Author Archives: Bally

How to become a Cyber Security Expert

How to become a Cyber Security Expert The cyber security job market is severely lacking in qualified applicants. Our mission is to help fill this skills-gap with quality cyber security training for recognized certifications as well as up-to-date threats and defense techniques. It is clear, however, that certifications are not… Read more »

How to become a CISO

CISO

How to become a CISO Browse our course library and get your career path started today! What is a CISO? CISO stands for Chief Information Security Officer. The CISO is part of a company’s C-suite, or senior-level executive board. CISOs are expected to focus on the maturity level of the… Read more »

The Big Cyber Threats Breakdown: Types of Cyber Attacks

cyber threats types of cyber attacks

The Big Cyber Threats Breakdown: Types of Cyber Attacks Last year, I published a series breaking down various cyber threats: how they work, infamous case studies and how to defend yourself against them. In this post, I have compiled the entire list amounting to nine types of cyber-attacks. I’ve added… Read more »

How to become an Information Security Analyst

How to become an Information Security Analyst

How to become an Information Security Analyst Browse our course library and get your career path started today! What is an Information Security Analyst? An information Security Analyst is typically an organization’s first line of defense against cyber-attacks and vulnerabilities, working with a team to manage access control and reporting… Read more »

How to become an Incident Responder

incident responder

How to become an Incident Responder Browse our course library and get your career path started today! What is an Incident Responder? In a nutshell, an Incident Responder is responsible for responding to threats and security events. Sounds simple enough, but these are highly-skilled cybersecurity experts who have mastered everything… Read more »

NEW COURSE: Ethical Hacking with Python

ethical hacking with python

New Course: Ethical Hacking with Python Python is the most widely used scripting language for cyber security tools. In this socket programming with Python course, students will first learn the fundamentals of all things Python. These fundamentals range from understanding how to crat simple lines of code, using variables and… Read more »

How to become a Forensic Computer Analyst

how to become a forensic computer analyst

How to become a Forensic Computer Analyst Browse our course library and get your career path started today! What is a Forensic Computer Analyst? A Forensic Computer Analyst (or Forensic Computer Investigator) works with law enforcement and private entities to identify systems and networks which have been compromised from criminal… Read more »

#CyberHeadlines: Businesses Invest in Filling the Skills-Gap

#CyberHeadlines

Businesses Invest in Filling the Skills-Gap HealthDataManagement.com compared multiple reports which have been recently published about organizations combatting the growing skills-gap with spending increases in their data security endeavors. Looking at reports by Thales, Crowd Research Partners, the Center for Cyber Safety and Education as well as the 2017 Cybersecurity… Read more »

#CyberHeadlines: Cloudflare’s CloudBleed

#CyberHeadlines

CloudBleed, the Cloudflare Vulnerability In late February, Tavis Ormandy, Google security researcher, contacted Cloudflare, the web performance and security company, about a memory leak happening in their system due to a parser bug. Many companies, such as Salesforce, Uber and OK Cupid, use Cloudflare who touts Performance, Security Reliability and… Read more »

#CyberHeadlines: 1st Practical SHA-1 Collision Attack

#CyberHeadlines

The 1st Practical SHA-1 Collision Attack Researchers from Google, the Cryptology Group at Centrum Wiskunde and Informatica in Amsterdam, published a paper last week about the first practical collision attack for the cryptographic hash function SHA-1. The attack method entails the collision of two PDF files by obtaining the SHA-1 signature… Read more »