TrainACE Learning Blog

Subscribe to our Blog

Recent Posts

Posts by Topic

see all

Exploring Secure Email After The Silent Circle And Lavabit Shut Downs

Posted by Ryan Corey on Sep 24, 2013 5:25:28 AM

Both Silent Circle and Lavabit recently shut down their encrypted email services. Lavabit was the first to take action following word that the United States government wanted data handed over that would violate customers' privacy. Ladar Levison, owner of Lavabit, said he faced the decision of complying with the government and betraying the American people or ending the email service he worked hard to build. He also said that he was legally unable to explain the events leading up to his decision due to recent laws passed by congress blocking his freedom of speech.

Read More

Topics: advanced security, cyber security, cyber war, hacking, information assurance, secure email, Security, security training

What is Threat Intelligence?

Posted by Ryan Corey on Sep 18, 2013 7:51:12 AM

Across the country and around the world, cyber attackers continue to discover new and improved ways of wreaking havoc with company's business operations. Their nefarious activities are responsible for billions of dollars' worth of damages in intellectual property theft. While cyber security teams attempt to circumvent these onslaughts, increased technological advancements continue to speed up the time between perceived threat and actual intrusion. How can a business entity keep up?

Read More

Topics: advanced persistent threat, advanced security, cyber security, hacking, information assurance, Security, security training, threat intelligence

The Cyber Education Symposium in Arlington, VA

Posted by Ryan Corey on Sep 6, 2013 3:39:31 AM

If you haven't heard the Cyber Education Symposium has been announced and will be held in Arlington, VA on 11/19 - 11/20/13.  The event is going to be held at the Hyatt Regency Crystal City at Reagan National Airport, the address is:

Read More

Topics: advanced security, cyber security, information assurance, Security, security training

Spammed and Hacked: How Social Media Can Pose a Security Risk

Posted by Ryan Corey on Aug 26, 2013 5:12:40 AM

Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber security, cyber war, hacking, information assurance, Security, security training

TrainACE and n2grate Present a Free Hacking Seminar with Product Demonstrations

Posted by Lauren Archambeault on Jun 26, 2013 11:46:47 AM

We’re excited to announce another installation of Hacker’s Breakfast, our free hacking training seminar series! This time we’ve teamed up with n2grate Government Technology Solutions to host an event with several speakers and training demonstration kiosks. Subject Matter Experts from Blue Coat and Solera Networks will be discussing mission assurance technologies and web-based security.

Read More

Topics: advanced persistent threat, advanced security, cyber security, hacking, information assurance, Security, security training

A Video on What the CEH Certification Training with TrainACE will do for Your Career – Jobs, Salary, Facts and Figures

Posted by Ryan Corey on May 30, 2013 9:43:12 AM

Most people who are looking in to taking the Certified Ethical Hacker (CEH) certification training with us want to know a few key points. The CEH certification is arguably the leading baseline penetration testing certification on the market. Our CEH training class prepares people for a career in the field by offering more hands-on training than any other competitor’s class out there. The class also has a pass rate on the certification exam OVER 99% (yes that’s correct, in the last year, about 550 people took the CEH with us and only 5 failed the exam).  As you probably know, we offer classroom based training as well as online options, both are extremely effective.

Read More

Topics: advanced security, average salary, career change, ceh, CEH jobs, CEH training, certified ethical hacker, computer training, cyber security, EC-Council, hacking, information assurance, information technology career, IT training, Online Training, penetration testing, Security, security training

The Most Common Jobs for People Who Hold the EC-Council Certified Ethical Hacker (CEH) Certification

Posted by Ryan Corey on May 20, 2013 3:45:05 AM

The term "hacker" is often associated with illegal online activity. However, there are hackers who perform 100 percent legal services, which are based on evaluating the information infrastructures of companies. For those who hold the Certified Ethical Hacker certification from the EC-Council, there are several jobs to consider that come with attractive compensation. Some of the most common jobs for hackers holding the CEH certification include computer forensics, incidence response, penetration testing and security analysis. Penetration testing is the most common job for new hackers, but some later advance to become engineers or take on a wider variety of tasks.

Read More

Topics: advanced ethical hacking, advanced penetration testing, certified ethical hacker, cyber security, EC-Council, hacking, information assurance, IT training, Security, security training

The Most Common Jobs for CISSP Certified Professionals

Posted by Ryan Corey on May 13, 2013 5:15:03 AM

A Certified Information System Security Professional (CISSP) is someone with considerable experience in information technology (IT) security fields who has also completed a rigorous exam to verify his or her qualifications. CISSP holders must also meet continuing education requirements to maintain their certification.

Read More

Topics: average salary, cissp, cyber security, information assurance, jobs, Security, security training

Introducing the FREE CEH Study Guide

Posted by Ryan Corey on May 10, 2013 11:03:30 AM

The Certified Ethical Hacker (CEH) certification has become the benchmark for penetration testing certifications. From 2007-2011it became all the rage among the community. More and more hackers fled to the scene and started their careers off by passing the coveted CEH certification exam. There is no question that the CEH is still a highly sought after certification (especially because it was added to the DoD 8570 Directive), but its place in the field has changed. Before, the CEH was a symbol of hacking prowess, dignity, strength, wisdom, reverance, veneration, amazement (OK thats enough)...  Now, it holds its spot firmly as the preeminent baseline or entry-level hacking / penetration testing certification.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber security, cyber war, EC-Council, exploit development, hacking, honey farm, honey net, honey pot, information assurance, Security, security training, threat intelligence

What are the Must-Know Cyber Security Standards

Posted by Ryan Corey on May 7, 2013 4:12:59 AM

In the face of constant cyber threats, formal security standards have evolved to guide organizations in implementing effective countermeasures. With so many critical systems at risk, Information Assurance and other IT security experts rely on government and industry standards to keep an organization’s cyber security robust. Vendors and systems integrators also develop, test, and install systems and products according to these standards.

Read More

Topics: advanced security, cyber security, information assurance, ISO, NIST, Security