domain 1 — Architecture and Design

Topic: Real-Time Operating Systems (RTOS)

  • RTOS devices are often vulnerable due to limited patching and inability to install endpoint protection.
  • They’re less frequently targeted not because they’re secure, but because they’re isolated or specialized, e.g., embedded controllers and industrial firmware.
  • Security focus: segmentation, network isolation, and firmware validation.

2. Cryptography Review

  • Revisited AES-512 reference — clarified that AES officially supports 128, 192, 256-bit keys.
  • “AES-512” is a non-standard term sometimes used informally to describe extended custom implementations.
  • Reinforced importance of using FIPS-approved algorithms for compliance.

3. Sysadmin Practice — Git and File Management

Goal: streamline Markdown posting workflow to GitHub Pages.
Key commands reviewed:

git add .
git commit -m "Updated daily lab notes"
git push origin main

Added optional suffix automation:

rename 's/([0-9]{4}-[0-9]{2}-[0-9]{2})\.md/$1-post.md/' *.md

Ensures consistent file-naming convention for published logs.


4. Security+ Domain 5 — Governance, Risk, and Compliance

  • Reaffirmed difference between PaaS, SaaS, and IaaS services in context of Outlook .com and Microsoft 365.
  • Outlook .com = SaaS, since Microsoft manages both the app and infrastructure.
  • Reviewed data responsibility boundaries between vendor and user.

5. Certification Roadmap and Role Progression

  • Current trajectory: SysAdmin → Pentester (Red Team with Purple tint).
  • Short-term goal: Security+ completion.
  • Mid-term: CCNA, CySA+, and Pentest+.
  • Long-term: Red Team specialization with cloud and AI-security crossover.

Key Takeaways

  • RTOS vulnerabilities stem from limited patchability, not invulnerability.
  • AES-512 ≠ valid AES variant — stick to AES-256 for compliance.
  • Maintain version control consistency with automated renaming.
  • Understand shared-responsibility models in cloud contexts.
  • Keep certification path tied to evolving sysadmin-to-red-team roadmap.