Category Archives: Department of Defence

Train-Up or Hire-In? The Pros and Cons of IT Security Training

training or hiring

Train-Up or Hire-In? The Pros and Cons of IT Security Training Whether you’ve been hit with an attack, or are just seeing all the breaches happening in the news daily, you may be concerned that your security tools are just not going to cut it anymore. Along with data security… Read more »

How to become a CISO

CISO

How to become a CISO Browse our course library and get your career path started today! What is a CISO? CISO stands for Chief Information Security Officer. The CISO is part of a company’s C-suite, or senior-level executive board. CISOs are expected to focus on the maturity level of the… Read more »

Hacking History: LOD vs. MOD Part 2 [The Hacker Gang War]

Legion of Doom Masters of Deception

Hacking History: LOD vs. MOD Part 2 [The Hacker Gang War] Last week, I started the story of two of the most infamous hacker gangs of the 1980’s: the Legion of Doom and the Masters of Deception. The second part of this story gets a bit more ambiguous, considering the… Read more »

The Big Cyber Threats Breakdown: Types of Cyber Attacks

cyber threats types of cyber attacks

The Big Cyber Threats Breakdown: Types of Cyber Attacks Last year, I published a series breaking down various cyber threats: how they work, infamous case studies and how to defend yourself against them. In this post, I have compiled the entire list amounting to nine types of cyber-attacks. I’ve added… Read more »

How to become an Incident Responder

incident responder

How to become an Incident Responder Browse our course library and get your career path started today! What is an Incident Responder? In a nutshell, an Incident Responder is responsible for responding to threats and security events. Sounds simple enough, but these are highly-skilled cybersecurity experts who have mastered everything… Read more »

NEW COURSE: Ethical Hacking with Python

ethical hacking with python

New Course: Ethical Hacking with Python Python is the most widely used scripting language for cyber security tools. In this socket programming with Python course, students will first learn the fundamentals of all things Python. These fundamentals range from understanding how to crat simple lines of code, using variables and… Read more »

5 Steps to Increase Your Company’s Cyber Security Awareness

Increase your company's cyber security awareness

5 Steps to Increase Your Company’s Cyber Security Awareness Just over a month ago, I published a blog with 5 Steps to Increase Your Cyber Security Awareness. This is the follow up so that you can have great personal cyber security, preventative practices and safe-guard your entire company as well…. Read more »

How to become a Forensic Computer Analyst

how to become a forensic computer analyst

How to become a Forensic Computer Analyst Browse our course library and get your career path started today! What is a Forensic Computer Analyst? A Forensic Computer Analyst (or Forensic Computer Investigator) works with law enforcement and private entities to identify systems and networks which have been compromised from criminal… Read more »

#CyberHeadlines: Businesses Invest in Filling the Skills-Gap

#CyberHeadlines

Businesses Invest in Filling the Skills-Gap HealthDataManagement.com compared multiple reports which have been recently published about organizations combatting the growing skills-gap with spending increases in their data security endeavors. Looking at reports by Thales, Crowd Research Partners, the Center for Cyber Safety and Education as well as the 2017 Cybersecurity… Read more »

Hacking History: The 414s

the 414s

Hacking History: The 414s The 80’s Hacker Craze In the early 1980’s the internet and home-computer were relatively new and had yet to be accounted for, in the United States legal system. Innovation and progress moved faster than the bureaucratic system could keep up with, let alone predict. In 1983… Read more »