TrainACE - IT and Cybersecurity Training Blog

Join Our Webinar on romanHunter, an Open Source Wireless Honeypot

[fa icon="calendar'] Dec 2, 2013 9:45:32 AM / by Ryan Corey posted in advanced security, hacking, wireless, Cisco, cybersecurity, honeynetting, honeypotting, honeyfarming

[fa icon="comment"] 0 Comments

We have scheduled our next webinar. Its on romanHunter (ROuter MAN HUNTER). romanHunter is an open source wireless honeypot that has a number of tricks which can help you to bait and catch people attacking your network.

Read More [fa icon="long-arrow-right"]

Introducing the FREE CEH Study Guide

[fa icon="calendar'] May 10, 2013 11:03:30 AM / by Ryan Corey posted in advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber war, EC-Council, exploit development, hacking, information assurance, security training, threat intelligence, Cisco, cybersecurity, honeynetting, honeypotting, honeyfarming

[fa icon="comment"] 0 Comments

The Certified Ethical Hacker (CEH) certification has become the benchmark for penetration testing certifications. From 2007-2011it became all the rage among the community. More and more hackers fled to the scene and started their careers off by passing the coveted CEH certification exam. There is no question that the CEH is still a highly sought after certification (especially because it was added to the DoD 8570 Directive), but its place in the field has changed. Before, the CEH was a symbol of hacking prowess, dignity, strength, wisdom, reverance, veneration, amazement (OK thats enough)...  Now, it holds its spot firmly as the preeminent baseline or entry-level hacking / penetration testing certification.

Read More [fa icon="long-arrow-right"]

FireEye and TrainACE Team Up to Offer A Free Hacking Seminar

[fa icon="calendar'] Feb 21, 2013 4:45:37 PM / by Ryan Corey posted in advanced persistent threat, advanced security, hacking, information assurance, malware, malware analysis, Cisco, cybersecurity, honeynetting, honeypotting, honeyfarming

[fa icon="comment"] 0 Comments

Yes, thats correct, FREE!

Read More [fa icon="long-arrow-right"]

How Honey Pots and Honey Farming is Used in Cyber Security

[fa icon="calendar'] Jan 29, 2013 3:45:21 AM / by Ryan Corey posted in advanced persistent threat, advanced security, honeyfarming, honeynetting, honeypotting, information assurance, security training, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

The term “honeypot” or, as it sometimes appears, “honey pot,” came to computer security from the world of espionage, where it referred to an agent who would be sexually available to a target. If all went as planned, the target would be compromised, either by sexual blackmail or because the relationship led the target to share secret information.

Read More [fa icon="long-arrow-right"]

Subscribe to our Blog

New call-to-action

Lists by Topic

see all

Posts by Topic

see all

Recent Posts