• Call: (301) 220 2802
  • Email: info@trainace.com

TrainACE - IT and Cybersecurity Training Blog

It's Almost Here! Certified Network Defender (CND)

[fa icon="calendar'] Nov 6, 2016 7:13:55 PM / by Jeff Rinehard posted in Uncategorized

[fa icon="comment"] 0 Comments

TrainACE is ecstatic to announce that we have been individually selected to run one of the first (CND) Certified Network Defender experience classes in the world. We are one of twenty-one training organizations that were chosen world-wide by the EC Council to instruct this game changing program. Certified Network Defender might just change the world!

Read More [fa icon="long-arrow-right"]

TrainACE is Now a MyCAA Approved School

[fa icon="calendar'] Mar 3, 2016 3:09:20 PM / by Ariana Ciancio posted in Uncategorized

[fa icon="comment"] 1 Comment

TrainACE is now a MyCAA approved school accepting military spouse scholarships for our training courses.

Read More [fa icon="long-arrow-right"]

CompTIA Certification Renewal Policy

[fa icon="calendar'] Feb 9, 2016 12:00:09 PM / by Ariana Ciancio posted in CEU, CompTIA, Uncategorized

[fa icon="comment"] 0 Comments

Read More [fa icon="long-arrow-right"]

What is CCNA Routing and Switching?

[fa icon="calendar'] Dec 29, 2015 3:20:38 PM / by Ariana Ciancio posted in Uncategorized

[fa icon="comment"] 0 Comments

Read More [fa icon="long-arrow-right"]

What is The Internet of Things? And How Will it Impact IT Departments?

[fa icon="calendar'] Jul 29, 2015 12:09:32 PM / by Ariana Ciancio posted in Uncategorized

[fa icon="comment"] 0 Comments

The Internet of Things has been the center of numerous discussions involving tech industry experts, analysts, CIOs and more. While there is a substantial amount of excitement surrounding the possibilities associated with the IoT, there has also been a substantial amount of concern from IT techs and CIOs when it comes to security and the protection of sensitive data. While the tech world has been bombarded with all types of reports, white papers and articles suggesting that the IoT will result is a significant change in the corporate IT structure, the IoT will also impact the private consumer as well; however, the greatest concern on deck at the moment is the magnitude of the impact that the IoT will have on IT departments.

Read More [fa icon="long-arrow-right"]

How We Can Help You Prevent a Hacking Incident

[fa icon="calendar'] Apr 28, 2015 9:00:37 AM / by Jackie Somma posted in Online Training, Uncategorized, Ethical Hacking

[fa icon="comment"] 0 Comments

The internet is full of hackers, and these hackers grow in numbers, strength, and power each and every day. It was recently discovered that a group of hackers had managed to steal in total, around $1 billion from banks through their computers. This is thought to be one of the biggest banking breaches in history, and the robbers didn't even have to physically go to the bank. These hackers got their way into the banks' computer systems and observed the banks' operations. They either set up fake bank accounts to steal money with, or they programmed ATMs to dispense money at specific times. According to Kaspersky Labs, the hackers have attacked 100 banks in 30 countries, all fairly easily. Banks are one of the more prone industries to hacking, but they're not the only ones that need to keep a watchful eye when it comes to hacking incidents.

Read More [fa icon="long-arrow-right"]

How to Get CISA Certified and why it's Worth It

[fa icon="calendar'] Aug 13, 2014 9:00:46 AM / by Jackie Somma posted in Uncategorized

[fa icon="comment"] 1 Comment

A CISA, or Certified Information Systems Auditor, certification is recognized by almost all employers across a large variety of industries. The CISA certification is best described as an all-inclusive information systems audit qualification. The certification requires an applicant to be knowledgeable about information technology and general aspects of business. While there are other IT audit certifications available, they don't have the same universal acceptance as CISA. Those who are CISA certified have illustrated their IT skills and their capability to tackle auditing tasks.

Read More [fa icon="long-arrow-right"]

Using OpenSSL? Heartbleed Bug may be affecting you now.

[fa icon="calendar'] Apr 9, 2014 10:45:08 AM / by Christian Crank posted in Cybersecurity, encryption, Uncategorized

[fa icon="comment"] 0 Comments

Security researchers have recently discovered a major vulnerability in widely used encryption software that could potentially cause widespread, severe damage to the private data of millions of people around the globe. OpenSSL is a cryptologic software that used by millions of websites throughout the internet to encrypt communications between users and webpages. That data now stands at risk due to the vulnerability, which obviously is causing major concern for end-users and website owners alike. More than a half a million websites are already currently at risk.

Read More [fa icon="long-arrow-right"]

Microsoft Windows Security Essentials

[fa icon="calendar'] Mar 27, 2014 6:15:24 AM / by Christian Crank posted in Cisco, Cybersecurity, Microsoft, Uncategorized

[fa icon="comment"] 0 Comments

As the OS of choice for many businesses, Microsoft Windows houses the sensitive data of banks, hospitals and corporations. In fact, as one of the most prevalently used operating systems out there, malware authors have an affinity for attacking anything Windows—it’s their go-to playground.  In order to properly defend Windows security, you’ll need to configure a lot more than just a firewall. You’ll need a myriad of tools, techniques and tricks to outsmart the bad guys and protect your Windows system. But no worries: our Microsoft Windows Security Essentials course will teach you just that.

Read More [fa icon="long-arrow-right"]

The Ever-Essential Java Programming Language

[fa icon="calendar'] Jul 8, 2013 4:25:24 AM / by Ryan Corey posted in Uncategorized

[fa icon="comment"] 0 Comments

Through no fault of its own, the Java programming language, when it was first developed, failed to reach its intended goal. Sun Microsystems, then a leading maker of workstations, had in mind a language that would be adopted by cable companies for interactive TV. In 1991, however, the cable companies were not quite ready for what Sun had in mind.

Read More [fa icon="long-arrow-right"]

Free CCNA Subnetting Videos Now Available for Download

[fa icon="calendar'] Jan 3, 2013 9:56:23 AM / by Ryan Corey posted in Uncategorized

[fa icon="comment"] 0 Comments

A necessary step in becoming a successful Network professional is tackling the Cisco Certified Network Associate exam. After administering CCNA training courses for many years to hundreds of students, TrainACE’s lead instructor, James Younger, has found that a big trip up for many is understanding the topic of subnetting. James has created a tutorial introducing viewers to the basics of subnetting. Having a strong foundation in this skill will not only set you up to pass the CCNA certification exam, but also for a long, successful networking career. Once you have completed this “Introduction to Subnetting” video, you can further your knowledge by downloading another free, more Advanced Subnetting Video. These easy to follow videos will help explain subnetting in terms that will make sense to viewers.

Read More [fa icon="long-arrow-right"]

How to Make a Career Change in to Information Technology (IT)

[fa icon="calendar'] Jan 11, 2012 12:40:26 PM / by Ryan Corey posted in Jobs, Uncategorized, Network+, A+

[fa icon="comment"] 0 Comments

Information Technology is a reliable industry with continued growth, competitive compensation and a variety of specializations. Even in the recession-ridden decade between 2008 and 2018, job growth in the Information Technology field is expected to grow by approximately 17 percent.

Read More [fa icon="long-arrow-right"]