TrainACE - IT and Cybersecurity Training Blog

The Do's and Don'ts of Passwords

[fa icon="calendar'] Aug 5, 2015 2:17:38 PM / by Ariana Ciancio posted in Online Security, Password, Password Safety, security training, Uncategorized, Cisco

[fa icon="comment"] 2 Comments

Take a moment to think about the array of passwords you have created overtime. It’s very likely that you have so many passwords that you can’t possibly remember them all, or on the reverse side, you could be someone who uses the same password for all of your login credentials. Either way your passwords could be putting your online security at risk. These days, just about every system that stores data requires a password. It is the first barrier between a hacker and sensitive information. When creating passwords, there are several rules you should follow in order to keep stored information secure. Here are a few helpful do's and don'ts for proper password management.

Read More [fa icon="long-arrow-right"]

Microsoft Windows Security Essentials

[fa icon="calendar'] Mar 27, 2014 6:15:24 AM / by Christian Crank posted in advanced security, Microsoft, security training, Uncategorized, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

As the OS of choice for many businesses, Microsoft Windows houses the sensitive data of banks, hospitals and corporations. In fact, as one of the most prevalently used operating systems out there, malware authors have an affinity for attacking anything Windows—it’s their go-to playground.  In order to properly defend Windows security, you’ll need to configure a lot more than just a firewall. You’ll need a myriad of tools, techniques and tricks to outsmart the bad guys and protect your Windows system. But no worries: our Microsoft Windows Security Essentials course will teach you just that.

Read More [fa icon="long-arrow-right"]

What is SCADA: Decoding the Acronym

[fa icon="calendar'] Feb 4, 2014 9:00:53 AM / by The TrainACE Team posted in advanced security, ics, industrial control systems, scada, scada training, security training, Cisco, cybersecurity

[fa icon="comment"] 1 Comment

Supervisory control and data acquisition (SCADA) systems are a category of industrial control systems (ICSs) that have become indispensable in the operation of industrial plants, production facilities, security firms and public works over the past few decades. These computerized systems incorporate several different technologies into a central configuration for the purposes of monitoring, collecting and analyzing data through human-machine interfaces. SCADA systems are vital to the infrastructure of the country, and reliable professionals are required at all times to ensure the systems are operating correctly and efficiently and remain secure.

Read More [fa icon="long-arrow-right"]

New Version of the ECSA / LPT (v5) Certification by EC-Council, Coming in 2014

[fa icon="calendar'] Oct 24, 2013 2:02:52 PM / by Ryan Corey posted in advanced ethical hacking, advanced penetration testing, advanced security, certified ethical hacker, EC-Council, ECSA certification, LPT certification, security training, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

EC-Council has just announced that a much overdue improvement and version upgrade to the ECSA / LPT curriculum will be coming to training centers (ours, of course, is the only one that matters) at the beginning of 2014.

Read More [fa icon="long-arrow-right"]

The Importance of Secure Mobile Application Coding in Today's Fast Paced and High-Volume App Environment

[fa icon="calendar'] Oct 9, 2013 4:41:16 PM / by The TrainACE Team posted in advanced security, app market, hacking, mobile apps, mobile phones, mobile security, secure coding, secure mobile application coding, security training, wireless security, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

Mobile applications have increasingly become a popular way to reach customers in today’s digitally-driven society. With over 50 million applications in the market today, the industry continues to grow at a rapid pace. By 2015, experts expect the development of mobile applications to outnumber PC projects at a ratio of four to one. But while millions of consumers are enjoying the abundance of various beneficial and useful apps, many of them are unbeknownst to the security threats several of these apps can pose—because thousands of these app developers are abandoning methods of secure coding in hopes of putting out their products as quickly as possible.

Read More [fa icon="long-arrow-right"]

Exploring Secure Email After The Silent Circle And Lavabit Shut Downs

[fa icon="calendar'] Sep 24, 2013 5:25:28 AM / by Ryan Corey posted in advanced security, cyber war, hacking, information assurance, secure email, security training, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

Both Silent Circle and Lavabit recently shut down their encrypted email services. Lavabit was the first to take action following word that the United States government wanted data handed over that would violate customers' privacy. Ladar Levison, owner of Lavabit, said he faced the decision of complying with the government and betraying the American people or ending the email service he worked hard to build. He also said that he was legally unable to explain the events leading up to his decision due to recent laws passed by congress blocking his freedom of speech.

Read More [fa icon="long-arrow-right"]

What is Threat Intelligence?

[fa icon="calendar'] Sep 18, 2013 7:51:12 AM / by Ryan Corey posted in advanced persistent threat, advanced security, hacking, information assurance, security training, threat intelligence, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

Across the country and around the world, cyber attackers continue to discover new and improved ways of wreaking havoc with company's business operations. Their nefarious activities are responsible for billions of dollars' worth of damages in intellectual property theft. While cyber security teams attempt to circumvent these onslaughts, increased technological advancements continue to speed up the time between perceived threat and actual intrusion. How can a business entity keep up?

Read More [fa icon="long-arrow-right"]

The Cyber Education Symposium in Arlington, VA

[fa icon="calendar'] Sep 6, 2013 3:39:31 AM / by Ryan Corey posted in advanced security, information assurance, security training, Cisco, cybersecurity

[fa icon="comment"] 2 Comments

If you haven't heard the Cyber Education Symposium has been announced and will be held in Arlington, VA on 11/19 - 11/20/13.  The event is going to be held at the Hyatt Regency Crystal City at Reagan National Airport, the address is:

Read More [fa icon="long-arrow-right"]

Spammed and Hacked: How Social Media Can Pose a Security Risk

[fa icon="calendar'] Aug 26, 2013 5:12:40 AM / by Ryan Corey posted in advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber war, hacking, information assurance, security training, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.

Read More [fa icon="long-arrow-right"]

Look Out IT Job Seekers! Cyber Security is the Field to Join

[fa icon="calendar'] Aug 19, 2013 3:45:24 AM / by Ryan Corey posted in advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, average salary, cyber war, hacking, security training, Cisco, cybersecurity

[fa icon="comment"] 0 Comments

As cyber attacks increase in frequency and scandals involving governments hacking into private computers become more commonplace, it's no wonder that one of the most promising fields in the current IT sector would be cyber security. In fact, recent research has indicated that cyber security has grown by more than one hundred percent in the last year. Clearly, anyone seeking a job in the information technology area would do well to start at the first line of defense against hackers.

Read More [fa icon="long-arrow-right"]

Subscribe to our Blog

New call-to-action

Lists by Topic

see all

Posts by Topic

see all

Recent Posts