Category Archives: Education

#CyberHeadlines: Santa gets Hacked

#CyberHeadlines: Santa gets Hacked   Father Frost Himself In Russia, thousands of kids have already been submitting letters online to Father Frost (the Russian Santa Clause) via a multitude of websites. Last week, it was found that 55 of these websites had been compromised and were publishing the first and… Read more »

CompTIA Security+ Certification Prep Course Preview (Special Offer Inside)

#CyberWeek2016: CompTIA Security+ Certification Prep   For a limited time get this course for only $10 ($150 off original price) on Udemy – https://www.udemy.com/comptia-security-plus-certification-prep/?couponCode=CYBERWEEK16 CompTIA Security+ Training The CompTIA S+ certificate is globally recognized for validating foundational, vendor-neutral IT security knowledge and skills. In this course, EC-Council certified trainer Timber Wolfe,… Read more »

CHFI (Computer Hacking Forensic Investigator) EC-Council Course Trailer (Special Offer Inside)

#CyberWeek2016: CHFI (Computer Hacking Forensic Investigator) For a limited time get this course for $10 ($150 off original price) on Udemy – https://www.udemy.com/computer-hacking-forensic-investigator/?couponCode=CYBERWEEK16 EC-Council’s CHFI Training The EC-Council’s Computer Hacking Forensic Investigator (CHFI) certificate provides vendor-neutral recognition of the specific security discipline of computer forensics. In this course, EC-Council certified instructor Bally… Read more »

Certified Ethical Hacker Bootcamp (CEH v9) (Special Offer Inside)

#CyberWeek2016: EC-Council Certified Ethical Hacker Bootcamp For a limited time Get this course for $10 ($190 off original price) on Udemy – https://www.udemy.com/certified-ethical-hacker-bootcamp-with-practice-exams-bundle/?couponCode=CYBERWEEK16 EC-Council’s CEH Certificate Training The EC-Council’s CEH certificate is paramount for any IT specialist and anyone trying to enhance their network’s defenses. In this course, EC-Council certified trainer Timber Wolfe,… Read more »

The ABC’s of Cybersecurity: P- T

The ABC’s of Cybersecurity: P-T Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber… Read more »

The ABC’s of Cybersecurity: K- O

The ABC’s of Cybersecurity: K-O Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber… Read more »

The ABC’s of Cybersecurity: F- J

The ABC’s of Cybersecurity: F- J Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of… Read more »

The ABC’s of Cybersecurity: A-E

The ABC’s of Cybersecurity: A-E Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber… Read more »

Cyber Threats: Network Probes

cyber threats types of cyber attacks

Cyber Threats: Network Probes Network Probes are not an immediate threat. However, they do indicate that someone is casing your system for possible entry points for attack. It’s a network monitor which analyzes protocols and network traffic (in real-time). There are positive and helpful uses for network probes. Using a… Read more »

CyberSecurity Headlines: Hack the Pentagon, North Korea and Pokemon Go

CyberSecurity Headlines: Hack the Pentagon, North Korea’s Cyber Army and Pokemon Go In the ever-changing landscape of CyberSecurity, it’s hard to keep up sometimes. Luckily, we’re here to keep you in the loop with all the current white-hat, grey-hat and black-hat hacker news of the day. Today, I sit down… Read more »