Tag Archives: Training

Tenable Network Security Partnership Announcement

Tenable Network Security Partnership Announcement With CyberTraining 365 being the best destination for furthering your cybersecurity training and education, and Tenable Network Security providing technologies eliminating blind spots, prioritizing threats and reducing exposure and loss, the benefits of a partnership between us were easy to see. Tenable Network Security is… Read more »

Computer Hacking Forensic Investigator [CHFI] Certification Training

Computer Hacking Forensic Investigator [CHFI] Certification Training The EC-Council’s CHFI certificate provides vendor-neutral recognition of the specific security discipline of computer forensics. With top experts and an interactive, lab filled environment, students learn advanced knowledge and experience major forensic investigation scenarios enabling acquirement of hands-on experience on various forensic investigation…. Read more »

CompTIA Network+ Certification Training

Network+ Certification Training

CompTIA Network+ Certification Training CompTIA’s Network+ certification training readies students for a vendor neutral certification making IT professionals gain expertise in configuring, managing, installing, troubleshooting and maintaining basic computer networks. With top experts and an interactive, lab filled environment, students gather essential knowledge of network configuration, technologies and installations as… Read more »

NICE Compliant Courses

CyberTraining 365 is an all-encompassing, cybersecurity, e-learning platform with dozens of courses for certification prep as well as keeping up with current trends in the field. Recently, many courses on CyberTraining 365 have been recognized by the National Initiative for Cybersecurity Education (NICE) and the National Initiative for Cybersecurity Careers… Read more »

5 Shocking Findings from the 2015 Global Cybersecurity Status Report

In preparation for the US State of the Union address in 2015, the Information Systems Audit and Control Association (ISACA) surveyed 3,439 ISACA members for the 2015 Global Cybersecurity Status Report (read more on the report here) to gain better understanding of the largest concerns in the cybersecurity field in… Read more »

5 Reasons DevOps and Cybersecurity are a Match Made in Heaven

A Heavenly Match for your IT Department 5 Reasons DevOps and Cybersecurity are a Match Made in Heaven DevOps is about creating possibilities; security is about shutting down access. DevOps tell customers “Yes!” while security tells criminals “No.” DevOps is tired of security slowing down the software development lifecycle; security… Read more »

Let’s Up Your Password Game

secure passwords

Between your cloud service, e-mail account, online banks, e-commerce accounts and the rest of your internet-centric life; it sometimes impossible to be continually coming up with creative and secure passwords. Perhaps this is why people still rely on simple numerical and alphabetical passwords, but we all know better, right? Well… Read more »

CyberSecurity Headlines: Safely Discarding Hard Drives

Announcements: Cyber Security Think Tank is now CyberTraining 365! We have added a new course towards Comptia’s A+ Certification on our site. Get all of the information about the certification here There are a few key ways to safely discard a solid state drive. One way to do is to… Read more »

CyberTraining 365 is a Finalist for Best Cybersecurity Education Provider Award

We are proud to announce we have been nominated as a finalist in the category Best Cybersecurity Education Provider of the Cybersecurity Excellence Awards! As we have been fervently pursuing our mission to make cybersecurity training accessible to the masses and fill the skill gap, this is a huge step… Read more »

The FDIC Framework and the 4 Components of a Successful Cyber Security Program

The FDIC Cyber Security Framework The NIST (Institute of Standards and Technology) defines cyber security as “the process of protecting information by preventing, detecting and responding to attacks.” In 2013, the President Barack Obama issued Executive Order 13636 “Improving Critical Infrastructure Cyber Security”, delegating the development of a cyber security… Read more »