The term "hacker" is often associated with illegal online activity. However, there are hackers who perform 100 percent legal services, which are based on evaluating the information infrastructures of companies. For those who hold the Certified Ethical Hacker certification from the EC-Council, there are several jobs to consider that come with attractive compensation. Some of the most common jobs for hackers holding the CEH certification include computer forensics, incidence response, penetration testing and security analysis. Penetration testing is the most common job for new hackers, but some later advance to become engineers or take on a wider variety of tasks.
TrainACE - IT and Cybersecurity Training Blog
The Most Common Jobs for People Who Hold the EC-Council Certified Ethical Hacker (CEH) Certification
[fa icon="calendar'] May 20, 2013 3:45:05 AM / by Ryan Corey posted in CEH, Cisco, Cybersecurity, EC-Council, Information Assurance, Pentesting, Ethical Hacking
Average Salaries of the Most Common Entry Level Information Technology (IT) Jobs
[fa icon="calendar'] May 15, 2013 5:15:08 AM / by Ryan Corey posted in Salary, CompTIA, Networking, Network+, A+
The Most Common Jobs for CISSP Certified Professionals
[fa icon="calendar'] May 13, 2013 5:15:03 AM / by Ryan Corey posted in Salary, Cisco, CISSP, Cybersecurity, Information Assurance, Jobs
A Certified Information System Security Professional (CISSP) is someone with considerable experience in information technology (IT) security fields who has also completed a rigorous exam to verify his or her qualifications. CISSP holders must also meet continuing education requirements to maintain their certification.
Introducing the Cisco ISR-AX
[fa icon="calendar'] May 3, 2013 11:40:22 AM / by Ryan Corey posted in CCNA, Cisco, Networking, Online Training
Two IT hosting trends, the central data center and the cloud, are changing Internet infrastructure requirements. Organizations are seeking to lower cost and complexity while better serving internal and external customers in diverse locations. As IT centralizes application hosting, Cisco has responded with the introduction of the Integrated Services Router with Application Experience or ISR-AX. ISR-AX combines a branch router, application optimization, and security and performance features in one box.
Why CompTIA A+ and Network+ Certification Training is Beneficial
[fa icon="calendar'] Mar 27, 2013 12:59:54 PM / by Ryan Corey posted in CompTIA, Systems Administration, Network+, Getting Started in IT, Network Administration, A+
Are you a recent graduate looking to enter into the IT world or maybe you are somebody that is considering a career change into a more in demand field? Are you someone who can think logically as well as creatively? More and more technology employers in the D.C., Maryland and Virginia area are looking for candidates that possess solid computer abilities as well as industry certifications.
PMP Online Training Comes to TrainACE
[fa icon="calendar'] Mar 25, 2013 2:58:23 PM / by Ryan Corey posted in Online Training, PMI, PMP, Project Management
TrainACE is proud to welcome Project Management Professional training to our extensive list of online course offerings! Learn PMP at your own speed with our new self-paced training.
Latest CompTIA A+ 800 Series Tests Pose New Challenges for Candidates
[fa icon="calendar'] Mar 21, 2013 11:16:36 AM / by Ryan Corey posted in CompTIA, Getting Started in IT, A+
In October, CompTIA announced the release of new tests, the 800 series, that will replace the 700-series exams that had been the basis of CompTIA’s A+ certification, the certification that covers entry-level technicians. The 700 series will remain in use through August 31, 2013. Until then, candidates can choose either series as a testing option for the A+ designation.
The Scoop on the New DIARMF Process
[fa icon="calendar'] Mar 5, 2013 4:02:09 PM / by Ryan Corey posted in Cisco, Cybersecurity, Information Assurance
The Department of Defense last changed its approach to cyber security, or, in DoD parlance, “Information Assurance,” in 2006, when Defense Information Technology Security Certification and Accreditation (DITSCAP) was replaced by Defense Information Assurance Certification and Accreditation Process (DIACAP). The small change in name, with “Technology Security” replaced by “Assurance,” said little about the reason for the change in system, but one intent of DIACAP was the promotion of consistency and standardization, all in the hope that cross-service reciprocity and cost savings would follow.
Operation Beebus Attacks Discovered by FireEye
[fa icon="calendar'] Feb 12, 2013 5:04:53 AM / by Ryan Corey posted in advanced persistent threat, Cisco, cyber war, Cybersecurity, Malware, Pentesting, Ethical Hacking
Researchers at security company FireEye have revealed an advanced persistent threat targeting the U.S. defense and aerospace industries and likely originating in China. Named Beebus after an early sample, the campaign's attacks come in continuous waves over time against strategically chosen individuals. According to an unnamed inside source, the Beebus campaign began in early 2012 when FireEye noticed suspicious activity on the systems of some its defense and aerospace clients. Of 261 discovered attacks, 123 targeted unmanned aerial vehicle or systems vendors. The most recent exploit used a Deloitte industry analysis report sent in a weaponized email. Researchers believe that the campaign has so far touched 214 servers with 60 unique IP addresses.
The Increased Role of Active Directory in the New MCSA Certification
[fa icon="calendar'] Feb 11, 2013 1:42:21 PM / by Ryan Corey posted in MCSA, Microsoft, Systems Administration, Network Administration
IT professionals preparing for the new MCSA certification will find a stronger emphasis on Active Directory. Microsoft Active Directory, or AD, is a database management system that can be replicated across logical network partitions called domains. The AD stores configuration information such as user login credentials and contains objects representing users, groups and computers. Administrators can group these objects into units according to business requirements and centrally manage them through group policy objects. They can also use AD to push software and desktop configuration updates to user systems. While AD has long been a central component of Windows Server, significant updates have expanded its role in the MCSA exams.
Skepticism Greets Increase in Cyber Command at the Pentagon
[fa icon="calendar'] Feb 6, 2013 2:45:41 AM / by Ryan Corey posted in Cisco, Cybersecurity
On January 27, the Washington Post reported that the Department of Defense plans to expand its “Cyber Command,” a force dedicated to defending U.S. computer systems, by a factor of five, from 900 to 4,900 members. Although a formal announcement had not been made, Pentagon sources indicated that an increase in numbers was not the only change on the agenda. The Cyber Command would also undergo a shift in focus, with the new structure adding acknowledged offensive capabilities to a command that had previously been characterized as exclusively defensive.
The Role the Cloud Plays in the New Microsoft MCSE Curriculum
[fa icon="calendar'] Feb 4, 2013 10:56:35 AM / by Ryan Corey posted in Cloud Computing, MCSE, Microsoft, Networking, Online Training, Systems Administration
Microsoft has retooled its MCSE certification for IT professionals to include a major focus on the cloud. The company made the changes in response to the growing movement of IT resources to cloud-based solutions. According to Microsoft-sponsored research, cloud computing may create 14 million jobs and generate 1.1 trillion in revenue by 2015. The new MCSE certificate holder is expected to have more comprehensive knowledge of both on-premises and cloud resource technologies.