Security. Simplicity. Skills.

From Bo Morgan
Helping anyone—from beginners to aspiring pros—learn Linux, networking, and cloud through clear tutorials and practical guidance. My goal is simple: teach what I learn, so you can level up your tech skills with confidence.


Bo Morgan Tech

Starting this week, we’re doing a weekly shoutout to some of the awesome comments we’ve been getting on our YouTube videos. To kick things off, here’s a collage featuring a few top comments from recent uploads. Appreciate all the support, keep ‘em coming!

4 months ago | [YT] | 0

Bo Morgan Tech

Be honest — what part of Linux still trips you up?

5 months ago | [YT] | 3

Bo Morgan Tech

Which of the following commands will display a list of all partitions on all disks?

6 months ago | [YT] | 0

Bo Morgan Tech

Which of the following commands can be used to view the runlevel of a Linux system using System V init?

6 months ago | [YT] | 0

Bo Morgan Tech

A security administrator notices that an employee's workstation is sending large amounts of outbound traffic to an unfamiliar IP address. After investigation, the administrator finds that the traffic is encrypted and being sent at regular intervals. Which of the following BEST describes this activity?

8 months ago | [YT] | 0

Bo Morgan Tech

A security analyst receives an alert indicating multiple failed login attempts on a corporate web application. Further investigation reveals the attempts are coming from a range of IP addresses within a short timeframe. Which of the following best describes this type of attack?

9 months ago | [YT] | 1

Bo Morgan Tech

A company has implemented a new security policy requiring employees to use multi-factor authentication (MFA) when logging into corporate systems. Which of the following best describes the factors used in MFA?

9 months ago | [YT] | 0

Bo Morgan Tech

A security administrator is reviewing access controls for a sensitive database. The administrator wants to ensure that users only have the minimum permissions necessary to perform their job functions. Which of the following principles should be applied?

9 months ago | [YT] | 1

Bo Morgan Tech

A retail company wants to enforce access control measures to ensure employees can only retrieve customer data necessary for their job roles. Which of the following access control models would BEST accomplish this?

9 months ago | [YT] | 0

Bo Morgan Tech

A security administrator needs to implement a control that prevents employees from accessing certain websites that are not related to work. Which of the following would be the BEST solution?

9 months ago | [YT] | 1