Students and our sales staff are asking lots of questions about the recently announced CompTIA Security+ SY0-501 exam. Selected aspects of the exam have not been announced. I was able to review a CompTIA partner webinar covering the new exam, and acquire a forty page detailed mapping document. My deep dive isn’t complete, though this … Continue reading CompTIA Security+ SY0-501
CompTIA Instructor Steve Fullmer describes the importance of getting Security+ Certified. Security is no longer about the “haves” and the “have nots” a small group of people who are trying to take advantage of your possessions and intellectual property (IP). In the book ‘Tribal Leadership’ by Dave Logan, John King, Halee Fischer-Wright, they discuss the stages of … Continue reading CompTIA Security+ What Motivates People to Take Your Intellectual Property?
Transcription I’m Mike Danseglio, and I’m an instructor here at Interface Technical Training. One of the classes I teach here at Interface is Certified Ethical Hacking CEHv9. I Ethical hacking is a critical skill-set for anybody to have that’s in IT Security. Ethical Hacking is all about learning how hackers attack systems, how they … Continue reading CEHv9 Certified Ethical Hacking – White Hat vs. Black Hat – Why Ethical Hacking is important
Phishing is a combination of social engineering and technology that tries to trick users into disclosing sensitive information. You’re probably already familiar with the stereotypical Nigerian Prince email – an unsolicited email from an unknown sender identifying himself as a Nigerian Prince and offering to pay you to help him transfer his money to your … Continue reading The Best Anti-Phishing Tool in the Enterprise… Is Free!
A skilled attacker usually begins an attack by performing detailed reconnaissance. Recon is critical to a comprehensive attack as it yields information about the target network, hosts, personnel, publicly accessible assets, and a host of other data. One of the easiest targets is a website. Websites are, by design, highly accessible and loaded with data. … Continue reading Using WebRipper to Examine Website Content
Generating Random Numbers for Cryptography with Lava Lamps? Yes, this is a serious article. Cryptography often requires random numbers. From seed values to cryptographic key material to data obfuscation values to actual keys, random numbers are incredibly important. If there’s one thing that computers really suck at, it is generating random numbers. Computers are designed … Continue reading Generating Random Numbers for Cryptography with Lava Lamps
You should already realize that you cannot just change your standard encryption algorithms and key lengths on a moment’s notice. Those are decisions that you made after careful research and testing. So while you might have some cryptography in place that isn’t the latest and greatest Elliptic Curve or Quantum Cryptography fad, you’re confident that … Continue reading Exploits Against Legacy Encryption – A Conversation with Cisco
If you’ve attended my Ethical Hacking and Countermeasures course or obtained your Certified Ethical Hacking (CEH) credential in another way, you need to regularly refresh your knowledge and log CPE credits with the EC-Council. This can be challenging if you’re strapped for budget and cannot attend conferences like RSA, BlackHat, and Hacker Halted. One great … Continue reading Attend the Hacker Halted and CISO Forum Online Summits for Certified Ethical Hacker CPE Credits
Most computer users think that when they empty the Recycle Bin, that data is gone forever. Unless the FBI or Interpol decide to use a scanning electron microscope, there’s no way someone can recover the information. Right? Wrong. That data is usually still laying around on the hard drive. Data remnants, or pieces of information … Continue reading Video – How To Erase Data Permanently in Windows with Cipher
I get asked all the time about web sites or business computers being hacked. Specifically, someone asks me whether his Internet site is being hacked or internal computers are being attacked. My answer is always the same. "Yes. Your business is being attacked. Your web site and your internal computers are both under attack right … Continue reading Is My Business Being Hacked?