• Call: (301) 220 2802
  • Email: info@trainace.com

TrainACE - IT and Cybersecurity Training Blog

Cyber Monday Online Shopping Tips

[fa icon="calendar'] Nov 25, 2015 2:46:46 PM / by Ariana Ciancio posted in Cisco

[fa icon="comment"] 0 Comments

Black Friday and Cyber Monday are fast approaching this year. With so many shops rolling out amazing Black Friday deals online and then offering even more deals on Cyber Monday, many people don't even need to leave their house to do their Christmas shopping anymore. If you are one of the thousands of people trying to save yourself the headache of fighting the masses this year, you'll want to take some extra precautions to make sure your credit card and bank account information stay safe this holiday shopping season. Below are seven tips to help you guard yourself against scams and too-good-to-be-true offers.

1. Be Aware of Fake Emails

Read More [fa icon="long-arrow-right"]

Career Outlook with a CISSP Certification in DC, Maryland and Virginia

[fa icon="calendar'] Nov 18, 2015 11:23:48 AM / by Ariana Ciancio posted in Cisco, CISSP

[fa icon="comment"] 0 Comments

Do you want to validate your years of experience in information security, prove your technical knowledge and skills to develop a security program, and set yourself apart in your job search? The CISSP certification will do just that.

Read More [fa icon="long-arrow-right"]

Information Security Certification Path After Security+

[fa icon="calendar'] Sep 29, 2015 11:41:39 AM / by Ariana Ciancio posted in CASP+, CEH, Cisco, CISSP, CompTIA, Cybersecurity, EC-Council, Security+

[fa icon="comment"] 0 Comments


As an entry-level certification for information security jobs, Security+ will get your foot in the door for a promising career. But why stop there? If you are looking to advance your information security career, you should treat the Security+ certification as just a first step on the job path. In order to be more marketable as an experienced security professional as well as more valuable to current employers, consider advancing your proficiency in information security with additional training and certifications! The following options will validate your further expertise of information security and can increase the chances of promotion opportunities and salary increases! If information security is an industry worth pursuing to you, then keep reading to learn how to make the most out of your career!

Read More [fa icon="long-arrow-right"]

What is Big Data and Why is It So Important?

[fa icon="calendar'] Sep 24, 2014 9:05:23 AM / by The TrainACE Team posted in big data, Cisco

[fa icon="comment"] 0 Comments

Big data consists of immense pools of information that can be analyzed to unlock patterns---all for the purpose of making better decisions. This data is the basis for growth and competition for companies. On a macro scale, it can enhance and create value for the world economy. The direct result is that the quality of services and products will increase. Until recently, the immense volume of data flooding the world excited a select few. Now however, big data is now at an inflection point where it is economically relevant for government agencies, business and consumers to mine this data for insights. The reality of big data is very similar to former IT investment trends as well as innovation and its apparent impact on productivity. In short, those who supply big data are expected to have as much impact on productivity as those who supply other kinds of technology. Additionally, these companies must make sure their employees complete comprehensive big data training to prevent the mishandling of highly sensitive information.

Read More [fa icon="long-arrow-right"]

Open SSL, Being Patched Again?!

[fa icon="calendar'] Jun 9, 2014 9:15:50 AM / by Christian Crank posted in Cisco, Cybersecurity, Ethical Hacking

[fa icon="comment"] 1 Comment

TrainACE Blog - Open SSL Patched

 

So OpenSSL is being patched again, very shortly after the Heartbleed Bug was fixed. According to the OpenSSL Security Advisory, multiple security vulnerabilities affecting the security layer have been recently discovered. One of the security threats actually allowed an attacker to see and modify traffic between an OpenSSL server and the client. While this news might seem bad, finding these vulnerabilities indicate that OpenSSL is frequently monitored by security professionals, and the appropriate steps are being followed to patch these vulnerabilities. This in turn makes OpenSSL a more secure implementation of the protocols SSL/TLS (Secure Socket Layer/Transport Layer Security).

Read More [fa icon="long-arrow-right"]

Microsoft Windows Security Essentials

[fa icon="calendar'] Mar 27, 2014 6:15:24 AM / by Christian Crank posted in Cisco, Cybersecurity, Microsoft, Uncategorized

[fa icon="comment"] 0 Comments

As the OS of choice for many businesses, Microsoft Windows houses the sensitive data of banks, hospitals and corporations. In fact, as one of the most prevalently used operating systems out there, malware authors have an affinity for attacking anything Windows—it’s their go-to playground.  In order to properly defend Windows security, you’ll need to configure a lot more than just a firewall. You’ll need a myriad of tools, techniques and tricks to outsmart the bad guys and protect your Windows system. But no worries: our Microsoft Windows Security Essentials course will teach you just that.

Read More [fa icon="long-arrow-right"]

What is SCADA: Decoding the Acronym

[fa icon="calendar'] Feb 4, 2014 9:00:53 AM / by The TrainACE Team posted in Cisco, Cybersecurity

[fa icon="comment"] 1 Comment

Supervisory control and data acquisition (SCADA) systems are a category of industrial control systems (ICSs) that have become indispensable in the operation of industrial plants, production facilities, security firms and public works over the past few decades. These computerized systems incorporate several different technologies into a central configuration for the purposes of monitoring, collecting and analyzing data through human-machine interfaces. SCADA systems are vital to the infrastructure of the country, and reliable professionals are required at all times to ensure the systems are operating correctly and efficiently and remain secure.

Read More [fa icon="long-arrow-right"]

The Steps to Becoming a Penetration Tester

[fa icon="calendar'] Nov 22, 2013 9:35:26 AM / by The TrainACE Team posted in CEH, Cisco, Online Training, Pentesting, Programming

[fa icon="comment"] 0 Comments

https://www.trainace.com/products/ceh-certified-ethical-hacker-training-and-certificationAccording to statistics provided by GO-Gulf.com, the cost of cyber crime will top $100 billion this year. Cyber crime affects 18 victims per second for a total of around 556 million victims per year. Just recently, the FBI warned that cyber attacks have eclipsed domestic terrorism as the primary threat to U.S. security. Penetration testers use their skills to help organizations fix vulnerabilities in their systems. But what are the steps to becoming a penetration tester?

Read More [fa icon="long-arrow-right"]

Security & Hacking Vulnerabilities in Windows 8

[fa icon="calendar'] Nov 15, 2013 10:34:55 AM / by The TrainACE Team posted in Cisco, Cybersecurity, Malware, Microsoft, Ethical Hacking

[fa icon="comment"] 0 Comments

When Windows 8 debuted, it brought along a completely new interface, updated platform, and transformed user experience.

Read More [fa icon="long-arrow-right"]

What is Encryption & Why is it Important?

[fa icon="calendar'] Nov 7, 2013 9:00:57 AM / by The TrainACE Team posted in Cisco, Cybersecurity, encryption

[fa icon="comment"] 0 Comments

 

Read More [fa icon="long-arrow-right"]

The Importance of Secure Mobile Application Coding in Today's Fast Paced and High-Volume App Environment

[fa icon="calendar'] Oct 9, 2013 4:41:16 PM / by The TrainACE Team posted in Cisco, Cybersecurity, mobile security, wireless security, Ethical Hacking

[fa icon="comment"] 0 Comments

Mobile applications have increasingly become a popular way to reach customers in today’s digitally-driven society. With over 50 million applications in the market today, the industry continues to grow at a rapid pace. By 2015, experts expect the development of mobile applications to outnumber PC projects at a ratio of four to one. But while millions of consumers are enjoying the abundance of various beneficial and useful apps, many of them are unbeknownst to the security threats several of these apps can pose—because thousands of these app developers are abandoning methods of secure coding in hopes of putting out their products as quickly as possible.

Read More [fa icon="long-arrow-right"]

Exploring Secure Email After The Silent Circle And Lavabit Shut Downs

[fa icon="calendar'] Sep 24, 2013 5:25:28 AM / by Ryan Corey posted in Cisco, cyber war, Cybersecurity, Information Assurance, Ethical Hacking

[fa icon="comment"] 0 Comments

Both Silent Circle and Lavabit recently shut down their encrypted email services. Lavabit was the first to take action following word that the United States government wanted data handed over that would violate customers' privacy. Ladar Levison, owner of Lavabit, said he faced the decision of complying with the government and betraying the American people or ending the email service he worked hard to build. He also said that he was legally unable to explain the events leading up to his decision due to recent laws passed by congress blocking his freedom of speech.

Read More [fa icon="long-arrow-right"]