TrainACE - IT and Cybersecurity Training Blog

The Scoop on the New DIARMF Process

[fa icon="calendar'] Mar 5, 2013 4:02:09 PM / by Ryan Corey posted in advanced security, Cisco, cybersecurity, DIACAP, DIARMF, information assurance, security training

[fa icon="comment"] 0 Comments

The Department of Defense last changed its approach to cyber security, or, in DoD parlance, “Information Assurance,” in 2006, when Defense Information Technology Security Certification and Accreditation (DITSCAP) was replaced by Defense Information Assurance Certification and Accreditation Process (DIACAP). The small change in name, with “Technology Security” replaced by “Assurance,” said little about the reason for the change in system, but one intent of DIACAP was the promotion of consistency and standardization, all in the hope that cross-service reciprocity and cost savings would follow.

Read More [fa icon="long-arrow-right"]

FireEye and TrainACE Team Up to Offer A Free Hacking Seminar

[fa icon="calendar'] Feb 21, 2013 4:45:37 PM / by Ryan Corey posted in advanced persistent threat, advanced security, Cisco, cybersecurity, hacking, honeyfarming, honeynetting, honeypotting, information assurance, malware, malware analysis

[fa icon="comment"] 0 Comments

Yes, thats correct, FREE!

Read More [fa icon="long-arrow-right"]

How Honey Pots and Honey Farming is Used in Cyber Security

[fa icon="calendar'] Jan 29, 2013 3:45:21 AM / by Ryan Corey posted in advanced persistent threat, advanced security, Cisco, cybersecurity, honeyfarming, honeynetting, honeypotting, information assurance, security training

[fa icon="comment"] 0 Comments

The term “honeypot” or, as it sometimes appears, “honey pot,” came to computer security from the world of espionage, where it referred to an agent who would be sexually available to a target. If all went as planned, the target would be compromised, either by sexual blackmail or because the relationship led the target to share secret information.

Read More [fa icon="long-arrow-right"]

The Cyber Security Battlefield Grows More Dangerous

[fa icon="calendar'] Jan 14, 2013 10:42:28 AM / by Ryan Corey posted in advanced penetration testing, advanced persistent threat, advanced security, Cisco, computer training, cyber war, cybersecurity, hacking, information assurance, security training

[fa icon="comment"] 0 Comments

A huge portion of modern society uses some form of digital technology on a daily basis. Many conveniences on a national and personal level have been made possible due to this technology, but also opens up a Pandora's box of a whole new set of problems as well. The cyber battlefield grows more dangerous as organized hackers and other cyber threatening criminals set out to exploit the conveniences produced by the digital age for their own gain. There is an ongoing challenge, therefore, creating cyber security or defenses to protect the country from attacks; but have, on many occasions, been successfully breached to raise considerable concern even among the most savvy cyber security agencies in the world.

Read More [fa icon="long-arrow-right"]

What is Advanced Persistent Threat

[fa icon="calendar'] Dec 11, 2012 11:25:45 AM / by Ryan Corey posted in advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, Cisco, cyber war, cybersecurity, hacking, information assurance, security training

[fa icon="comment"] 0 Comments

The term advanced persistent threat (APT) was originally used to describe complex, ongoing espionage perpetrated by foreign governments. However, today, APT typically refers to a category of cybercrime directed toward businesses or government entities. APTs are usually online attacks used to achieve goals beyond those that can be met by a single security breach, but some may involve malicious activity conducted onsite. Compromised computer systems are continuously monitored by the attackers or added to a stable of slave computers to be used to achieve some future goal. APTs are most often perpetrated by employing some form of malware, and IT technicians defend against APTs by installing antimalware software and hardware firewalls.

Read More [fa icon="long-arrow-right"]

What is Malware Analysis?

[fa icon="calendar'] Dec 4, 2012 9:23:03 AM / by Ryan Corey posted in advanced security, Cisco, information assurance, malware analysis, security training

[fa icon="comment"] 0 Comments

Nearly every security breach in a company’s online network is caused by some form of malicious computer program. These programs are generally referred to as malware, but they exist in several distinct categories, including viruses, worms and Trojan horses. Being able to identify when and how malware is affecting a computer system takes specialized training, but this knowledge increases the value of any IT security technician or manager who possesses it. These individuals are capable of assessing the scope and severity of a malware infection, which leads to efficient and detailed planning of the steps required to eliminate the malware and recover any lost data or system resources.

Read More [fa icon="long-arrow-right"]

About the CompTIA CASP Certification and Who it is Best Fit For

[fa icon="calendar'] Sep 25, 2012 7:45:31 AM / by Ryan Corey posted in advanced security, CASP, Cisco, CompTIA, cybersecurity, hacking, information assurance, security training

[fa icon="comment"] 0 Comments

The CompTIA Advanced Security Practitioner (CASP) certification is intended for professionals with at least ten years of experience in security administration. Five of those years must be hands-on technical experience. The CASP does not require that any previous exams have been passed, but is a higher-level exam than the CompTIA Security+.

Read More [fa icon="long-arrow-right"]

Average Salary for the CISSP Certification by State

[fa icon="calendar'] Jul 6, 2012 8:11:03 AM / by Ryan Corey posted in advanced security, average salary, Cisco, cissp, cybersecurity, information assurance, security training

[fa icon="comment"] 0 Comments

Cybersecurity professionals are in top demand these days due to an increase in computer threats. Many sources will tell you that it is a field where the jobs are plentiful and the pay is high, but there are not enough skilled professionals to fill every open position. The federal government has plans to hire thousands of cyber security professionals in the next few years, and the private sector is also going to be hiring more of these security pros in large numbers. All in all, the industry is young and primed for major growth.

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802


or

TrainACE Catalog

Lists by Topic

see all