Security Training

B8b580348b4e717042d0e394ee072001

My Canons on (ISC)² Ethics - Such as They Are

July 25, 2011 Added by:security curmudgeon

In the email thread between ISC2 general counsel Dorsey Morrow and CISSP holder Boris Sverdlik, one of the replies from Morrow was unbelievable. Not only is the email negligent and libelous, it demonstrates unprofessional behavior and a serious lack of knowledge...

Comments  (17)

065b7cfbbb03ac9d18cbf5ed0615b40a

JNCIE Tips From the Field Summarization Made Easy

July 25, 2011 Added by:Stefan Fouant

Sumarization is a key aspect of practical exams involving routing of some sort. Those who have ever taken a CCIE Routing & Switching or CCIE Service Provider exam can attest, summarization is one thing every expert level candidate needs to master. It is no different with Juniper...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

PFC Parts' Delectable Cyber Security Shopping List

July 19, 2011 Added by:Don Eijndhoven

A study done by the CSIS speaks of a human capital crisis in Cyber Security and may offer some insights that can also be used outside of the US. CSIS mentions that there are a variety of people and skills needed. From the report we learn that CSIS found a shortage in the following roles...

Comments  (2)

850c7a8a30fa40cf01a9db756b49155a

I Am Certified - You Are Secured

July 18, 2011 Added by:J. Oquendo

Security? I don't care for it. Companies don't want security. They do not want assurance. They want a framework to ensure they did no wrong. My goal is simplified ten-fold, and my aim is to ensure that someone on the C-level can cross their T's dot their I's and get on with their game of golf...

Comments  (29)

E973b16363b3de77b360563237df7e32

Software Security Degree Programs

July 17, 2011 Added by:Bozidar Spirovski

More institutions are providing programs and degrees focused on the security aspect of information technology than ever before. Part of the reason for this is the significant projected increase in the number of jobs available in the field...

Comments  (1)

7c5c876d1933023ac375eead04302e1a

Hey ISC2 - Where is the Opt Out Button?

July 15, 2011 Added by:Boris Sverdlik

I am a security researcher, and my presentation at Security Bsides was written in the same form that most “pen testing” classes are. If you are naïve enough to believe that criminals don’t use security tools in their efforts, then my friend it is finally time to hang up that hat...

Comments  (0)

01c4fd4b99c7e58b46a7156c08e722ea

The New CompTIA CASP Certification

July 01, 2011 Added by:Michael Gregg

The CompTIA Advanced Security Practitioner (CASP) is an advanced enterprise level cert for those with 10+ years IT experience and at least five years in security. While there are many entry-level certifications, CASP will be the enterprise-level advanced security certification...

Comments  (0)

7c5c876d1933023ac375eead04302e1a

What the CISSP Won't Teach You Part Deux

June 30, 2011 Added by:Boris Sverdlik

You should use a layered security model. Port Security should be enabled; IDS Response rules should trigger a port shutdown on multiple ARP responses past a certain threshold. Are you seeing yet how attackers think?? The CISSP will not teach you to think outside the box...

Comments  (0)

7c5c876d1933023ac375eead04302e1a

What the CISSP Won't Teach You

June 28, 2011 Added by:Boris Sverdlik

Information security unlike other industries does not sleep; I personally spend 3+ hours a day just learning what I can. Technology, regulations and attack methods change every day. If you don’t stay ahead of it, you will end up with pie on your face when you get hit with the latest New Thing...

Comments  (4)

4ff49873e3fed9a24adf0d37ae00b780

Will Government Work Help You Gain Security Skills?

June 21, 2011 Added by:Lee Munson

So where is a good place where you can not only gain experience with the latest machines but also have to protect important data from attackers around the world? Working for the government...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

Questions Likely to be Asked on a Security Certification

June 10, 2011 Added by:Lee Munson

Most of these questions will seem like common sense but make sure that you look at your booklet before the test and give the answer they want. A lot of us may have different ways of dealing with clients but if you want to past your test, give the answer that they want you to give...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

The Top Eleven IT Skills for 2011

May 22, 2011 Added by:Global Knowledge

Security will always be a hot skill set. All IT pros must have a good understanding of both physical and electronic security. This does not mean that every IT Pro must be able to perform a penetration test, but they must understand and prevent attacks against their network...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Which Version of the Security+ Exam Will You Try?

May 11, 2011 Added by:Global Knowledge

Attempting the new exam offers the opportunity to become certified on the latest and greatest version of the test and, after all, almost everyone likes something new. So here’s my question to each of you: When such situations arise which exam would you plan to attempt?

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Learning USB Lessons the Hard Way

April 20, 2011 Added by:Brent Huston

Our inspection revealed a job in the scheduler set to kick off on Saturdays at 5am and launch this particular malware component which appeared to be designed to grab the cookies from the browser and some credentials from the system and users then throw them out to the host in China...

Comments  (1)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Fifteen Top Paying IT Certifications

April 19, 2011 Added by:Global Knowledge

When most individuals hear the word "Certification", dollar signs immediately begin dancing in their heads. While some certifications do command a higher salary, this is not true for all. Time to look at some of the more popular certifications - and their associated pay...

Comments  (8)

7fef78c47060974e0b8392e305f0daf0

Information Security Conferences: Deadheading in 2011

April 13, 2011 Added by:Infosec Island Admin

To what end are these cons? Is it all about sharing information on hacks and tech? Is it all about partying and being wild? Is it some sense of counter culture that the community has latched on to in order to be different? I have news for you all - you are becoming one of two things...

Comments  (4)

Page « < 35 - 36 - 37 - 38 - 39 > »