TrainACE Learning Blog

Subscribe to our Blog

Recent Posts

Posts by Topic

see all

Join Our Webinar on romanHunter, an Open Source Wireless Honeypot

Posted by Ryan Corey on Dec 2, 2013 9:45:32 AM

We have scheduled our next webinar. Its on romanHunter (ROuter MAN HUNTER). romanHunter is an open source wireless honeypot that has a number of tricks which can help you to bait and catch people attacking your network.

Read More

Topics: advanced security, hacking, wireless, Cisco, cybersecurity, honeynetting, honeypotting, honeyfarming

Introducing the FREE CEH Study Guide

Posted by Ryan Corey on May 10, 2013 11:03:30 AM

The Certified Ethical Hacker (CEH) certification has become the benchmark for penetration testing certifications. From 2007-2011it became all the rage among the community. More and more hackers fled to the scene and started their careers off by passing the coveted CEH certification exam. There is no question that the CEH is still a highly sought after certification (especially because it was added to the DoD 8570 Directive), but its place in the field has changed. Before, the CEH was a symbol of hacking prowess, dignity, strength, wisdom, reverance, veneration, amazement (OK thats enough)...  Now, it holds its spot firmly as the preeminent baseline or entry-level hacking / penetration testing certification.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber war, EC-Council, exploit development, hacking, information assurance, security training, threat intelligence, Cisco, cybersecurity, honeynetting, honeypotting, honeyfarming

FireEye and TrainACE Team Up to Offer A Free Hacking Seminar

Posted by Ryan Corey on Feb 21, 2013 4:45:37 PM

Yes, thats correct, FREE!

Read More

Topics: advanced persistent threat, advanced security, hacking, information assurance, malware, malware analysis, Cisco, cybersecurity, honeynetting, honeypotting, honeyfarming

How Honey Pots and Honey Farming is Used in Cyber Security

Posted by Ryan Corey on Jan 29, 2013 3:45:21 AM

The term “honeypot” or, as it sometimes appears, “honey pot,” came to computer security from the world of espionage, where it referred to an agent who would be sexually available to a target. If all went as planned, the target would be compromised, either by sexual blackmail or because the relationship led the target to share secret information.

Read More

Topics: advanced persistent threat, advanced security, honeyfarming, honeynetting, honeypotting, information assurance, security training, Cisco, cybersecurity