TrainACE - IT and Cybersecurity Training Blog

Job Salaries with a CompTIA Security+ Certification in the D.C. Area

[fa icon="calendar'] Sep 14, 2015 10:32:39 AM / by Ariana Ciancio posted in Cisco, CompTIA, Comptia security+ certification, security+ dc job salaries

[fa icon="comment"] 1 Comment

Read More [fa icon="long-arrow-right"]

Why You Should Become CISM Certified

[fa icon="calendar'] Aug 25, 2015 11:14:36 AM / by Ariana Ciancio posted in Certified Information Security Manager, Cisco, CISM, CISM training, Isaca

[fa icon="comment"] 0 Comments

In a connected world, there is a clear need for professionals who have the knowledge and skills to keep information safe and secure. Individuals who work in the fields of Information Security and Information Technology understand the importance of maintaining the integrity of data and information. With an extra credential, IS and IT professionals can elevate their educations while advancing their careers. The Certified Information Security Manager (CISM) certification is a clear benefit to people who work in the technology sector and are eager to demonstrate their value to employers.

Read More [fa icon="long-arrow-right"]

Ethical Hacker Job Opportunities

[fa icon="calendar'] Aug 19, 2015 11:30:20 AM / by Ariana Ciancio posted in average salary, ceh, CEH jobs, Cisco

[fa icon="comment"] 0 Comments

hacker.jpgAs technology innovation accelerates and becomes increasingly sophisticated, grows at an exponential rate, and there are continually new and exciting devices and gadgets hitting the market. While these advancements in society have largely offered us a tremendous level of convenience, there are always a few bad apples in every barrel, and some people use technology to their own benefit at the expense of innocent victims. The demand for qualified personnel to assess the security of computer systems is at an all-time high in the Washington, DC area, and you have a lot to gain by obtaining a Certified Ethical Hacker certification. There are five lucrative areas in the field worth consideration.

Read More [fa icon="long-arrow-right"]

The Do's and Don'ts of Passwords

[fa icon="calendar'] Aug 5, 2015 2:17:38 PM / by Ariana Ciancio posted in Cisco, Online Security, Password, Password Safety, security training, Uncategorized

[fa icon="comment"] 2 Comments

Take a moment to think about the array of passwords you have created overtime. It’s very likely that you have so many passwords that you can’t possibly remember them all, or on the reverse side, you could be someone who uses the same password for all of your login credentials. Either way your passwords could be putting your online security at risk. These days, just about every system that stores data requires a password. It is the first barrier between a hacker and sensitive information. When creating passwords, there are several rules you should follow in order to keep stored information secure. Here are a few helpful do's and don'ts for proper password management.

Read More [fa icon="long-arrow-right"]

The Easiest Ways to Make Your Public Wi-Fi Connection Safer

[fa icon="calendar'] Jul 15, 2015 2:27:01 PM / by Ariana Ciancio posted in Cisco, cybersecurity, Public Wi-Fi, security

[fa icon="comment"] 0 Comments

If you think public Wi-Fi is 100% safe, your personal information is already at risk of being stolen. Whenever you connect to a public wireless router, you’re sharing the same network as others even if it is password protected. It’s relatively simple for someone to see what you’re doing and take your data if they’re connected to the network you’re on. Fortunately, you can take some steps to safeguard your personal information.

Read More [fa icon="long-arrow-right"]

5 Cyber Security Guidelines for Vacationers

[fa icon="calendar'] Jun 26, 2015 10:28:43 AM / by Ariana Ciancio posted in advanced security, Cisco, cybersecurity, hacking, mobile security

[fa icon="comment"] 0 Comments

It's that time of year...vacation season! Residents across the Washington, D.C. metro area are traveling to the many beaches and resorts just a day trip away! For most people, smart phones, tablets, and laptops play a huge role in everyday life, and even more so for those in the technology industry. Nonetheless, summer vacation is no excuse for travelers to neglect their cyber security. In fact, data thieves are more likely to strike when you are most relaxed and in places where people tend to let their guard down.

Read More [fa icon="long-arrow-right"]

Recently Updated - Certified Ethical Hacker Exam Study Guide

[fa icon="calendar'] Apr 24, 2015 2:33:05 PM / by Ryan Corey posted in CEH training, certified ethical hacker, Cisco

[fa icon="comment"] 0 Comments

Our free Certified Ethical Hacker Exam Study Guide has been one of our most popular white paper and resources items on our website for years now. We wanted to keep everyone updated with the fact that we recently updated it

Read More [fa icon="long-arrow-right"]

What is Big Data and Why is It So Important?

[fa icon="calendar'] Sep 24, 2014 9:05:23 AM / by The TrainACE Team posted in Big Data, big data training, business management, Cisco

[fa icon="comment"] 0 Comments

Big data consists of immense pools of information that can be analyzed to unlock patterns---all for the purpose of making better decisions. This data is the basis for growth and competition for companies. On a macro scale, it can enhance and create value for the world economy. The direct result is that the quality of services and products will increase. Until recently, the immense volume of data flooding the world excited a select few. Now however, big data is now at an inflection point where it is economically relevant for government agencies, business and consumers to mine this data for insights. The reality of big data is very similar to former IT investment trends as well as innovation and its apparent impact on productivity. In short, those who supply big data are expected to have as much impact on productivity as those who supply other kinds of technology. Additionally, these companies must make sure their employees complete comprehensive big data training to prevent the mishandling of highly sensitive information.

Read More [fa icon="long-arrow-right"]

The Importance of Mobile Security

[fa icon="calendar'] Sep 16, 2014 8:00:02 AM / by The TrainACE Team posted in Cisco, mobile hacking, mobile hacking and security training, mobile security, mobile security training

[fa icon="comment"] 0 Comments

Reports on security breaches have now become standard in the daily news, as common as home or retail store robberies. Internet hackers steal personal banking information as simply as if they were reaching into someone's back pocket. However, security breaches are not limited to Internet transactions or computers. Mobile devices are now becoming targets for hackers to exploit user information.

Read More [fa icon="long-arrow-right"]

Open SSL, Being Patched Again?!

[fa icon="calendar'] Jun 9, 2014 9:15:50 AM / by Christian Crank posted in Cisco, cyber, hacking, hacking vulnerabilities, openssl, security

[fa icon="comment"] 1 Comment

So OpenSSL is being patched again, very shortly after the Heartbleed Bug was fixed. According to the OpenSSL Security Advisory, multiple security vulnerabilities affecting the security layer have been recently discovered. One of the security threats actually allowed an attacker to see and modify traffic between an OpenSSL server and the client. While this news might seem bad, finding these vulnerabilities indicate that OpenSSL is frequently monitored by security professionals, and the appropriate steps are being followed to patch these vulnerabilities. This in turn makes OpenSSL a more secure implementation of the protocols SSL/TLS (Secure Socket Layer/Transport Layer Security).

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802


or

TrainACE Catalog

Lists by Topic

see all