TrainACE Learning Blog

Subscribe to our Blog

Recent Posts

Posts by Topic

see all

Christian Crank

Recent Posts

Website Security Best Practices

Posted by Christian Crank on Jun 17, 2014 8:17:55 AM

As corporations get larger and need to expand their marketing efforts, many organizations look towards the Internet. With millions of people online all at one time, it seems like the marketing capability is endless. But with the internet, things can get real messy, real fast. Malicious “hackers and crackers” are out there, looking for weak security holes and infrastructures to steal information from or to take over. Of course, this has gotten harder to do over the years, but there are still many that try.

Read More

Topics: cyber, cyber security, Uncategorized, web, web application security, web security, webpage

Open SSL, Being Patched Again?!

Posted by Christian Crank on Jun 9, 2014 9:15:50 AM

So OpenSSL is being patched again, very shortly after the Heartbleed Bug was fixed. According to the OpenSSL Security Advisory, multiple security vulnerabilities affecting the security layer have been recently discovered. One of the security threats actually allowed an attacker to see and modify traffic between an OpenSSL server and the client. While this news might seem bad, finding these vulnerabilities indicate that OpenSSL is frequently monitored by security professionals, and the appropriate steps are being followed to patch these vulnerabilities. This in turn makes OpenSSL a more secure implementation of the protocols SSL/TLS (Secure Socket Layer/Transport Layer Security).

Read More

Topics: cyber, hacking, hacking vulnerabilities, openssl, security, Security, vulnerability

Is TrueCrypt now unsafe?

Posted by Christian Crank on May 29, 2014 1:46:10 PM

Do you use TrueCrypt? You might not want to now. It seems as though the main SourceForge page for TrueCrypt has been defaced, though it might just be legitimate. How do I know? The first line on the page reads as follows: "WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues." While many people thought it was a hoax or that TrueCrypt got hacked, the newest application that was pushed out only allows you to decrypt and migrate data, not encrypt data, was signed with the TrueCrypt private key, ensuring its legitimacy.

Read More

Topics: cyber security, encryption, networking, truecrypt, Uncategorized

Computer Forensics Evidence Collection

Posted by Christian Crank on Apr 16, 2014 5:00:53 AM

Do you understand the impact of digital technology on business? Once stored entirely on paper, business information, business accounts and business activities are now pretty much all in digital form. While this makes the organization and management of company information easier, the move to all things digital also poses a huge threat to businesses. Now more than ever, hackers have easier access to sensitive business information, and they can gain a hold of it within minutes. What results is a real-life digital crime scene, but unlike a “physical” crime scene, retracing digital steps can be extremely tricky. This where Computer Forensics Analysts are called in: they are responsible for decoding a digital crime scene, piecing together digital forensics information to solve a mystery.

Read More

Topics: Uncategorized

Using OpenSSL? Heartbleed Bug may be affecting you now.

Posted by Christian Crank on Apr 9, 2014 10:45:08 AM

Security researchers have recently discovered a major vulnerability in widely used encryption software that could potentially cause widespread, severe damage to the private data of millions of people around the globe. OpenSSL is a cryptologic software that used by millions of websites throughout the internet to encrypt communications between users and webpages. That data now stands at risk due to the vulnerability, which obviously is causing major concern for end-users and website owners alike. More than a half a million websites are already currently at risk.

Read More

Topics: cyber, cyber security, encryption, openssl, security, Uncategorized, vulnerability

Network Security Fundamentals

Posted by Christian Crank on Apr 9, 2014 3:00:23 AM

Need a refresher on the basics of network security? Our Self-Paced Online Network Security Fundamentals training can help. Split into two separate classes that can be taken together or independently, you’ll learn how handle security threats and all about the tools that protect and defend computer networks.

Read More

Topics: Uncategorized

Ethical Hacking Tools and Techniques

Posted by Christian Crank on Apr 4, 2014 8:00:16 AM

Are you a fan of hacking? Do you love breaking down firewalls? Have you been attacked and want to understand the knowledge yourself? Want to break into systems without getting penalized for it? If you answered yes to any of the above questions, our Online Ethical Hacking Methods training is for you.

Read More

Topics: Uncategorized

Microsoft Windows Security Essentials

Posted by Christian Crank on Mar 27, 2014 6:15:24 AM

As the OS of choice for many businesses, Microsoft Windows houses the sensitive data of banks, hospitals and corporations. In fact, as one of the most prevalently used operating systems out there, malware authors have an affinity for attacking anything Windows—it’s their go-to playground.  In order to properly defend Windows security, you’ll need to configure a lot more than just a firewall. You’ll need a myriad of tools, techniques and tricks to outsmart the bad guys and protect your Windows system. But no worries: our Microsoft Windows Security Essentials course will teach you just that.

Read More

Topics: advanced security, cyber security, Microsoft, Security, security training, Uncategorized

Linux Security

Posted by Christian Crank on Mar 24, 2014 9:28:11 AM

Security threats aren't limited to one operating system, so it’s imperative that the skill set of cyber security professionals isn't either. Therefore, mastery of Linux systems is crucial for any individual seeking to claim expertise within the field.

Read More

Topics: advanced security, cyber security, linux, Linux+, Online Training

Securing Web Applications

Posted by Christian Crank on Mar 18, 2014 4:50:13 PM

While the Internet is an integral part of most organizations today, this widely used public network is also the source of data theft, cyber stalking and many other dangerous threats. Navigating the web safely can be particularly difficult---many cannot identify a threat before it strikes.

Read More

Topics: advanced security, hacking, Security, web app hacking, web application security