TrainACE is ecstatic to announce that we have been individually selected to run one of the first (CND) Certified Network Defender experience classes in the world. We are one of twenty-one training organizations that were chosen world-wide by the EC Council to instruct this game changing program. Certified Network Defender might just change the world!
TrainACE is now a MyCAA approved school accepting military spouse scholarships for our training courses.
Another year has come and gone, and in just a few short weeks we will ring in 2016. This time of year, we tend to reflect on our successes and failures and create a plan for the new year ahead. What changes do you want to make in 2016? Today, I am going to inform you about something I can guarantee is not changing in 2016--- the rapidly growing demand for information security jobs.
“We have some of the best training organizations representing EC-Council across the globe and they have again demonstrated the commitment to high quality training, winning them awards again this year”, said Jay Bavisi, President of EC-Council.
The winners have been announced for the annual EC-Council Global Awards (drum roll...) and TrainACE has been chosen again for the 2015 EC-Council Circle of Excellence Award in North America! Winners are carefully selected from over a network of 700 training centers across the world after meeting a strict criteria set by the EC-Council Awards Committee. Award-winning training centers are recognized for their high standards of professionalism which TrainACE strives to uphold to guarantee our students with a high-quality learning environment. The Circle of Excellence Award is given to the top five accredited centers in the each region of the world and TrainACE is honored to be one of them!
Take a moment to think about the array of passwords you have created overtime. It’s very likely that you have so many passwords that you can’t possibly remember them all, or on the reverse side, you could be someone who uses the same password for all of your login credentials. Either way your passwords could be putting your online security at risk. These days, just about every system that stores data requires a password. It is the first barrier between a hacker and sensitive information. When creating passwords, there are several rules you should follow in order to keep stored information secure. Here are a few helpful do's and don'ts for proper password management.
The Internet of Things has been the center of numerous discussions involving tech industry experts, analysts, CIOs and more. While there is a substantial amount of excitement surrounding the possibilities associated with the IoT, there has also been a substantial amount of concern from IT techs and CIOs when it comes to security and the protection of sensitive data. While the tech world has been bombarded with all types of reports, white papers and articles suggesting that the IoT will result is a significant change in the corporate IT structure, the IoT will also impact the private consumer as well; however, the greatest concern on deck at the moment is the magnitude of the impact that the IoT will have on IT departments.
Are you a DC, Maryland or Virginia resident looking for an IT job in your area? You've come to the right place! Take a look at these recent job openings. Make sure to check TrainACE's Blog periodically for updates!