Author Archives: Bally

How to become an Incident Responder

incident responder

How to become an Incident Responder Browse our course library and get your career path started today! What is an Incident Responder? In a nutshell, an Incident Responder is responsible for responding to threats and security events. Sounds simple enough, but these are highly-skilled cybersecurity experts who have mastered everything… Read more »

NEW COURSE: Ethical Hacking with Python

ethical hacking with python

New Course: Ethical Hacking with Python Python is the most widely used scripting language for cyber security tools. In this socket programming with Python course, students will first learn the fundamentals of all things Python. These fundamentals range from understanding how to crat simple lines of code, using variables and… Read more »

How to become a Forensic Computer Analyst

how to become a forensic computer analyst

How to become a Forensic Computer Analyst Browse our course library and get your career path started today! What is a Forensic Computer Analyst? A Forensic Computer Analyst (or Forensic Computer Investigator) works with law enforcement and private entities to identify systems and networks which have been compromised from criminal… Read more »

#CyberHeadlines: Businesses Invest in Filling the Skills-Gap

#CyberHeadlines

Businesses Invest in Filling the Skills-Gap HealthDataManagement.com compared multiple reports which have been recently published about organizations combatting the growing skills-gap with spending increases in their data security endeavors. Looking at reports by Thales, Crowd Research Partners, the Center for Cyber Safety and Education as well as the 2017 Cybersecurity… Read more »

#CyberHeadlines: Cloudflare’s CloudBleed

#CyberHeadlines

CloudBleed, the Cloudflare Vulnerability In late February, Tavis Ormandy, Google security researcher, contacted Cloudflare, the web performance and security company, about a memory leak happening in their system due to a parser bug. Many companies, such as Salesforce, Uber and OK Cupid, use Cloudflare who touts Performance, Security Reliability and… Read more »

#CyberHeadlines: 1st Practical SHA-1 Collision Attack

#CyberHeadlines

The 1st Practical SHA-1 Collision Attack Researchers from Google, the Cryptology Group at Centrum Wiskunde and Informatica in Amsterdam, published a paper last week about the first practical collision attack for the cryptographic hash function SHA-1. The attack method entails the collision of two PDF files by obtaining the SHA-1 signature… Read more »

#CyberHeadlines: AWS Outage, Dridex Update, Boeing Faux-Pas

#CyberHeadlines

AWS Outage, Dridex Update, Boeing Faux-Pas A lot of big cyber security news happened at the end of February, here are some of the biggest stories, we thought you need to know about. Amazon Web Services Outage February 28th, Amazon’s oldest AWS server had an outage, taking many sites down… Read more »

How to become a Network Security Administrator

how to become a network security administration

How to Become a Network Security Administrator Browse our course library and get your career path started today! What is a Network Security Administrator? The Network Security Administrator (or Systems Administrator) is a jack-of-all-trades in the security sector. Ultimately, it’s the Network Security Administrator’s job to keep an organization’s network… Read more »

The Essentials: The ABC’s of Cyber Security

essential cyber security

Essential Cyber Security Terminology Now that cyber security is increasingly in the spotlight, and top-of mind for individuals and businesses, it’s important to know essential cyber security terms to help you navigate the conversations. We have compiled our ABC’s of Cyber Security to provide you this short glossary of terms,… Read more »

How to become a Security Architect

How to become a Security Architect

How to become a Security Architect Browse our course library and get your career path started today! What is a Security Architect? A Security Architect’s main objective is to develop and test security tools and infrastructure in order to protect an organization’s network and systems. Security Architects need to be… Read more »