TrainACE - IT and Cybersecurity Training Blog

What's Next: Cybersecurity Predictions for 2018

[fa icon="calendar'] Dec 28, 2017 12:18:56 PM / by Madeline Sita posted in cybersecurity, information technology career, IT Security, advanced security, cyber security certifications, Cisco

[fa icon="comment"] 0 Comments

It's safe to say 2017 has been full of activity in the world of cybersecurity. What about 2018? Will there be an increase in cyber attacks? New and more sophisticated methods of attack? What about even more devastating data breach impacts? The answer is probably all of the above. There are countless predictions out there and we all THINK we have a hunch, but nevertheless it's hard to gage what will happen, until it happens. Here are three general predictions that I've gathered...

Read More [fa icon="long-arrow-right"]

In Demand Information Security Jobs in 2016

[fa icon="calendar'] Dec 3, 2015 11:44:44 AM / by Ariana Ciancio posted in advanced security, information security, information security jobs, jobs, Uncategorized

[fa icon="comment"] 0 Comments

Another year has come and gone, and in just a few short weeks we will ring in 2016. This time of year, we tend to reflect on our successes and failures and create a plan for the new year ahead. What changes do you want to make in 2016? Today, I am going to inform you about something I can guarantee is not changing in 2016--- the rapidly growing demand for information security jobs.

Read More [fa icon="long-arrow-right"]

5 Cyber Security Guidelines for Vacationers

[fa icon="calendar'] Jun 26, 2015 10:28:43 AM / by Ariana Ciancio posted in advanced security, hacking, mobile security, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

It's that time of year...vacation season! Residents across the Washington, D.C. metro area are traveling to the many beaches and resorts just a day trip away! For most people, smart phones, tablets, and laptops play a huge role in everyday life, and even more so for those in the technology industry. Nonetheless, summer vacation is no excuse for travelers to neglect their cyber security. In fact, data thieves are more likely to strike when you are most relaxed and in places where people tend to let their guard down.

Read More [fa icon="long-arrow-right"]

Microsoft Windows Security Essentials

[fa icon="calendar'] Mar 27, 2014 6:15:24 AM / by Christian Crank posted in advanced security, Microsoft, security training, Uncategorized, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

As the OS of choice for many businesses, Microsoft Windows houses the sensitive data of banks, hospitals and corporations. In fact, as one of the most prevalently used operating systems out there, malware authors have an affinity for attacking anything Windows—it’s their go-to playground.  In order to properly defend Windows security, you’ll need to configure a lot more than just a firewall. You’ll need a myriad of tools, techniques and tricks to outsmart the bad guys and protect your Windows system. But no worries: our Microsoft Windows Security Essentials course will teach you just that.

Read More [fa icon="long-arrow-right"]

Linux Security

[fa icon="calendar'] Mar 24, 2014 9:28:11 AM / by Christian Crank posted in advanced security, linux, Linux+, Online Training, cybersecurity

[fa icon="comment"] 0 Comments

Security threats aren't limited to one operating system, so it’s imperative that the skill set of cyber security professionals isn't either. Therefore, mastery of Linux systems is crucial for any individual seeking to claim expertise within the field.

Read More [fa icon="long-arrow-right"]

Securing Web Applications

[fa icon="calendar'] Mar 18, 2014 4:50:13 PM / by Christian Crank posted in advanced security, hacking, web app hacking, web application security, Cisco

[fa icon="comment"] 0 Comments

While the Internet is an integral part of most organizations today, this widely used public network is also the source of data theft, cyber stalking and many other dangerous threats. Navigating the web safely can be particularly difficult---many cannot identify a threat before it strikes.

Read More [fa icon="long-arrow-right"]

What is SCADA: Decoding the Acronym

[fa icon="calendar'] Feb 4, 2014 9:00:53 AM / by The TrainACE Team posted in advanced security, ics, industrial control systems, scada, scada training, security training, Cisco, cybersecurity

[fa icon="comment"] 1 Comment

Supervisory control and data acquisition (SCADA) systems are a category of industrial control systems (ICSs) that have become indispensable in the operation of industrial plants, production facilities, security firms and public works over the past few decades. These computerized systems incorporate several different technologies into a central configuration for the purposes of monitoring, collecting and analyzing data through human-machine interfaces. SCADA systems are vital to the infrastructure of the country, and reliable professionals are required at all times to ensure the systems are operating correctly and efficiently and remain secure.

Read More [fa icon="long-arrow-right"]

Join Our Webinar on romanHunter, an Open Source Wireless Honeypot

[fa icon="calendar'] Dec 2, 2013 9:45:32 AM / by Ryan Corey posted in advanced security, hacking, wireless, Cisco, cybersecurity, honeynetting, honeypotting, honeyfarming

[fa icon="comment"] 0 Comments

We have scheduled our next webinar. Its on romanHunter (ROuter MAN HUNTER). romanHunter is an open source wireless honeypot that has a number of tricks which can help you to bait and catch people attacking your network.

Read More [fa icon="long-arrow-right"]

Security & Hacking Vulnerabilities in Windows 8

[fa icon="calendar'] Nov 15, 2013 10:34:55 AM / by The TrainACE Team posted in advanced security, hacking, hacking vulnerabilities, malware, Microsoft, security vulnerabilities, Windows 8, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

When Windows 8 debuted, it brought along a completely new interface, updated platform, and transformed user experience.

Read More [fa icon="long-arrow-right"]

What is Encryption & Why is it Important?

[fa icon="calendar'] Nov 7, 2013 9:00:57 AM / by The TrainACE Team posted in advanced security, certified encryption specialist, cybersecurity, encrypted data, encryption, encryption specialist, encryption training, security, Cisco

[fa icon="comment"] 0 Comments

What is Encryption?

Read More [fa icon="long-arrow-right"]

Subscribe to our Blog

New call-to-action

Lists by Topic

see all

Posts by Topic

see all

Recent Posts