This article provides you with good understanding of the three factors of authentication and how they can be used together with multifactor authentication.
This article provides an overview of the current state of recruiting zombies, botnet sizes and actions, and how to detect botnets.
Due to its wide use, several security exams include questions covering phishing including the CompTIA Security+ exam, the (ISC)2 SSCP, and the (ISC)2 CISSP. This article covers phishing formats, characteristics, and variants.
This article profiles the SSCP exam, an entry-level security exam sponsored by (ISC)2. Find out what you can expect to see on the exam and how you can better prepare for it.
A recent flurry of reports via Experian, through its data breach resolution arm, in tandem will well-known security research firm the Ponemon Institute, paint a depressing portrait of the data breach landscape -- especially for firms involved in handling customer credit and other sensitive data. The moral of the story turns out to be a combination of ongoing education for security firms and data handlers alike, along with a profound need for preparation in advance of data breaches before they occur.
Train effectively – train immediately with Video Courses from Pearson IT Certification.
Expert author and presenter Sander van Vugt takes certification candidates on a two week journey in a new virtual workshop series on RHCSA and RHCE exam essentials.
Topics range from creating advanced Apache configurations to troublehsooting, and setting up an iSCSI environment with target and initiator.
Next session begins Feb 26th and runs every week through end of April!
Register now for these new online February and March 2015 webcast & workshop events, offered in conjuction with our Pearson Authors and our technical partners.