Security Training


The Recession and Your Professional Skill Set

August 06, 2010 Added by:Danny Lieberman

In order to really take something of value out of the recession you need to look outward and challenge a lot of your base assumptions – it doesn’t really matter if you are a self-employed security consultant or a salaried IT sales professional...

Comments  (1)


Rare Opportunity: CISSP Classes with Shon Harris

July 31, 2010 Added by:Roman Zeltser

CISSP exam is considered one of the most difficult since you have to be ready to answer 250 questions within 6 hrs with only small breaks at your own discretion. It took me 4 months of hard work to get ready for exam...

Comments  (2)


Security Skills for Work vs Skills for Getting Hired

July 28, 2010 Added by:Anton Chuvakin

Let’s talk about security skills that you can prove, skills that you need for a job and skills that will pass HR filters. It shocks me – to put it mildly – that these three are often completely different – and not even overlapping...

Comments  (1)


Certified Ethical Hacker Courses - Again…

July 20, 2010 Added by:Lee Mangold

The exam is in revision 6 now, and tests a wide range of techniques from reading and analyzing TCP dumps and Snort logs, understanding the OSI model, how to use many of the common exploit tools, recognizing the exploits and their uses, and so on...

Comments  (4)


An Introduction to OSSTMM Version 3

July 15, 2010 Added by:Infosec Island Admin

As a security consultant, I've always looked for ways to increase consistency, efficiency and value when conducting security analysis on a client's network or business. With the impending release of OSSTMMv3 I'll share my thoughts on the success of the model...

Comments  (19)


SANS Log Management Class in California?

July 06, 2010 Added by:Anton Chuvakin

I have authored a SANS Log Management Class (SEC434) which is almost out of beta and near production stage, after a few years of tuning and trial runs. We are thinking of teaching it in California during the second week of August 2010...

Comments  (0)


Public Key, Private Key, Secret Key: Everyday Encryption

June 30, 2010 Added by:Rod MacPherson

I recently wrote the CISA exam. That's #2 of my "big infosec certifications" (CISSP last year being the first) One thing I found in the exam prep classes for both certifications was that many people have trouble with the concepts behind the modern day encryptions that we all use every day...

Comments  (7)


Backtrack 4: Penetration Testing with Social Engineering Toolkit

June 29, 2010 Added by:Dan Dieterle

People do not understand how dangerous it is to click on unknown links in an e-mail or even on a website. Hackers will disguise their malware shell and make it look very appealing. Be it a video codex that you must install to watch a video that you really want to watch or even a webpage that tells you that you have a virus and you must install and run the latest online anti-virus scanner to remove...

Comments  (4)


Cutting-Edge Security Knowledge? We Are Giving It Away

June 22, 2010 Added by:Infosec Island Admin

In August, 2010, Global Knowledge - the worldwide leader in IT and business skills training - will debut the Cyber Security Foundations training course. The in-depth, five day instruction session covers all current and emerging security issues including ethical hacking, forensics, intrusion detection, and policy/procedure, and attendees will leave class armed with the tools to develop an interconn...

Comments  (0)


Invitation to Webinar on Data-Centric Security

June 18, 2010 Added by:Eli Talmor

This presentation will discuss data-centric security solutions for online transaction using browser channel, such as banking transfers, ecommerce purchases, insurance claims filings, healthcare drug prescriptions and Internet voting.

Comments  (0)


How to use Metasploit

June 14, 2010 Added by:Mark Bennett

People have been asking me to show some basic metasploit and how you use it. I recently did a security show for the Michigan ISSA folks where we showed everyone how to use it. So I figured I would re-hash that as well as build on it to give you a good feel for what you can do. So I created a video (see video on our site) and in the video I show you how to own a box, as well as different comma...

Comments  (5)


Reasons to love infosec

May 22, 2010 Added by:Javvad Malik

Infosec sometimes unfairly gets a lot of bad press for being a barrier to business goals and objectives. How infosec professionals don’t understand business needs and drivers. How pouring money into security is about as good as burning it. But infosec has improved the quality of working and the lives of workers the world over.

Comments  (0)


Top 10 Skills in Demand in 2010

May 11, 2010 Added by:Global Knowledge

In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at the end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" The skills listed by respondents include the perennial favorites, such as security, network administration, and Windows administration.

Comments  (0)


Death by Powerpoint

May 06, 2010 Added by:Mark Gardner

So we've all sat through endless presentations with the presenter reciting the bullets on the screen that you've read in 30 seconds flat when the screen popped up.August designers such as Garr Reynolds (Presentation Zen)  and Nancy Duarte (Slide:ology) have written tremendous books and have wonderful blogs, (which you can find through links on my blog - co...

Comments  (3)


Hacking Forensic Security channel update

May 02, 2010 Added by:Christiaan Colen

About a year ago I started the youtube channel Hacking Forensic Security (HFS). The channel contains more then 2600 videos about hacking, forensics and security. For example videos from the Hack In The Box, HAR 2009 or Shmoocon conferences. You can also find awareness videos and videos about digital forensics.

Comments  (0)


Certified Ethical Hacker?

April 30, 2010 Added by:Rod MacPherson

Yes, there is such a thing. Although, I'd say that it certifies neither that you are a hacker, nor that you are ethical.... but it does show that you have been exposed to a wide variety of tools that malicious hackers might use to invade your network, so that you will recognize them if you ever come across them, and you will be able to use them to test your own defenses.

Comments  (23)

Page « < 37 - 38 - 39 - 40 - 41 > »