TrainACE Learning Blog

Subscribe to our Blog

Recent Posts

Posts by Topic

see all

What's Next: Cybersecurity Predictions for 2018

Posted by Madeline Sita on Dec 28, 2017 12:18:56 PM

It's safe to say 2017 has been full of activity in the world of cybersecurity. What about 2018? Will there be an increase in cyber attacks? New and more sophisticated methods of attack? What about even more devastating data breach impacts? The answer is probably all of the above. There are countless predictions out there and we all THINK we have a hunch, but nevertheless it's hard to gage what will happen, until it happens. Here are three general predictions that I've gathered...

Read More

Topics: advanced security, cyber security, cybersecurity, information technology career, Security, cyber security certifications, IT Security

In Demand Information Security Jobs in 2016

Posted by Ariana Ciancio on Dec 3, 2015 11:44:44 AM

Another year has come and gone, and in just a few short weeks we will ring in 2016. This time of year, we tend to reflect on our successes and failures and create a plan for the new year ahead. What changes do you want to make in 2016? Today, I am going to inform you about something I can guarantee is not changing in 2016--- the rapidly growing demand for information security jobs.

Read More

Topics: advanced security, information security, information security jobs, jobs, Uncategorized

5 Cyber Security Guidelines for Vacationers

Posted by Ariana Ciancio on Jun 26, 2015 10:28:43 AM

It's that time of year...vacation season! Residents across the Washington, D.C. metro area are traveling to the many beaches and resorts just a day trip away! For most people, smart phones, tablets, and laptops play a huge role in everyday life, and even more so for those in the technology industry. Nonetheless, summer vacation is no excuse for travelers to neglect their cyber security. In fact, data thieves are more likely to strike when you are most relaxed and in places where people tend to let their guard down.

Read More

Topics: advanced security, cyber security, hacking, mobile security, Security

Microsoft Windows Security Essentials

Posted by Christian Crank on Mar 27, 2014 6:15:24 AM

As the OS of choice for many businesses, Microsoft Windows houses the sensitive data of banks, hospitals and corporations. In fact, as one of the most prevalently used operating systems out there, malware authors have an affinity for attacking anything Windows—it’s their go-to playground.  In order to properly defend Windows security, you’ll need to configure a lot more than just a firewall. You’ll need a myriad of tools, techniques and tricks to outsmart the bad guys and protect your Windows system. But no worries: our Microsoft Windows Security Essentials course will teach you just that.

Read More

Topics: advanced security, cyber security, Microsoft, Security, security training, Uncategorized

Linux Security

Posted by Christian Crank on Mar 24, 2014 9:28:11 AM

Security threats aren't limited to one operating system, so it’s imperative that the skill set of cyber security professionals isn't either. Therefore, mastery of Linux systems is crucial for any individual seeking to claim expertise within the field.

Read More

Topics: advanced security, cyber security, linux, Linux+, Online Training

Securing Web Applications

Posted by Christian Crank on Mar 18, 2014 4:50:13 PM

While the Internet is an integral part of most organizations today, this widely used public network is also the source of data theft, cyber stalking and many other dangerous threats. Navigating the web safely can be particularly difficult---many cannot identify a threat before it strikes.

Read More

Topics: advanced security, hacking, Security, web app hacking, web application security

What is SCADA: Decoding the Acronym

Posted by The TrainACE Team on Feb 4, 2014 9:00:53 AM

Supervisory control and data acquisition (SCADA) systems are a category of industrial control systems (ICSs) that have become indispensable in the operation of industrial plants, production facilities, security firms and public works over the past few decades. These computerized systems incorporate several different technologies into a central configuration for the purposes of monitoring, collecting and analyzing data through human-machine interfaces. SCADA systems are vital to the infrastructure of the country, and reliable professionals are required at all times to ensure the systems are operating correctly and efficiently and remain secure.

Read More

Topics: advanced security, cyber security, ics, industrial control systems, scada, scada security training, scada training, Security, security training, what is scada

Join Our Webinar on romanHunter, an Open Source Wireless Honeypot

Posted by Ryan Corey on Dec 2, 2013 9:45:32 AM

We have scheduled our next webinar. Its on romanHunter (ROuter MAN HUNTER). romanHunter is an open source wireless honeypot that has a number of tricks which can help you to bait and catch people attacking your network.

Read More

Topics: advanced security, cyber security, hacking, honey farm, honey net, honey pot, Security, wireless

Security & Hacking Vulnerabilities in Windows 8

Posted by The TrainACE Team on Nov 15, 2013 10:34:55 AM

When Windows 8 debuted, it brought along a completely new interface, updated platform, and transformed user experience.

Read More

Topics: advanced security, cyber security, hacking, hacking vulnerabilities, malware, Microsoft, Security, security vulnerabilities, Windows 8

What is Encryption & Why is it Important?

Posted by The TrainACE Team on Nov 7, 2013 9:00:57 AM

What is Encryption?

Read More

Topics: advanced security, certified encryption specialist, cyber security, cybersecurity, encrypted data, encryption, encryption specialist, encryption training, security, Security