When we talk about election security, most people think of hacking voting machines. But what about other cyber methods and means of disrupting an election?
Cybersecurity Blog | Cover6 Solutions
The Cover6 Solutions' blog provides the latest information security news and hands-on cybersecurity tutorials from seasoned professionals.
Learn how attackers use Open Source Intelligence (OSINT) and third-party apps to obtain information that eventually leads to a successful corporate or home network compromise.
This is a quick talk on how to set up your attack machine, your practice environment, and helpful resources and tools that will help you prepare for and pass the major offensive practical exams. These exams include the eJPT, CEH Practical, the OSCP and many more. Let’s roll.
Have you ever watched an asset get infected a was unable to respond? This is probably one of the worst feelings as a security analyst. This might have been due to the approvals, tickets, or process needed for action. Nevertheless, these kinds of situations can be avoided with SOAR.
MITRE ATT&CK seems to be the “next big thing”. Every time I hear about it I can’t help but wonder, “how do you prevent all these attacks in the first place? Shouldn’t that be the end game?”
Interested in a successful career in cybersecurity? Learn what it takes from seasoned professionals who provide advice on how to make that happen.
You can create a network lab with devices from Cisco, Juniper, Citrix, Arista, A10, Alcatel, Checkpoint, F5, Palo Alto, PFSense, SonicWALL, Trend Micro TippingPoint vTPS, and so much more. If the network vendor has a virtual appliance, it can more than likely run in an EVE-NG environment.
Often organizations place security practitioners in an unrealistic situation. Defend the network and critical data, but on a shoestring budget with limited resources. In times like this, you must look to bulk up the security tools arsenal.
With the current concerns regarding the spread and impact of COVID-19 (“Coronavirus”), many companies are asking or requiring their employees to work remotely. If your organization or your clients are considering this option, they need to consider data security and privacy implications.
Can’t get a job in cybersecurity because you don’t have the experience, can’t get experience because you don’t have the job… then this presentation is for you.
Mr. Foulon is also the I.T. Co-Sector Chief at InfraGardNCR, a Career Coach/Speaker at CPF Consulting, as well as an Adjunct Professor at Bellevue University. He enjoys spreading knowledge and giving back to the community. This discussion had lots of helpful tips for those new to the field.
EKCEP — the Eastern Kentucky Concentrated Employment Program, Inc. — operates with a mission to prepare, advance, and expand the workforce of Eastern Kentucky. EKCEP