TrainACE - IT and Cybersecurity Training Blog

The Top 5 Cyber Security Skill Sets for Northern Virginia's Tech Community in 2014

[fa icon="calendar'] Oct 22, 2013 8:45:15 AM / by Ryan Corey posted in advanced penetration testing, advanced security, Cisco, exploit development, malware analysis, mobile application security, mobile security, threat intelligence

[fa icon="comment"] 0 Comments

Most people think of Silicon Valley as the tech capital of the world, but it's in northern Virginia nearly 3,000 miles away that many security firms and defense contractors operate. As of 2009, more than half of the world's Internet traffic passed through this region.

Read More [fa icon="long-arrow-right"]

Introducing the FREE CEH Study Guide

[fa icon="calendar'] May 10, 2013 11:03:30 AM / by Ryan Corey posted in advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, Cisco, cyber war, cybersecurity, EC-Council, exploit development, hacking, honeyfarming, honeynetting, honeypotting, information assurance, security training, threat intelligence

[fa icon="comment"] 0 Comments

The Certified Ethical Hacker (CEH) certification has become the benchmark for penetration testing certifications. From 2007-2011it became all the rage among the community. More and more hackers fled to the scene and started their careers off by passing the coveted CEH certification exam. There is no question that the CEH is still a highly sought after certification (especially because it was added to the DoD 8570 Directive), but its place in the field has changed. Before, the CEH was a symbol of hacking prowess, dignity, strength, wisdom, reverance, veneration, amazement (OK thats enough)...  Now, it holds its spot firmly as the preeminent baseline or entry-level hacking / penetration testing certification.

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802


TrainACE Catalog

Lists by Topic

see all