A CISA, or Certified Information Systems Auditor, certification is recognized by almost all employers across a large variety of industries. The CISA certification is best described as an all-inclusive information systems audit qualification. The certification requires an applicant to be knowledgeable about information technology and general aspects of business. While there are other IT audit certifications available, they don't have the same universal acceptance as CISA. Those who are CISA certified have illustrated their IT skills and their capability to tackle auditing tasks.
TrainACE - IT and Cybersecurity Training Blog
How to Get CISA Certified and why it's Worth It
[fa icon="calendar'] Aug 13, 2014 9:00:46 AM / by Jackie Somma posted in Uncategorized
Open SSL, Being Patched Again?!
[fa icon="calendar'] Jun 9, 2014 9:15:50 AM / by Christian Crank posted in Cisco, Cybersecurity, Ethical Hacking
So OpenSSL is being patched again, very shortly after the Heartbleed Bug was fixed. According to the OpenSSL Security Advisory, multiple security vulnerabilities affecting the security layer have been recently discovered. One of the security threats actually allowed an attacker to see and modify traffic between an OpenSSL server and the client. While this news might seem bad, finding these vulnerabilities indicate that OpenSSL is frequently monitored by security professionals, and the appropriate steps are being followed to patch these vulnerabilities. This in turn makes OpenSSL a more secure implementation of the protocols SSL/TLS (Secure Socket Layer/Transport Layer Security).
Using OpenSSL? Heartbleed Bug may be affecting you now.
[fa icon="calendar'] Apr 9, 2014 10:45:08 AM / by Christian Crank posted in Cybersecurity, encryption, Uncategorized
Security researchers have recently discovered a major vulnerability in widely used encryption software that could potentially cause widespread, severe damage to the private data of millions of people around the globe. OpenSSL is a cryptologic software that used by millions of websites throughout the internet to encrypt communications between users and webpages. That data now stands at risk due to the vulnerability, which obviously is causing major concern for end-users and website owners alike. More than a half a million websites are already currently at risk.
Ethical Hacking Tools and Techniques
[fa icon="calendar'] Apr 4, 2014 8:00:16 AM / by Alexandra Ducane posted in CEH, EC-Council, Ethical Hacking
Microsoft Windows Security Essentials
[fa icon="calendar'] Mar 27, 2014 6:15:24 AM / by Christian Crank posted in Cisco, Cybersecurity, Microsoft, Uncategorized
As the OS of choice for many businesses, Microsoft Windows houses the sensitive data of banks, hospitals and corporations. In fact, as one of the most prevalently used operating systems out there, malware authors have an affinity for attacking anything Windows—it’s their go-to playground. In order to properly defend Windows security, you’ll need to configure a lot more than just a firewall. You’ll need a myriad of tools, techniques and tricks to outsmart the bad guys and protect your Windows system. But no worries: our Microsoft Windows Security Essentials course will teach you just that.
Understanding the Role of Linux in Cybersecurity and Why It's so Critical
[fa icon="calendar'] Mar 24, 2014 9:28:11 AM / by Paul Ricketts posted in CompTIA, Cybersecurity, Linux+, Systems Administration, Network Administration
Updated Feb 2023.
Linux is a free, open-source operating system that has become increasingly popular in recent years. Used by many companies and organizations to power their networks and systems, Linux provides an excellent platform for secure computing, making it a great choice for those looking to improve their cybersecurity. This article, will discuss what Linux is, how it works, and how it can help with cybersecurity. We will also look at some of the security features that make Linux such a great choice for protecting your data from malicious actors.
Career with a Security+ Certification
[fa icon="calendar'] Mar 19, 2014 11:30:22 AM / by Paul Ricketts posted in CompTIA, Cybersecurity, Security+
While it is a good feeling simply to have achieved your Security+ Certification, the reality is clear that it is time to start your career and job search in the information technology (IT) field. With a boost to your self-esteem, knowing that you have a respected professional certification endorsed by such major companies as Microsoft, the U.S. Department of Defense and IBM, you can approach your job search with confidence and pride.
Security+ Training Prerequisites (2021)
[fa icon="calendar'] Mar 12, 2014 11:30:37 AM / by Paul Ricketts posted in CompTIA, Cybersecurity, Security+
(** Updated in May, 2021)
Security+ is the must-have certification for people seeking to get into a cybersecurity career. While there are competing certifications available, CompTIA Security+ is more widely considered the base-line qualification for security-based roles throughout the IT industry.
So, what do you need to know before taking the Security+ exam?
Security+ Exam Cost
[fa icon="calendar'] Mar 5, 2014 11:30:57 AM / by alan posted in CompTIA, Cybersecurity, Security+
The Security+ certificate provided by CompTia is something that major companies require for a wide variety of different vendors who work in the cyber security and tech sectors of their company. It doesn’t matter how much experience a worker has in these fields—if they don’t have this certificate they won’t be hired for a job in most cases. Therefore, if someone wants to work for the department of defense for any government or a United States defense contractor, they need to pass the test and obtain the CompTia Security+ certificate.
Protecting Mobile Devices
[fa icon="calendar'] Feb 26, 2014 1:21:56 PM / by Christian Crank posted in Cybersecurity
Name something that people carry everywhere, drop continuously and rely on to maintain relationships with others. Stumped? If you guessed mobile phones, you’re correct—they’re our most abused, loved and treasured devices—and with technology on the rise, more and more new high tech smartphones and tablets are being pushed onto the market faster than people can keep up with.
Security+ Practice Test
[fa icon="calendar'] Feb 19, 2014 11:30:42 AM / by alan posted in CompTIA, Cybersecurity, Security+
Certificate of Validity
The Security+ Practice Test is a well-known valuable asset within the IT Industry. A reason for obtaining such certification is to enhance your professional profile within the information technology industry. IT Security is growing at an increasing rate, meaning more jobs for those with proper credentials and qualifications. As a $60 billion industry with rapid growth, certification of authenticity will give your resume that extra boost in a demanding field.
Top 7 Tips for Ethical Hacking
[fa icon="calendar'] Feb 11, 2014 9:43:16 AM / by Max Fonrose posted in CEH, EC-Council, Ethical Hacking
Do you possess any of these traits? Enterprising. Investigative. Inquisitive. Curious. Methodical. Calculated. Patience. Does this sound like you? Do you get excited thinking about firewalls and encrypted websites? Are you interested in being one of the good guys that help stop criminal hackers? If you fit this description, you probably are an ethical hacker or you have what it takes to become one. Do you think you have the potential to be an effective ethical hacker?