TrainACE Learning Blog

Subscribe to our Blog

Recent Posts

Posts by Topic

see all

The Top 5 Cyber Security Skill Sets for Northern Virginia's Tech Community in 2014

Posted by Ryan Corey on Oct 22, 2013 8:45:15 AM

Most people think of Silicon Valley as the tech capital of the world, but it's in northern Virginia nearly 3,000 miles away that many security firms and defense contractors operate. As of 2009, more than half of the world's Internet traffic passed through this region.

Read More

Topics: advanced penetration testing, advanced security, exploit development, malware analysis, mobile application security, mobile security, threat intelligence, Cisco

With Malware Rampant on Androids, What Lies Ahead for Google Glass Security?

Posted by Lauren Archambeault on Aug 1, 2013 4:15:58 AM

Google Glass may be coming to a face near you very soon, and it has gotten a lot of attention as a new way to interact with the world and, to be sure, as a device with significant privacy implications. Less has been said about security, but there are good reasons to put that concern high on the list.

Read More

Topics: advanced security, hacking, malware, malware analysis, mobile security, Cisco, cybersecurity

FireEye and TrainACE Team Up to Offer A Free Hacking Seminar

Posted by Ryan Corey on Feb 21, 2013 4:45:37 PM

Yes, thats correct, FREE!

Read More

Topics: advanced persistent threat, advanced security, hacking, information assurance, malware, malware analysis, Cisco, cybersecurity, honeynetting, honeypotting, honeyfarming

What is Malware Analysis?

Posted by Ryan Corey on Dec 4, 2012 9:23:03 AM

Nearly every security breach in a company’s online network is caused by some form of malicious computer program. These programs are generally referred to as malware, but they exist in several distinct categories, including viruses, worms and Trojan horses. Being able to identify when and how malware is affecting a computer system takes specialized training, but this knowledge increases the value of any IT security technician or manager who possesses it. These individuals are capable of assessing the scope and severity of a malware infection, which leads to efficient and detailed planning of the steps required to eliminate the malware and recover any lost data or system resources.

Read More

Topics: advanced security, information assurance, malware analysis, security training, Cisco