Category Archives: Education

Acunetix Partnership Announcement

Acunetix Partnership Announcement CyberTraining 365 is the best destination for furthering your cybersecurity training and education. We make it our priority to give you comprehensive understanding of classic cybersecurity methods and techniques as well as giving you access to the most relevant, up-to-date technologies available. This is why we’ve partnered… Read more »

Rapid7 Partnership Announcement

Rapid7 Partnership Announcement With CyberTraining 365 being the best destination for furthering your cybersecurity training and education, and Rapid7 having top-notch threat exposure management, incident detection and response, and security advisory services, a partnership between us just makes sense. Rapid7 is trusted by many popular, quality brands including Microsoft, IBM,… Read more »

Cyber Threats: Spear Phishing Attack

cyber threats types of cyber attacks

  Cyber Threats: Spear Phishing Attack A Spear phishing attack is among the most popular entry points of cybersecurity breaches. According to a report from Trend Micro, 91% of cyberattacks are initiated by a spear phishing email. A spear phishing attack requires advanced hacking skills and are very hard to detect because… Read more »

Cyber Threats: Phishing Attacks

cyber threats types of cyber attacks

Cyber Threats: Phishing Attacks Phishing Attacks are the primary vector for malware attacks and are usually comprised of a malicious e-mail attachment or an e-mail with a malicious link. Phishing e-mails typically, falsely claim to be an established or legitimate enterprise. Once the malicious attachment or link has been opened, users are… Read more »

Protected: CounterTack Partnership Announcement

Manpreet Wadan   July 5, 2016   Enter your password to view comments.

Cyber Threats: Drive-by Download Attacks

cyber threats types of cyber attacks

Cyber Threats: Drive-by Download Attacks Drive-by Download Attacks are ignited simply by a victim clicking a link which, unwittingly to them, injects malicious software onto their computer- or other device. The malware most frequently used in Drive-by Download Attacks are called Trojans. Trojans get their name for their deceitful nature; so… Read more »

Cyber Threats: Advanced Persistent Threat Attack

advanced persistent threat

Cyber Threats: Advanced Persistent Threat Attack The goal of an advanced persistent threat attack (APT attack) is to maintain covert, ongoing access to a network. This allows hackers to continuously gather valid user credentials and access to more, and more, valuable information. An Advanced persistent threat attack aims to gather information rather… Read more »

Cyber Threats: Distributed Denial of Services (DDoS) Attacks

Cyber Threats: Distributed Denial of Services (DDoS) Attacks DDoS attacks are one of the most common attacks used to compromise an organization’s system. They are a type of DOS attack which use multiple compromised systems to target a single system. These compromised systems are typically infected with a Trojan and… Read more »

Tenable Network Security Partnership Announcement

Tenable Network Security Partnership Announcement With CyberTraining 365 being the best destination for furthering your cybersecurity training and education, and Tenable Network Security providing technologies eliminating blind spots, prioritizing threats and reducing exposure and loss, the benefits of a partnership between us were easy to see. Tenable Network Security is… Read more »

Security Analyst Certification [CSA] Training

Security Analyst Certification [CSA] Training The EC-Council’s CSA certificate validates information security professionals’ understanding of, and experience with, conducting realistic penetration tests. With top experts and an interactive, lab-filled environment, students learn advanced knowledge and experience regarding the available methodologies, tools and techniques which are required to perform comprehensive information… Read more »