CYBERSECURITY AWARENESS MONTH
Save up to 60% on books, eBooks, and video training with discount code SECURITY. Learn more.
This chapter provides review basics and sample questions covering the topics of Enumeration and System Hacking to help you prepare for the Certified Ethical Hacker exam.
This article provides an overview of various types of cyber crime, including cyber extortion, botnets, morphing malware, and online fraud.
Many of the examples and exercises detailed in preparation for the CEH exam involve, and most times recommend, the use of Back Track as your ethical hacking platform of choice. In this article, Will Schmied outlines how to go about getting Back Track 4 R2 setup using two different methods to help you prepare for the CEH exam.
In this article, Will Schmied profiles the EC-Council 312-50 Certified Ethical Hacker (v6.1) exam. Find out what you can expect to see on the exam and how you can better prepare for it.
As that inimitable and always sly soothsayer, Yogi Berra, once said: "It's like deja vu, all over again," when it comes to chart-topping IT skills and technical areas for 2016. There are some recurring themes here to be sure, but also some newer technologies that promise to take up residence on the short list of what's hot for next year.
In August 2015, representatives of the United States Department of Defense (aka DoD, pronounced "Dee-oh-Dee") signed the 8140 directive. It replaces the now-outmoded (but not forgotten, for reasons I'll explain soon) 8570 directive. Both 8570 and 8140 require DoD personnel and contractors to obtain certifications in their work area specializations, particulary for IT-related job roles. This means that active duty military and DoD civilians who work in and around IT must obtain a variety of security credentials based on NIST's definition for the National Initiative for Cybersecurity Education (aka NICE). The devil, as always, is in the details, so let's look at some of them more closely.
In my line of work, I get asked to listen to countless product pitches and watch oodles of demonstrations. It can be informative and sometimes even mildly interesting, but I seldom find myself saying "I've got to see more of this stuff, and use it myself." A rare exception to this general trend hit me over the head earlier this week when I finally got together with members of the Spanish-based company Panda (a name many readers will recognize thanks to their long-standing and highly regarded anti-malware product offerings) to walk through the company's Adaptive Defense product instead.
A recent flurry of reports via Experian, through its data breach resolution arm, in tandem will well-known security research firm the Ponemon Institute, paint a depressing portrait of the data breach landscape -- especially for firms involved in handling customer credit and other sensitive data. The moral of the story turns out to be a combination of ongoing education for security firms and data handlers alike, along with a profound need for preparation in advance of data breaches before they occur.