Tag Archives: hacking

Cyber Threats: Distributed Denial of Services (DDoS) Attacks

Cyber Threats: Distributed Denial of Services (DDoS) Attacks DDoS attacks are one of the most common attacks used to compromise an organization’s system. They are a type of DOS attack which use multiple compromised systems to target a single system. These compromised systems are typically infected with a Trojan and… Read more »

Computer Hacking Forensic Investigator [CHFI] Certification Training

Computer Hacking Forensic Investigator [CHFI] Certification Training The EC-Council’s CHFI certificate provides vendor-neutral recognition of the specific security discipline of computer forensics. With top experts and an interactive, lab filled environment, students learn advanced knowledge and experience major forensic investigation scenarios enabling acquirement of hands-on experience on various forensic investigation…. Read more »

CompTIA Security + Certification Training

CompTIA Security+ Certification Training CompTIA’s Security+ certificate is globally recognized for validating foundational, vendor-neutral IT security knowledge and skills. With top experts and an interactive, lab filled environment, students gain essential knowledge of the principals for network security and risk management with competency in organizational security, system security, access control… Read more »

NICE Compliant Courses

CyberTraining 365 is an all-encompassing, cybersecurity, e-learning platform with dozens of courses for certification prep as well as keeping up with current trends in the field. Recently, many courses on CyberTraining 365 have been recognized by the National Initiative for Cybersecurity Education (NICE) and the National Initiative for Cybersecurity Careers… Read more »

5 Shocking Findings from the 2015 Global Cybersecurity Status Report

In preparation for the US State of the Union address in 2015, the Information Systems Audit and Control Association (ISACA) surveyed 3,439 ISACA members for the 2015 Global Cybersecurity Status Report (read more on the report here) to gain better understanding of the largest concerns in the cybersecurity field in… Read more »

Let’s Up Your Password Game

secure passwords

Between your cloud service, e-mail account, online banks, e-commerce accounts and the rest of your internet-centric life; it sometimes impossible to be continually coming up with creative and secure passwords. Perhaps this is why people still rely on simple numerical and alphabetical passwords, but we all know better, right? Well… Read more »

CyberSecurity Headlines: Cracking Wireless Networks

In this video, we crack a router that speaks WEP. Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE Wireless Fidelity standard. This was the first standard developed for cybersecurity protection. Despite WEP being a bit out-dated it is not uncommon to see. However, more common encryption… Read more »

(Re)Introducing Ourselves: CyberTraining 365

Self reflection is crucial to making conscious choices about one’s identity. We often build constructs reflecting our perception of the world which, once labeled, become who we are. This is true for individuals as well as businesses and often requires reassessment to break down preconceived personas and more accurately portray… Read more »

Friday Cyber Headlines (Video): Locky Malware, LA Hospital Ransomware, IoTs

Video Blog: In this episode I sit down with Professor Dennis Skarr to discuss the top cyber security stories of the week. Locky Malware LA Hospital Ransomware Attack Explaining IoTs (Internet of Things)

ATM Malware Discussion with Daniel Regalado (Author: Gray Hat Hacking)

Video Post: In this Vlog Bally, CTO Cyber Security Think Tank, has a discussion with Daniel Regalado, author of Gray Hat Hacking, around different tools and practices hackers use to break into ATMs. Daniel talks about hackers working with crooked bank employees and installing malware like Ploutus to get money out of… Read more »