InfoSec Institute Resources

Syndikovat obsah
IT Security Training & Resources by Infosec
Aktualizace: 22 min 13 sek zpět

Creating a More Diverse Cybersecurity Workforce

22 Březen, 2019 - 23:17

On this episode of the Infosec Cyberspeak podcast, Ruth Gomel-Kafri, director of product design at the security policy company Tufin, discusses her work overseeing the company’s product design group and what it’s like to work at a cybersecurity organization with such an impressively diverse workforce. In the podcast, Gomel-Kafri and host Chris Sienko discuss: – […]

The post Creating a More Diverse Cybersecurity Workforce appeared first on Infosec Resources.

Creating a More Diverse Cybersecurity Workforce was first posted on March 22, 2019 at 5:17 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

What Is the Difference Between DNIS and ANI?

21 Březen, 2019 - 14:02

Dialed Number Information Service (DNIS) and Automatic Number Identification (ANI) are features of the telecommunications network designed to allow telephone users to learn about their connection. Both systems are designed to provide information about a phone number involved in the connection but differ in whether they provide the source phone number, or the original destination […]

The post What Is the Difference Between DNIS and ANI? appeared first on Infosec Resources.

What Is the Difference Between DNIS and ANI? was first posted on March 21, 2019 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Data Analytics in Cybersecurity

21 Březen, 2019 - 14:01

The National Institute of Standards and Technology (NIST) has created the NICE framework to help standardize the terminology used to describe cybersecurity roles. The role of a cyber data analyst is defined within this framework, along with the tasks and requirements for an individual to be able to operate effectively within the role. What Is […]

The post Data Analytics in Cybersecurity appeared first on Infosec Resources.

Data Analytics in Cybersecurity was first posted on March 21, 2019 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

About Infosec

20 Březen, 2019 - 14:07

At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certifications and skills development training. We also empower all employees with security awareness and training to stay cybersecure at work and home. Founded by smart people […]

The post About Infosec appeared first on InfoSec Resources.

About Infosec was first posted on March 20, 2019 at 8:07 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Wireless Security Guide: Introduction to LEAP Authentication

20 Březen, 2019 - 14:04

Introduction The LEAP (Lightweight Extensible Authentication Protocol) is a communications protocol that was developed by Cisco for use in point-to-point connections and wireless networks. However, its security flaws became obvious and people quickly came to prefer alternatives. In this article, we take a look at how this protocol works, the commonly-known issues with it, how […]

The post Wireless Security Guide: Introduction to LEAP Authentication appeared first on Infosec Resources.

Wireless Security Guide: Introduction to LEAP Authentication was first posted on March 20, 2019 at 8:04 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Best Packet Tracer Resources

20 Březen, 2019 - 14:01

Introduction If you are preparing for the Cisco Certified Network Associate (CCNA) exam or have been involved with Cisco networking, then you have probably heard about Cisco Packet Tracer. In this article, we will discuss what Packet Tracer is and how to get it, highlight some useful Packet Tracer resources and look at how it […]

The post Best Packet Tracer Resources appeared first on Infosec Resources.

Best Packet Tracer Resources was first posted on March 20, 2019 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Many Flavors of Linux

20 Březen, 2019 - 14:00

Linux is not as popularly used in both the security- and user-focused computing worlds as other OSes such as Windows and macOS, but it can still be used for both. In fact, depending on your needs, there are many different flavors of Linux you can use. And the different versions have key differences between them. […]

The post The Many Flavors of Linux appeared first on Infosec Resources.

The Many Flavors of Linux was first posted on March 20, 2019 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 30 Security Auditor Interview Questions and Answers for 2019

19 Březen, 2019 - 14:03

Introduction Security auditors are an essential part of modern businesses. They help to facilitate and manage security changes in an organization, identify security threats and act as a valuable security resource for your IT systems and teams. Not all security auditor roles are internal ones, which means that many security auditors work at a consultancy […]

The post Top 30 Security Auditor Interview Questions and Answers for 2019 appeared first on Infosec Resources.

Top 30 Security Auditor Interview Questions and Answers for 2019 was first posted on March 19, 2019 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Protecting Against Social Engineering Attacks

19 Březen, 2019 - 14:01

Most people think of hacking as using malware and coding to bypass security defenses and steal data or money. Social engineers take a different approach, targeting the human instead of the software to achieve their goals. How Social Engineering Works Social engineers take advantage of knowledge of human behavior to perform their attacks. A person’s […]

The post Protecting Against Social Engineering Attacks appeared first on Infosec Resources.

Protecting Against Social Engineering Attacks was first posted on March 19, 2019 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

DDoS Attacks 101

19 Březen, 2019 - 14:00

Cybercrime is expected to cost businesses over $8 trillion over the next three years, according to the findings of a study by Juniper Research. But while large-scale phishing and ransomware attempts have many companies worried over internet security, there’s another type of cyberattack that’s on the rise — and it’s increasingly used by adversaries to […]

The post DDoS Attacks 101 appeared first on Infosec Resources.

DDoS Attacks 101 was first posted on March 19, 2019 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Hack the Box(HTB) Machines Walkthrough Series — Tenten

18 Březen, 2019 - 16:10

Continuing with our series on Hack The Box (HTB) machines, this article contains the walkthrough of an HTB machine named Tenten. HTB is an excellent platform that hosts machines belonging to multiple OSes. It also has some other challenges as well. Individuals have to solve the puzzle (simple enumeration plus pentest) in order to log […]

The post Hack the Box(HTB) Machines Walkthrough Series — Tenten appeared first on Infosec Resources.

Hack the Box(HTB) Machines Walkthrough Series — Tenten was first posted on March 18, 2019 at 10:10 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

CCNA versus CCNP Difficulty

18 Březen, 2019 - 14:02

Introduction For anyone starting a new project, the wise thing to do is to “count the cost.” This also holds true for those just starting out in their Cisco (or networking-related) career. One of the questions people at this phase of their career ask is, “How does the CCNP certification compare to the CCNA certification, […]

The post CCNA versus CCNP Difficulty appeared first on Infosec Resources.

CCNA versus CCNP Difficulty was first posted on March 18, 2019 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Secure Coding — Top 15 Code Analysis Tools

18 Březen, 2019 - 14:00

Keeping code secure is a top objective for any software company. And to ensure secure coding, you need to perform code analysis during the development life cycle. While manual review of code was once the only option, now there are plenty of tools that can take care of this in an automated fashion. This is […]

The post Secure Coding — Top 15 Code Analysis Tools appeared first on Infosec Resources.

Secure Coding — Top 15 Code Analysis Tools was first posted on March 18, 2019 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Conferences

18 Březen, 2019 - 13:59

Here are the following events Infosec will be at this year. NCSA Cybersecure My Business March 25, 2019 | San Jose, CA LendIT FinTech – Booth 1310 April 8-9, 2019 | San Francisco, CA Use code INFOSEC5% for a discount! Data Connectors Chicago  – Exhibit Hall May 9, 2019 | Chicago, IL CIO Visions Summit […]

The post Conferences appeared first on Infosec Resources.

Conferences was first posted on March 18, 2019 at 7:59 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Take Control of Your Infosec Career with CyberSeek

15 Březen, 2019 - 21:51

On this episode of the Infosec Cyberspeak podcast, Tim Herbert, vice president of research and market intelligence for CyberSeek, joins us to discuss something we’re very excited about at Infosec, the National Initiative for Cybersecurity Education’s CyberSeek model. The CyberSeek model helps aspiring and experienced infosec professionals progress through their career by providing clearly defined […]

The post Take Control of Your Infosec Career with CyberSeek appeared first on Infosec Resources.

Take Control of Your Infosec Career with CyberSeek was first posted on March 15, 2019 at 3:51 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 30 Chief Technology Officer (CTO) Interview Questions and Answers for 2019

14 Březen, 2019 - 16:47

Introduction   Reaching the top in the world of technology is no mean feat, and technologically speaking, there aren’t many spots higher than that of Chief Technology Officer within an organization. Larger companies normally have this role open for senior executives that have the skills, knowledge and foresight to help them take the company to […]

The post Top 30 Chief Technology Officer (CTO) Interview Questions and Answers for 2019 appeared first on Infosec Resources.

Top 30 Chief Technology Officer (CTO) Interview Questions and Answers for 2019 was first posted on March 14, 2019 at 10:47 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Quantum Computation and Its Effects on Cryptography

14 Březen, 2019 - 16:33

Cryptography is a method of protecting communication and data through the use of codes, so that only the ones with authorized access can read and/or process it. Stating that cryptography is a fundamental security control is by no means an exaggeration; for millennia, military communications have been ciphered and thus protected with the use of […]

The post Quantum Computation and Its Effects on Cryptography appeared first on Infosec Resources.

Quantum Computation and Its Effects on Cryptography was first posted on March 14, 2019 at 10:33 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Hack the Box (HTB) Machines Walkthrough Series — SolidState

14 Březen, 2019 - 16:19

Continuing with our series on Hack The Box (HTB) machines, this article contains the walkthrough of an HTB machine named SolidState. HTB is an excellent platform that hosts machines belonging to multiple OSes. It also has some other challenges as well. Individuals have to solve the puzzle (simple enumeration plus pentest) in order to log […]

The post Hack the Box (HTB) Machines Walkthrough Series — SolidState appeared first on Infosec Resources.

Hack the Box (HTB) Machines Walkthrough Series — SolidState was first posted on March 14, 2019 at 10:19 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Assessing Your Organization’s Cybersecurity Practices with Homeland Security’s Cyber Resilience Review

13 Březen, 2019 - 14:05

Every time a new high-profile data breach makes the news, it’s another reminder to organizations about the need to be vigilant. With the estimated cost per lost or stolen record at $148 (according to an IBM/Ponemon study), the numbers can add up fast. For small businesses, the losses could hit hard too — Kaspersky estimates […]

The post Assessing Your Organization’s Cybersecurity Practices with Homeland Security’s Cyber Resilience Review appeared first on Infosec Resources.

Assessing Your Organization’s Cybersecurity Practices with Homeland Security’s Cyber Resilience Review was first posted on March 13, 2019 at 8:05 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 10 Penetration Testing Certifications for Security Professionals [Updated 2019]

13 Březen, 2019 - 14:02

As more organizations turn to penetration testing for identifying gaps in their defense systems, the demand for skilled penetration testers has been growing. While other types of security practitioners can probe information systems and networks for their vulnerabilities, pentesters are highly specialized, trained to think like hackers when exploiting security weaknesses. According to the TechRepublic, […]

The post Top 10 Penetration Testing Certifications for Security Professionals [Updated 2019] appeared first on Infosec Resources.

Top 10 Penetration Testing Certifications for Security Professionals [Updated 2019] was first posted on March 13, 2019 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security