TrainACE - IT and Cybersecurity Training Blog

Recently Updated - Certified Ethical Hacker Exam Study Guide

[fa icon="calendar'] Apr 24, 2015 2:33:05 PM / by Ryan Corey posted in CEH training, certified ethical hacker, Cisco

[fa icon="comment"] 0 Comments

Our free Certified Ethical Hacker Exam Study Guide has been one of our most popular white paper and resources items on our website for years now. We wanted to keep everyone updated with the fact that we recently updated it

Read More [fa icon="long-arrow-right"]

Our New Video!! Phishing with Meterpreter & Ettercap: A CEH Demo Lab

[fa icon="calendar'] Nov 25, 2013 2:01:29 PM / by Ryan Corey posted in ceh, CEH training, certified ethical hacker, ettercap, hacking, meterpreter, penetration testing, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

Christian R. Crank, a security researcher and instructor for us recently created this video on a phishing attack using Meterpreter and Ettercap. This is a lab that students perform in our Certified Ethical Hacker class. Enjoy!

Read More [fa icon="long-arrow-right"]

The Steps to Becoming a Penetration Tester

[fa icon="calendar'] Nov 22, 2013 9:35:26 AM / by The TrainACE Team posted in ceh, certified ethical hacker, ethical hacker, ethical hacking, how to become a penetration tester, Online Training, penetration tester, penetration testing, pentest, pentest training, Programming, Cisco

[fa icon="comment"] 0 Comments

According to statistics provided by GO-Gulf.com, the cost of cyber crime will top $100 billion this year. Cyber crime affects 18 victims per second for a total of around 556 million victims per year. Just recently, the FBI warned that cyber attacks have eclipsed domestic terrorism as the primary threat to U.S. security.

Read More [fa icon="long-arrow-right"]

CEH Training Materials

[fa icon="calendar'] Nov 6, 2013 11:01:33 AM / by alan posted in ceh, CEH training, certified ethical hacker, Uncategorized

[fa icon="comment"] 0 Comments

Being a certified ethical hacker is an in-demand career. While relatively new, the need for it can't be underestimated. These are the people who can beat unethical hackers, because they know the things those hackers know and can think like them. There are now classes around the world that will teach you to become a certified ethical hacker. Once you're certified, you can get a job with almost any company that uses technology that is prone to hacking. To become certified, however, you have to pass a certification exam at the end of your training course.

Read More [fa icon="long-arrow-right"]

CEH Training Study Guide

[fa icon="calendar'] Oct 30, 2013 11:30:34 AM / by alan posted in certification exam, certified ethical hacker, Uncategorized

[fa icon="comment"] 0 Comments

Certified Ethical Hackers (CEH) can be very beneficial for companies. By applying their training as hackers for the good of organizations, they can help test firewall systems as well as other network security features to find vulnerabilities. This knowledge can then be used to help people withstand real attacks from others with nefarious motives.

Read More [fa icon="long-arrow-right"]

Process Injection: A New CEH Lab Demo Video

[fa icon="calendar'] Oct 25, 2013 10:45:00 AM / by Katrina Lowe posted in advanced security, ceh, ceh certfication, certified ethical hacker, certified ethical hacker training, metasploit, cybersecurity

[fa icon="comment"] 0 Comments

Want an inside look at the new content we've added to our Certified Ethical Hacker (CEH) training course? Then make sure you check out our lab demonstration video on Process Injection using Metasploit Framework and Syringe! In the video, Christian Crank, Penetration Testing Subject Matter Expert from  TrainACE's Advanced Security branch, demonstrates how to use Metasploit Framework and Syringe to avoid IDS/IPS and antiviruses in order to successfully create a command shell. The video breaks down how to prevent a failed process injection in order to fight back against damaging malicious code using accessible tools that every certified ethical hacker can master.

Read More [fa icon="long-arrow-right"]

New Version of the ECSA / LPT (v5) Certification by EC-Council, Coming in 2014

[fa icon="calendar'] Oct 24, 2013 2:02:52 PM / by Ryan Corey posted in advanced ethical hacking, advanced penetration testing, advanced security, certified ethical hacker, EC-Council, ECSA certification, LPT certification, security training, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

EC-Council has just announced that a much overdue improvement and version upgrade to the ECSA / LPT curriculum will be coming to training centers (ours, of course, is the only one that matters) at the beginning of 2014.

Read More [fa icon="long-arrow-right"]

Spammed and Hacked: How Social Media Can Pose a Security Risk

[fa icon="calendar'] Aug 26, 2013 5:12:40 AM / by Ryan Corey posted in advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber war, hacking, information assurance, security training, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.

Read More [fa icon="long-arrow-right"]

Hacked Cars and Hotel Rooms: Time to Rethink Security for a Technological Age

[fa icon="calendar'] Aug 6, 2013 4:02:44 AM / by Ryan Corey posted in advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber war, hacking, penetration testing, security training, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

Criminals have been breaking into websites and electronic databases for many years. Although this can result in huge monetary losses, it rarely injures anyone or causes physical damage. However, hackers are gaining more destructive power as manufacturers add network interfaces and microprocessors to mechanical devices. This is a security threat that we cannot afford to ignore.

Read More [fa icon="long-arrow-right"]

A Video on What the CEH Certification Training with TrainACE will do for Your Career – Jobs, Salary, Facts and Figures

[fa icon="calendar'] May 30, 2013 9:43:12 AM / by Ryan Corey posted in advanced security, average salary, career change, ceh, CEH jobs, CEH training, certified ethical hacker, computer training, EC-Council, hacking, information assurance, information technology career, IT training, Online Training, penetration testing, security training, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

Most people who are looking in to taking the Certified Ethical Hacker (CEH) certification training with us want to know a few key points. The CEH certification is arguably the leading baseline penetration testing certification on the market. Our CEH training class prepares people for a career in the field by offering more hands-on training than any other competitor’s class out there. The class also has a pass rate on the certification exam OVER 99% (yes that’s correct, in the last year, about 550 people took the CEH with us and only 5 failed the exam).  As you probably know, we offer classroom based training as well as online options, both are extremely effective.

Read More [fa icon="long-arrow-right"]

Subscribe to our Blog

New call-to-action

Lists by Topic

see all

Posts by Topic

see all

Recent Posts