TrainACE - IT and Cybersecurity Training Blog

Ryan Corey


Recent Posts

Recently Updated - Certified Ethical Hacker Exam Study Guide

[fa icon="calendar'] Apr 24, 2015 2:33:05 PM / by Ryan Corey posted in CEH, EC-Council, Ethical Hacking

[fa icon="comment"] 0 Comments

Our free Certified Ethical Hacker Exam Study Guide has been one of our most popular white paper and resources items on our website for years now. We wanted to keep everyone updated with the fact that we recently updated it

Read More [fa icon="long-arrow-right"]

Qi: The Future of Wireless Charging

[fa icon="calendar'] Sep 30, 2013 5:15:17 AM / by Ryan Corey posted in Cisco, Cybersecurity, wireless security

[fa icon="comment"] 0 Comments

You can do anything you want with a new smartphone. You can shoot HD video and edit it at the same time or play the latest games. The newest models feature quad-core processors, 2 GB of memory, and 1080p displays. Unfortunately, they also feature depressingly short battery life. You can head out the door with a fully charged phone and have a paperweight by lunchtime. However, one new wireless charging technology promises to make battery life irrelevant.

Read More [fa icon="long-arrow-right"]

Exploring Secure Email After The Silent Circle And Lavabit Shut Downs

[fa icon="calendar'] Sep 24, 2013 5:25:28 AM / by Ryan Corey posted in Cisco, cyber war, Cybersecurity, Information Assurance, Ethical Hacking

[fa icon="comment"] 0 Comments

Both Silent Circle and Lavabit recently shut down their encrypted email services. Lavabit was the first to take action following word that the United States government wanted data handed over that would violate customers' privacy. Ladar Levison, owner of Lavabit, said he faced the decision of complying with the government and betraying the American people or ending the email service he worked hard to build. He also said that he was legally unable to explain the events leading up to his decision due to recent laws passed by congress blocking his freedom of speech.

Read More [fa icon="long-arrow-right"]

What is Threat Intelligence?

[fa icon="calendar'] Sep 18, 2013 7:51:12 AM / by Ryan Corey posted in advanced persistent threat, Cisco, Cybersecurity, Information Assurance, threat intelligence, Ethical Hacking

[fa icon="comment"] 0 Comments

Across the country and around the world, cyber attackers continue to discover new and improved ways of wreaking havoc with company's business operations. Their nefarious activities are responsible for billions of dollars' worth of damages in intellectual property theft. While cyber security teams attempt to circumvent these onslaughts, increased technological advancements continue to speed up the time between perceived threat and actual intrusion. How can a business entity keep up?

Read More [fa icon="long-arrow-right"]

Spammed and Hacked: How Social Media Can Pose a Security Risk

[fa icon="calendar'] Aug 26, 2013 5:12:40 AM / by Ryan Corey posted in advanced persistent threat, CEH, Cisco, cyber war, Cybersecurity, Information Assurance, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.

Read More [fa icon="long-arrow-right"]

Look Out IT Job Seekers! Cyber Security is the Field to Join

[fa icon="calendar'] Aug 19, 2013 3:45:24 AM / by Ryan Corey posted in advanced persistent threat, Salary, CEH, Cisco, cyber war, Cybersecurity, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

As cyber attacks increase in frequency and scandals involving governments hacking into private computers become more commonplace, it's no wonder that one of the most promising fields in the current IT sector would be cyber security. In fact, recent research has indicated that cyber security has grown by more than one hundred percent in the last year. Clearly, anyone seeking a job in the information technology area would do well to start at the first line of defense against hackers.

Read More [fa icon="long-arrow-right"]

Hacked Cars and Hotel Rooms: Time to Rethink Security for a Technological Age

[fa icon="calendar'] Aug 6, 2013 4:02:44 AM / by Ryan Corey posted in advanced persistent threat, CEH, Cisco, cyber war, Cybersecurity, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

Criminals have been breaking into websites and electronic databases for many years. Although this can result in huge monetary losses, it rarely injures anyone or causes physical damage. However, hackers are gaining more destructive power as manufacturers add network interfaces and microprocessors to mechanical devices. This is a security threat that we cannot afford to ignore.

Read More [fa icon="long-arrow-right"]

The Ever-Essential Java Programming Language

[fa icon="calendar'] Jul 8, 2013 4:25:24 AM / by Ryan Corey posted in Uncategorized

[fa icon="comment"] 0 Comments

Through no fault of its own, the Java programming language, when it was first developed, failed to reach its intended goal. Sun Microsystems, then a leading maker of workstations, had in mind a language that would be adopted by cable companies for interactive TV. In 1991, however, the cable companies were not quite ready for what Sun had in mind.

Read More [fa icon="long-arrow-right"]

The Most Common Jobs for Cisco CCNP Certified Professionals

[fa icon="calendar'] Jun 24, 2013 1:27:26 PM / by Ryan Corey posted in Salary, CCNP, Cisco, Networking

[fa icon="comment"] 0 Comments

The economy might still be limping along, but the IT industry remains as healthy as ever. IT outsourcing companies have become popular in recent years, but larger companies from hospitals to manufacturers are also hiring for a continually growing workforce of in-house IT professionals. If anything, the high job demand present in the early '00s has increased since the 2008 recession. Networking, a distinct career path in IT, remains one of the main stays.

Read More [fa icon="long-arrow-right"]

The Most Common Jobs for Cisco CCNA Certified Professionals

[fa icon="calendar'] Jun 10, 2013 4:13:18 AM / by Ryan Corey posted in CCNA, Cisco, Jobs, Networking, Online Training

[fa icon="comment"] 0 Comments

Professionals who are certified through the Cisco CCNA program are qualified for a number of jobs in the technology field. The exams required for this certification demand that each candidate demonstrate an ability to install, configure, and operate a variety of networks, making these qualified individuals flexible workers. Successful CCNA graduates are able to troubleshoot systems, operate under a number of different protocols, and demolish threats to a network’s security. This is a broad range of skills, and the Cisco CCNA certification provides each professional with a comprehensive understanding of networks. These skills allow CCNA certificate-holders to tackle a number of technology-related occupations.

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802