TrainACE Learning Blog

Subscribe to our Blog

Recent Posts

Posts by Topic

see all

New Version of the ECSA / LPT (v5) Certification by EC-Council, Coming in 2014

Posted by Ryan Corey on Oct 24, 2013 2:02:52 PM

EC-Council has just announced that a much overdue improvement and version upgrade to the ECSA / LPT curriculum will be coming to training centers (ours, of course, is the only one that matters) at the beginning of 2014.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced security, certified ethical hacker, EC-Council, ECSA certification, LPT certification, security training, Cisco, cybersecurity

Spammed and Hacked: How Social Media Can Pose a Security Risk

Posted by Ryan Corey on Aug 26, 2013 5:12:40 AM

Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber war, hacking, information assurance, security training, Cisco, cybersecurity

Look Out IT Job Seekers! Cyber Security is the Field to Join

Posted by Ryan Corey on Aug 19, 2013 3:45:24 AM

As cyber attacks increase in frequency and scandals involving governments hacking into private computers become more commonplace, it's no wonder that one of the most promising fields in the current IT sector would be cyber security. In fact, recent research has indicated that cyber security has grown by more than one hundred percent in the last year. Clearly, anyone seeking a job in the information technology area would do well to start at the first line of defense against hackers.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, average salary, cyber war, hacking, security training, Cisco, cybersecurity

Hacked Cars and Hotel Rooms: Time to Rethink Security for a Technological Age

Posted by Ryan Corey on Aug 6, 2013 4:02:44 AM

Criminals have been breaking into websites and electronic databases for many years. Although this can result in huge monetary losses, it rarely injures anyone or causes physical damage. However, hackers are gaining more destructive power as manufacturers add network interfaces and microprocessors to mechanical devices. This is a security threat that we cannot afford to ignore.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber war, hacking, penetration testing, security training, Cisco, cybersecurity

The Most Common Jobs for People Who Hold the EC-Council Certified Ethical Hacker (CEH) Certification

Posted by Ryan Corey on May 20, 2013 3:45:05 AM

The term "hacker" is often associated with illegal online activity. However, there are hackers who perform 100 percent legal services, which are based on evaluating the information infrastructures of companies. For those who hold the Certified Ethical Hacker certification from the EC-Council, there are several jobs to consider that come with attractive compensation. Some of the most common jobs for hackers holding the CEH certification include computer forensics, incidence response, penetration testing and security analysis. Penetration testing is the most common job for new hackers, but some later advance to become engineers or take on a wider variety of tasks.

Read More

Topics: advanced ethical hacking, advanced penetration testing, certified ethical hacker, EC-Council, hacking, information assurance, IT training, security training, Cisco, cybersecurity

Introducing the FREE CEH Study Guide

Posted by Ryan Corey on May 10, 2013 11:03:30 AM

The Certified Ethical Hacker (CEH) certification has become the benchmark for penetration testing certifications. From 2007-2011it became all the rage among the community. More and more hackers fled to the scene and started their careers off by passing the coveted CEH certification exam. There is no question that the CEH is still a highly sought after certification (especially because it was added to the DoD 8570 Directive), but its place in the field has changed. Before, the CEH was a symbol of hacking prowess, dignity, strength, wisdom, reverance, veneration, amazement (OK thats enough)...  Now, it holds its spot firmly as the preeminent baseline or entry-level hacking / penetration testing certification.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber war, EC-Council, exploit development, hacking, information assurance, security training, threat intelligence, Cisco, cybersecurity, honeynetting, honeypotting, honeyfarming

What is Advanced Persistent Threat

Posted by Ryan Corey on Dec 11, 2012 11:25:45 AM

The term advanced persistent threat (APT) was originally used to describe complex, ongoing espionage perpetrated by foreign governments. However, today, APT typically refers to a category of cybercrime directed toward businesses or government entities. APTs are usually online attacks used to achieve goals beyond those that can be met by a single security breach, but some may involve malicious activity conducted onsite. Compromised computer systems are continuously monitored by the attackers or added to a stable of slave computers to be used to achieve some future goal. APTs are most often perpetrated by employing some form of malware, and IT technicians defend against APTs by installing antimalware software and hardware firewalls.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, cyber war, hacking, information assurance, security training, Cisco, cybersecurity