Category Archives: Department of Defence

How to become an Incident Responder

incident responder

How to become an Incident Responder Browse our course library and get your career path started today! What is an Incident Responder? In a nutshell, an Incident Responder is responsible for responding to threats and security events. Sounds simple enough, but these are highly-skilled cybersecurity experts who have mastered everything… Read more »

NEW COURSE: Ethical Hacking with Python

ethical hacking with python

New Course: Ethical Hacking with Python Python is the most widely used scripting language for cyber security tools. In this socket programming with Python course, students will first learn the fundamentals of all things Python. These fundamentals range from understanding how to crat simple lines of code, using variables and… Read more »

5 Steps to Increase Your Company’s Cyber Security Awareness

Increase your company's cyber security awareness

5 Steps to Increase Your Company’s Cyber Security Awareness Just over a month ago, I published a blog with 5 Steps to Increase Your Cyber Security Awareness. This is the follow up so that you can have great personal cyber security, preventative practices and safe-guard your entire company as well…. Read more »

How to become a Forensic Computer Analyst

how to become a forensic computer analyst

How to become a Forensic Computer Analyst Browse our course library and get your career path started today! What is a Forensic Computer Analyst? A Forensic Computer Analyst (or Forensic Computer Investigator) works with law enforcement and private entities to identify systems and networks which have been compromised from criminal… Read more »

#CyberHeadlines: Businesses Invest in Filling the Skills-Gap

#CyberHeadlines

Businesses Invest in Filling the Skills-Gap HealthDataManagement.com compared multiple reports which have been recently published about organizations combatting the growing skills-gap with spending increases in their data security endeavors. Looking at reports by Thales, Crowd Research Partners, the Center for Cyber Safety and Education as well as the 2017 Cybersecurity… Read more »

Hacking History: The 414s

the 414s

Hacking History: The 414s The 80’s Hacker Craze In the early 1980’s the internet and home-computer were relatively new and had yet to be accounted for, in the United States legal system. Innovation and progress moved faster than the bureaucratic system could keep up with, let alone predict. In 1983… Read more »

#CyberHeadlines: Cloudflare’s CloudBleed

#CyberHeadlines

CloudBleed, the Cloudflare Vulnerability In late February, Tavis Ormandy, Google security researcher, contacted Cloudflare, the web performance and security company, about a memory leak happening in their system due to a parser bug. Many companies, such as Salesforce, Uber and OK Cupid, use Cloudflare who touts Performance, Security Reliability and… Read more »

#CyberHeadlines: 1st Practical SHA-1 Collision Attack

#CyberHeadlines

The 1st Practical SHA-1 Collision Attack Researchers from Google, the Cryptology Group at Centrum Wiskunde and Informatica in Amsterdam, published a paper last week about the first practical collision attack for the cryptographic hash function SHA-1. The attack method entails the collision of two PDF files by obtaining the SHA-1 signature… Read more »

#CyberHeadlines: AWS Outage, Dridex Update, Boeing Faux-Pas

#CyberHeadlines

AWS Outage, Dridex Update, Boeing Faux-Pas A lot of big cyber security news happened at the end of February, here are some of the biggest stories, we thought you need to know about. Amazon Web Services Outage February 28th, Amazon’s oldest AWS server had an outage, taking many sites down… Read more »

How to become a Network Security Administrator

how to become a network security administration

How to Become a Network Security Administrator Browse our course library and get your career path started today! What is a Network Security Administrator? The Network Security Administrator (or Systems Administrator) is a jack-of-all-trades in the security sector. Ultimately, it’s the Network Security Administrator’s job to keep an organization’s network… Read more »