Category Archives: Training

Am I being hacked? 4 ways to tell if your system’s been compromised

am I being hacked

  Am I being hacked? 4 ways to tell if your system’s been compromised How do you tell if your computer or accounts have been hacked? Below are four, easy ways to tell if your system and/or accounts have been compromised. If you suspect your system or accounts are under… Read more »

Women in Tech: National Cyber Security Organizations

National Cyber Security Organizations

Women in Tech: National Cyber Security Organizations After working with Women in Cyber Security (WiCyS) recently, as a sponsor of their yearly conference, I was curious about what other great organizations were making similar efforts to champion women in the information security and privacy field. As I began my search, I… Read more »

How to become a Cyber Security Expert

How to become a Cyber Security Expert The cyber security job market is severely lacking in qualified applicants. Our mission is to help fill this skills-gap with quality cyber security training for recognized certifications as well as up-to-date threats and defense techniques. It is clear, however, that certifications are not… Read more »

Train-Up or Hire-In? The Pros and Cons of IT Security Training

training or hiring

Train-Up or Hire-In? The Pros and Cons of IT Security Training Whether you’ve been hit with an attack, or are just seeing all the breaches happening in the news daily, you may be concerned that your security tools are just not going to cut it anymore. Along with data security… Read more »

How to become a CISO

CISO

How to become a CISO Browse our course library and get your career path started today! What is a CISO? CISO stands for Chief Information Security Officer. The CISO is part of a company’s C-suite, or senior-level executive board. CISOs are expected to focus on the maturity level of the… Read more »

Cyber Security: Still among the Biggest Challenges for Businesses

business challenges

Cyber Security: Still among the Biggest Challenges for Businesses The cyber landscape is becoming increasingly complex and concerning for businesses. Many are at a loss as to what to do. Many large corporations, government agencies and other institutions (especially in the health care and financial sectors) have been targets of… Read more »

Hacking History: LOD vs. MOD Part 2 [The Hacker Gang War]

Legion of Doom Masters of Deception

Hacking History: LOD vs. MOD Part 2 [The Hacker Gang War] Last week, I started the story of two of the most infamous hacker gangs of the 1980’s: the Legion of Doom and the Masters of Deception. The second part of this story gets a bit more ambiguous, considering the… Read more »

The Big Cyber Threats Breakdown: Types of Cyber Attacks

cyber threats types of cyber attacks

The Big Cyber Threats Breakdown: Types of Cyber Attacks Last year, I published a series breaking down various cyber threats: how they work, infamous case studies and how to defend yourself against them. In this post, I have compiled the entire list amounting to nine types of cyber-attacks. I’ve added… Read more »

How to become an Information Security Analyst

How to become an Information Security Analyst

How to become an Information Security Analyst Browse our course library and get your career path started today! What is an Information Security Analyst? An information Security Analyst is typically an organization’s first line of defense against cyber-attacks and vulnerabilities, working with a team to manage access control and reporting… Read more »

Hacking History: LOD vs. MOD Part 1. [The Gangs Form]

Legion of Doom Masters of Deception

Hacking History: LOD vs. MOD Part 1. [The Gangs Form] In the early 1980’s, around the same time the 414s and Chaos Computer Club formed, many hacker groups started popping up all around the world. One of the earliest of these groups was the Knights of Shadow. Hacker groups recruited… Read more »