TrainACE Learning Blog

Subscribe to our Blog

Recent Posts

Posts by Topic

see all

Ryan Corey

Recent Posts

Maryland’s Cyber Security Job Market is Growing Fast & In Danger??

Posted by Ryan Corey on Oct 21, 2015 3:09:55 PM

The cyber security job market globally is the fastest growing job market in the world currently. Where as IT was seen as the gem of job markets for many years (and it is still among the best), cyber security is outpacing it in growth by more than four times. Cyber security is outpacing the overall job market by more than twelve times. So yes, it’s the next wave of growth.

Read More

Topics: cyber security jobs, maryland, Cisco, cybersecurity

Recently Updated - Certified Ethical Hacker Exam Study Guide

Posted by Ryan Corey on Apr 24, 2015 2:33:05 PM

Our free Certified Ethical Hacker Exam Study Guide has been one of our most popular white paper and resources items on our website for years now. We wanted to keep everyone updated with the fact that we recently updated it

Read More

Topics: CEH training, certified ethical hacker, Cisco

Join Our Webinar on romanHunter, an Open Source Wireless Honeypot

Posted by Ryan Corey on Dec 2, 2013 9:45:32 AM

We have scheduled our next webinar. Its on romanHunter (ROuter MAN HUNTER). romanHunter is an open source wireless honeypot that has a number of tricks which can help you to bait and catch people attacking your network.

Read More

Topics: advanced security, hacking, wireless, Cisco, cybersecurity, honeynetting, honeypotting, honeyfarming

Our New Video!! Phishing with Meterpreter & Ettercap: A CEH Demo Lab

Posted by Ryan Corey on Nov 25, 2013 2:01:29 PM

Christian R. Crank, a security researcher and instructor for us recently created this video on a phishing attack using Meterpreter and Ettercap. This is a lab that students perform in our Certified Ethical Hacker class. Enjoy!

Read More

Topics: ceh, CEH training, certified ethical hacker, ettercap, hacking, meterpreter, penetration testing, Cisco, cybersecurity

New Version of the ECSA / LPT (v5) Certification by EC-Council, Coming in 2014

Posted by Ryan Corey on Oct 24, 2013 2:02:52 PM

EC-Council has just announced that a much overdue improvement and version upgrade to the ECSA / LPT curriculum will be coming to training centers (ours, of course, is the only one that matters) at the beginning of 2014.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced security, certified ethical hacker, EC-Council, ECSA certification, LPT certification, security training, Cisco, cybersecurity

The Top 5 Cyber Security Skill Sets for Northern Virginia's Tech Community in 2014

Posted by Ryan Corey on Oct 22, 2013 8:45:15 AM

Most people think of Silicon Valley as the tech capital of the world, but it's in northern Virginia nearly 3,000 miles away that many security firms and defense contractors operate. As of 2009, more than half of the world's Internet traffic passed through this region.

Read More

Topics: advanced penetration testing, advanced security, exploit development, malware analysis, mobile application security, mobile security, threat intelligence, Cisco

Qi: The Future of Wireless Charging

Posted by Ryan Corey on Sep 30, 2013 5:15:17 AM

You can do anything you want with a new smartphone. You can shoot HD video and edit it at the same time or play the latest games. The newest models feature quad-core processors, 2 GB of memory, and 1080p displays. Unfortunately, they also feature depressingly short battery life. You can head out the door with a fully charged phone and have a paperweight by lunchtime. However, one new wireless charging technology promises to make battery life irrelevant.

How It Works
The Qi wireless charging standard works by combining two sets of electromagnetic coils. One set of coils is located in the charging base and provides inductive power; the other set of coils is located inside the mobile device's battery.Instead of transmitting electricity, this system works by converting electricity inside the charging base into inductive power. Tiny fluctuations in its electromagnetic field can pass through a variety of materials including plastics and fabrics, and a receiver coil in the mobile device converts that inductive power back into usable electricity. Wireless charging completely eliminates the risk of an accidental shock, making inductive power the safest and easiest way to transfer electricity between two devices.

Current Uses
Personal hygiene manufacturers have actually used inductive charging for several decades. Sonicare and Oral-B electric toothbrushes have used wireless charging since the early '90s, and the technology is also prevalent in battery-operated trimmers and razors. Because inductive charging doesn't actually transmit electricity, there's no risk of a short in the bathroom.
The Wireless Power Consortium was founded in in December 2008, and more than 100 companies are now members. The first Qi standard was released in 2009 and provided light charging capabilities for small electronics like smartphones. While the WPC continues to work on extending the standard to more powerful devices, current transfer caps limit the technology to mobile devices.
Early Successes
With big names like Belkin, HTC, Energizer, Verizon Wireless, and Sony supporting the technology, Qi members bring multiple industries together. Restaurant chains and airports were among the earliest adopters of this technology. Starbucks has already installed wireless charging stations at 17 locations with plans for another 10. McDonald's also offers wireless charging at select locations.

Imagine sitting down to enjoy a burger or latte with friends. Your smartphone starts to beep, and you realize it's out of juice. Some restaurants already provide extra power outlets, but who wants to drag around an AC adapter all the time? With a Qi charging mat, you can simply place you phone down on the table and continue using it as normal.
LaGuardia's Delta Sky Club recently installed a number of chargers, and they'll soon become more popular than AC and USB outlets. When you sit down in an airport, you're already loaded with several bags, and you don't want to dig around for a charging cable. Wireless charging pads let you keep belongings neat and organized, and you'll have fewer opportunities to misplace your phone or wallet.

Future Possibilities
Big companies are getting behind this technology in record numbers, but individual consumers are also taking out their wallets and paying hundreds of dollars to upgrade their mobile devices. The Hustle bag is an Indiegogo project that has raised nearly twice its initial $35,000 goal. With three different sizes, the Hustle is perfect for both men and women. It includes an internal battery with a capacity of 4,250 mAh, which is powerful enough to fully recharge your smartphone several times.
When the Hustle's battery loses its charge, you can toss it on the charging station for a few hours and head back out. Unfortunately, the project does have one downside — early adopters will have to buy special batteries or cases for their phones because inductive charging doesn't work with standard lithium-ion batteries.
In the future, the Qi standard will extend to more power hungry applications. Five years from now, inductive power will recharge our laptops. The technology might even become powerful enough to keep electric cars topped off without plugging in. When that happens, the good old AC cord will go the way of the steam engine, VCR, and incandescent light bulb.


Get Wireless Hacking and Security Training Information

Read More

Topics: wireless security, Cisco, cybersecurity

Exploring Secure Email After The Silent Circle And Lavabit Shut Downs

Posted by Ryan Corey on Sep 24, 2013 5:25:28 AM

Both Silent Circle and Lavabit recently shut down their encrypted email services. Lavabit was the first to take action following word that the United States government wanted data handed over that would violate customers' privacy. Ladar Levison, owner of Lavabit, said he faced the decision of complying with the government and betraying the American people or ending the email service he worked hard to build. He also said that he was legally unable to explain the events leading up to his decision due to recent laws passed by congress blocking his freedom of speech.

Read More

Topics: advanced security, cyber war, hacking, information assurance, secure email, security training, Cisco, cybersecurity

What is Threat Intelligence?

Posted by Ryan Corey on Sep 18, 2013 7:51:12 AM

Across the country and around the world, cyber attackers continue to discover new and improved ways of wreaking havoc with company's business operations. Their nefarious activities are responsible for billions of dollars' worth of damages in intellectual property theft. While cyber security teams attempt to circumvent these onslaughts, increased technological advancements continue to speed up the time between perceived threat and actual intrusion. How can a business entity keep up?

Read More

Topics: advanced persistent threat, advanced security, hacking, information assurance, security training, threat intelligence, Cisco, cybersecurity

The Cyber Education Symposium in Arlington, VA

Posted by Ryan Corey on Sep 6, 2013 3:39:31 AM

If you haven't heard the Cyber Education Symposium has been announced and will be held in Arlington, VA on 11/19 - 11/20/13.  The event is going to be held at the Hyatt Regency Crystal City at Reagan National Airport, the address is:

Read More

Topics: advanced security, information assurance, security training, Cisco, cybersecurity