DoD 8570 Directive and the Certified Ethical Hacker
A further testament to two main trends arose recently when the DoD 8570 directive had Certified Ethical Hacker added to its list of certifications that prove worthiness to work in a certain capacity...
View ArticleBooz Allen Hamilton Hacked – Advanced Persistent Threat Leads the Way
For those readers of the Certified Ethical Hacker blog here that don’t yet know what Advanced Persistent Threat is, you are officially introduced via the recent Booz Allen Hamilton hacking. Advanced...
View ArticleComputer Forensics Training in Miami, FL
Computer forensics is a topic that hackers are paying a lot of attention to lately. Ethical hackers are signing up for computer forensics training in large numbers because the work is now dictating...
View ArticleThe CHFI at Hacker Halted is Soon!
We have been receiving a lot of feedback from readers who have signed up for the CHFI training class at Hacker Halted and the majority of people set to go are extremely happy that they are set to do...
View ArticleWhat Training Comes Next After The Certified Ethical Hacker – How to Advanced...
Ethical hackers attempt to compromise computer systems or networks at the request of the system or network owner. By using the same methodology and resources available to criminal hackers, ethical...
View ArticleFree Mobile Hacking Webinar – A Must Have!
We just came across this webinar coming up by our good friends at Advanced Security by TrainACE. They are offering a free webinar on must-know fundamentals to mobile hacking (Register Here). Advanced...
View ArticleZero Day Exploits are Selling and Being Bought More then Ever
The market for brokering zero day exploits is a hot one. In the last three or four months this industry has taken off quite a bit. There have been many articles on major publications written about the...
View ArticleExamining the Distinguishing Factors of Cyber Security versus IT Security
Little do people realize but Cyber Security is actually quite different from the more generic term, “IT Security”. The National Security Agency (NSA) uses two terms to define cyber security....
View ArticleWhy Security Professionals Need to Know Python
As more IT security professionals use programming as an essential tool, Python has emerged as the language of choice as is found in the emergence of open enrollment training classes such as the one at...
View ArticleFree CEH Exam Study Guide Now Available
For people looking to take the easier route in accomplishing the Certified Ethical Hacker (CEH) certification, there is a free study guide available online. You can download the free CEH exam prep...
View ArticleAnother Free Hacking Seminar? TrainACE Introduces Hacker’s Breakfast on...
Those of you who remember when TrainACE and FireEye teamed up to bring you the first Hacker’s Breakfast will be excited to learn about another installation of the free hacking seminar series! This time...
View ArticleEthical Hacking Training Leads to a Wide Variety of Advanced Cyber Security...
Have you received your Certified Ethical Hacker (CEH) certification or are you in the process of training to do so? After completion of baseline ethical hacking training, penetration testers have a...
View Article
More Pages to Explore .....