TrainACE - IT and Cybersecurity Training Blog

How to Get CISA Certified and why it's Worth It

[fa icon="calendar'] Aug 13, 2014 9:00:46 AM / by Jackie Somma posted in Uncategorized

[fa icon="comment"] 1 Comment

A CISA, or Certified Information Systems Auditor, certification is recognized by almost all employers across a large variety of industries. The CISA certification is best described as an all-inclusive information systems audit qualification. The certification requires an applicant to be knowledgeable about information technology and general aspects of business. While there are other IT audit certifications available, they don't have the same universal acceptance as CISA. Those who are CISA certified have illustrated their IT skills and their capability to tackle auditing tasks.

Read More [fa icon="long-arrow-right"]

TrainACE 2014 Cyber Security Survey

[fa icon="calendar'] Jun 25, 2014 9:00:54 AM / by Jackie Somma posted in Uncategorized

[fa icon="comment"] 2 Comments

Ever wondered what other businesses are doing to protect their organizations from cyber threats? Well, no need to wonder any longer…we’ve done all the work for you! We recently conducted a survey of over 200 people within the field regarding the cyber security practices in their workplace, and discovered some interesting facts. Most companies indicate that defending against phishing and social engineering attacks is priority and express deep concern about web-facing applications. However, though these companies are concerned about security breaches, they say they know exactly what to do in the face of a cyber incident. Our survey features over 21 in-depth insights about cyber security practices within the workplace. Want more information? Download a copy of the results of the official TrainACE 2014 Cyber Security Survey today!

Read More [fa icon="long-arrow-right"]

Help?!?! Which New Look Suits us Best?

[fa icon="calendar'] Jun 23, 2014 3:06:46 PM / by Jackie Somma posted in Uncategorized

[fa icon="comment"] 10 Comments

Advanced Security has been providing the global community with elite cyber security training since 2001. We are dedicated to providing top-grade training for our students. We want to ensure that our students receive a positive learning experience.

Read More [fa icon="long-arrow-right"]

Is TrueCrypt now unsafe?

[fa icon="calendar'] May 29, 2014 1:46:10 PM / by Christian Crank posted in cybersecurity, encryption, networking, truecrypt, Uncategorized

[fa icon="comment"] 0 Comments

Do you use TrueCrypt? You might not want to now. It seems as though the main SourceForge page for TrueCrypt has been defaced, though it might just be legitimate. How do I know? The first line on the page reads as follows: "WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues." While many people thought it was a hoax or that TrueCrypt got hacked, the newest application that was pushed out only allows you to decrypt and migrate data, not encrypt data, was signed with the TrueCrypt private key, ensuring its legitimacy.

Read More [fa icon="long-arrow-right"]

Computer Forensics Evidence Collection

[fa icon="calendar'] Apr 16, 2014 5:00:53 AM / by Christian Crank posted in Uncategorized

[fa icon="comment"] 0 Comments

Do you understand the impact of digital technology on business? Once stored entirely on paper, business information, business accounts and business activities are now pretty much all in digital form. While this makes the organization and management of company information easier, the move to all things digital also poses a huge threat to businesses. Now more than ever, hackers have easier access to sensitive business information, and they can gain a hold of it within minutes. What results is a real-life digital crime scene, but unlike a “physical” crime scene, retracing digital steps can be extremely tricky. This where Computer Forensics Analysts are called in: they are responsible for decoding a digital crime scene, piecing together digital forensics information to solve a mystery.

Read More [fa icon="long-arrow-right"]

Using OpenSSL? Heartbleed Bug may be affecting you now.

[fa icon="calendar'] Apr 9, 2014 10:45:08 AM / by Christian Crank posted in cyber, cybersecurity, encryption, openssl, security, Uncategorized

[fa icon="comment"] 0 Comments

Security researchers have recently discovered a major vulnerability in widely used encryption software that could potentially cause widespread, severe damage to the private data of millions of people around the globe. OpenSSL is a cryptologic software that used by millions of websites throughout the internet to encrypt communications between users and webpages. That data now stands at risk due to the vulnerability, which obviously is causing major concern for end-users and website owners alike. More than a half a million websites are already currently at risk.

Read More [fa icon="long-arrow-right"]

Take Our Cyber Security Survey - Win An iPad

[fa icon="calendar'] Apr 9, 2014 9:36:03 AM / by Katrina Lowe posted in Uncategorized

[fa icon="comment"] 0 Comments

With the recent surge of data breaches at major corporations, several businesses are revisiting their cyber security infrastructure. Are the current methods in place strong enough to safeguard sensitive data? Or is there an immediate need to amend the network?

Read More [fa icon="long-arrow-right"]

Network Security Fundamentals

[fa icon="calendar'] Apr 9, 2014 3:00:23 AM / by Christian Crank posted in Uncategorized

[fa icon="comment"] 0 Comments

Need a refresher on the basics of network security? Our Self-Paced Online Network Security Fundamentals training can help. Split into two separate classes that can be taken together or independently, you’ll learn how handle security threats and all about the tools that protect and defend computer networks.

Read More [fa icon="long-arrow-right"]

Ethical Hacking Tools and Techniques

[fa icon="calendar'] Apr 4, 2014 8:00:16 AM / by Christian Crank posted in Uncategorized

[fa icon="comment"] 0 Comments

Are you a fan of hacking? Do you love breaking down firewalls? Have you been attacked and want to understand the knowledge yourself? Want to break into systems without getting penalized for it? If you answered yes to any of the above questions, our Online Ethical Hacking Methods training is for you.

Read More [fa icon="long-arrow-right"]

Microsoft Windows Security Essentials

[fa icon="calendar'] Mar 27, 2014 6:15:24 AM / by Christian Crank posted in advanced security, Cisco, cybersecurity, Microsoft, security training, Uncategorized

[fa icon="comment"] 0 Comments

As the OS of choice for many businesses, Microsoft Windows houses the sensitive data of banks, hospitals and corporations. In fact, as one of the most prevalently used operating systems out there, malware authors have an affinity for attacking anything Windows—it’s their go-to playground.  In order to properly defend Windows security, you’ll need to configure a lot more than just a firewall. You’ll need a myriad of tools, techniques and tricks to outsmart the bad guys and protect your Windows system. But no worries: our Microsoft Windows Security Essentials course will teach you just that.

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802


TrainACE Catalog

Lists by Topic

see all