TrainACE - IT and Cybersecurity Training Blog

TrainACE and n2grate Present a Free Hacking Seminar with Product Demonstrations

[fa icon="calendar'] Jun 26, 2013 11:46:47 AM / by Lauren Archambeault posted in advanced persistent threat, Cisco, Cybersecurity, Information Assurance, Ethical Hacking

[fa icon="comment"] 0 Comments

We’re excited to announce another installation of Hacker’s Breakfast, our free hacking training seminar series! This time we’ve teamed up with n2grate Government Technology Solutions to host an event with several speakers and training demonstration kiosks. Subject Matter Experts from Blue Coat and Solera Networks will be discussing mission assurance technologies and web-based security.

Read More [fa icon="long-arrow-right"]

The Most Common Jobs for Cisco CCNP Certified Professionals

[fa icon="calendar'] Jun 24, 2013 1:27:26 PM / by Ryan Corey posted in Salary, CCNP, Cisco, Networking

[fa icon="comment"] 0 Comments

The economy might still be limping along, but the IT industry remains as healthy as ever. IT outsourcing companies have become popular in recent years, but larger companies from hospitals to manufacturers are also hiring for a continually growing workforce of in-house IT professionals. If anything, the high job demand present in the early '00s has increased since the 2008 recession. Networking, a distinct career path in IT, remains one of the main stays.

Read More [fa icon="long-arrow-right"]

Honey Netting Hacker’s Breakfast Seminar Recording Now Available

[fa icon="calendar'] Jun 11, 2013 4:45:59 AM / by Katrina Lowe posted in Cisco

[fa icon="comment"] 1 Comment

With over 100 attendees, our latest Hacker’s Breakfast Training Seminar was a huge success. We partnered with FireEye to bring those in attendance two subject matter experts speaking on a theme of Advanced Persistent Threat. TrainACE’s key note, Timber Wolfe, spent over an hour discussing the emerging technology of Honey Pots and how vital these tools are becoming to help analyze and catch unwanted visitors of a network. The wait is now over and this seminar can be viewed in its entirety here: https://www4.gotomeeting.com/register/990401775

Read More [fa icon="long-arrow-right"]

The Most Common Jobs for Cisco CCNA Certified Professionals

[fa icon="calendar'] Jun 10, 2013 4:13:18 AM / by Ryan Corey posted in CCNA, Cisco, Jobs, Networking, Online Training

[fa icon="comment"] 0 Comments

Professionals who are certified through the Cisco CCNA program are qualified for a number of jobs in the technology field. The exams required for this certification demand that each candidate demonstrate an ability to install, configure, and operate a variety of networks, making these qualified individuals flexible workers. Successful CCNA graduates are able to troubleshoot systems, operate under a number of different protocols, and demolish threats to a network’s security. This is a broad range of skills, and the Cisco CCNA certification provides each professional with a comprehensive understanding of networks. These skills allow CCNA certificate-holders to tackle a number of technology-related occupations.

Read More [fa icon="long-arrow-right"]

The Most Common Jobs for People Who Hold the EC-Council Certified Ethical Hacker (CEH) Certification

[fa icon="calendar'] May 20, 2013 3:45:05 AM / by Ryan Corey posted in CEH, Cisco, Cybersecurity, EC-Council, Information Assurance, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

The term "hacker" is often associated with illegal online activity. However, there are hackers who perform 100 percent legal services, which are based on evaluating the information infrastructures of companies. For those who hold the Certified Ethical Hacker certification from the EC-Council, there are several jobs to consider that come with attractive compensation. Some of the most common jobs for hackers holding the CEH certification include computer forensics, incidence response, penetration testing and security analysis. Penetration testing is the most common job for new hackers, but some later advance to become engineers or take on a wider variety of tasks.

Read More [fa icon="long-arrow-right"]

The Most Common Jobs for CISSP Certified Professionals

[fa icon="calendar'] May 13, 2013 5:15:03 AM / by Ryan Corey posted in Salary, Cisco, CISSP, Cybersecurity, Information Assurance, Jobs

[fa icon="comment"] 0 Comments

A Certified Information System Security Professional (CISSP) is someone with considerable experience in information technology (IT) security fields who has also completed a rigorous exam to verify his or her qualifications. CISSP holders must also meet continuing education requirements to maintain their certification.

Read More [fa icon="long-arrow-right"]

Introducing the Cisco ISR-AX

[fa icon="calendar'] May 3, 2013 11:40:22 AM / by Ryan Corey posted in CCNA, Cisco, Networking, Online Training

[fa icon="comment"] 0 Comments

Two IT hosting trends, the central data center and the cloud, are changing Internet infrastructure requirements. Organizations are seeking to lower cost and complexity while better serving internal and external customers in diverse locations. As IT centralizes application hosting, Cisco has responded with the introduction of the Integrated Services Router with Application Experience or ISR-AX. ISR-AX combines a branch router, application optimization, and security and performance features in one box.

Read More [fa icon="long-arrow-right"]

The Scoop on the New DIARMF Process

[fa icon="calendar'] Mar 5, 2013 4:02:09 PM / by Ryan Corey posted in Cisco, Cybersecurity, Information Assurance

[fa icon="comment"] 0 Comments

The Department of Defense last changed its approach to cyber security, or, in DoD parlance, “Information Assurance,” in 2006, when Defense Information Technology Security Certification and Accreditation (DITSCAP) was replaced by Defense Information Assurance Certification and Accreditation Process (DIACAP). The small change in name, with “Technology Security” replaced by “Assurance,” said little about the reason for the change in system, but one intent of DIACAP was the promotion of consistency and standardization, all in the hope that cross-service reciprocity and cost savings would follow.

Read More [fa icon="long-arrow-right"]

Operation Beebus Attacks Discovered by FireEye

[fa icon="calendar'] Feb 12, 2013 5:04:53 AM / by Ryan Corey posted in advanced persistent threat, Cisco, cyber war, Cybersecurity, Malware, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

Researchers at security company FireEye have revealed an advanced persistent threat targeting the U.S. defense and aerospace industries and likely originating in China. Named Beebus after an early sample, the campaign's attacks come in continuous waves over time against strategically chosen individuals. According to an unnamed inside source, the Beebus campaign began in early 2012 when FireEye noticed suspicious activity on the systems of some its defense and aerospace clients. Of 261 discovered attacks, 123 targeted unmanned aerial vehicle or systems vendors. The most recent exploit used a Deloitte industry analysis report sent in a weaponized email. Researchers believe that the campaign has so far touched 214 servers with 60 unique IP addresses.

Read More [fa icon="long-arrow-right"]

Skepticism Greets Increase in Cyber Command at the Pentagon

[fa icon="calendar'] Feb 6, 2013 2:45:41 AM / by Ryan Corey posted in Cisco, Cybersecurity

[fa icon="comment"] 0 Comments

On January 27, the Washington Post reported that the Department of Defense plans to expand its “Cyber Command,” a force dedicated to defending U.S. computer systems, by a factor of five, from 900 to 4,900 members. Although a formal announcement had not been made, Pentagon sources indicated that an increase in numbers was not the only change on the agenda. The Cyber Command would also undergo a shift in focus, with the new structure adding acknowledged offensive capabilities to a command that had previously been characterized as exclusively defensive.

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802

Speak with a Program Manager