Monthly Archives: February 2017

Hacking History: The Chaos Computer Club (CCC)

Chaos Computer Club

Hacking History: The Chaos Computer Club (CCC) The Chaos Computer Club (CCC) is the oldest hacking group (I would even say, oldest hacktivist group) known in history, but also brings us all the way to 1981. Before we go into the CCC’s history, let’s do a little catch up to… Read more »

The Essentials: The ABC’s of Cyber Security

essential cyber security

Essential Cyber Security Terminology Now that cyber security is increasingly in the spotlight, and top-of mind for individuals and businesses, it’s important to know essential cyber security terms to help you navigate the conversations. We have compiled our ABC’s of Cyber Security to provide you this short glossary of terms,… Read more »

How to become a Security Architect

How to become a Security Architect

How to become a Security Architect Browse our course library and get your career path started today! What is a Security Architect? A Security Architect’s main objective is to develop and test security tools and infrastructure in order to protect an organization’s network and systems. Security Architects need to be… Read more »

Hacking History: Rene Carmille

Rene Carmille and Nazi punch cards

Hacking History: Rene Carmille Moving away from Poland and England, there are still historical hackers to be found throughout WWII. One of the greatest heroes of the war was Rene Carmille, French Army General Comptroller. Rene Carmille is often also credited as “the first hacker” for his work, defying the… Read more »

How to become a Penetration Tester

penetration tester

How to become a Penetration Tester Browse our course library and get your career path started today! What is an Penetration Tester? At the heart of it, a Penetration Tester is someone who performs penetration tests on an organization’s networks, systems, apps, etc. to find vulnerabilities for the organization to… Read more »

Hacking History: Bletchley Park

Women of Bletchley Park

Hacking History: Bletchley Park Bletchley Park, known as one of Britain’s best-kept-secrets (until recently) was the home of the Government Code and Cypher School (GCCS) where codebreakers worked tirelessly to decipher Nazi codes during World War II. As mentioned in my last two posts of this series, Bletchley Park housed… Read more »

CyberTraining 365 partners with ICMCP offering world-class Cyber Security Training

cyber security training

CyberTraining 365 Cyber Security Training for ICMCP We are proud to announce our newest scholarship for the International Consortium of Minority Cybersecurity Professionals (ICMCP). Offering 100 ICMCP Members with 6 months of free access to our online academy, CyberTraining 365 hopes to give those new to cybersecurity the skills they need to… Read more »

Women in Tech: Cyber Security- Vidya Sekhar

Women in Tech Women in Cyber Security

Women in Tech: Cyber Security- Vidya Sekhar As an educational service, we have been very interested in how to help correct the gender disparity associated with the tech industry, specifically in cyber security. We were pleased at both the insight and great advice Ravila White shared with us in our… Read more »

How to become a Malware Analyst

How to become a Malware Analyst

How to become a Malware Analyst Browse our course library and get your career path started today! What is a Malware Analyst? A Malware Analyst is just as it sounds, an analyzer of malware. Examining malicious software, the malware analyst often works closely with Incident Responders, and perhaps even Computer… Read more »

Hacking History: Alan Turing

Hacking History

Hacking History: Alan Turing Alan Turing, sometimes known as the “Father of the Computer” (though I’d be more inclined to call him Grandfather of the Computer) and now widely known as the main character in “The Imitation Game”, is one of the most noted hackers of WWII as well as… Read more »