July 3, 2023, 6:35 p.m. | /u/StupidSecQuestions

cybersecurity www.reddit.com

I'm trying to gauge how perfectionistic I am about learning certain topics. I studied kerberos in detail to understand delegation attacks few days ago and I'm already not sure about the steps in normal auth process. By "in detail" I mean what does each message contain and why, things like time to live, secret keys, timestamps etc.

attacks auth cybersecurity kerberos pen process topics understand

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Security Engineer II- Full stack Java with React

@ JPMorgan Chase & Co. | Hyderabad, Telangana, India

Cybersecurity SecOps

@ GFT Technologies | Mexico City, MX, 11850

Senior Information Security Advisor

@ Sun Life | Sun Life Toronto One York

Contract Special Security Officer (CSSO) - Top Secret Clearance

@ SpaceX | Hawthorne, CA

Early Career Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts