Blogs

You’re certified, Now what?

Congratulation! You’ve passed your IT certification exam. Here are three considerations for your journey as a certified IT professional. Increased Responsibilities Your first time seeing your credentials after your last name is a rewarding feeling. You endured the nights and weekends of studying and challenged yourself learn something new. You

Read More »

5 Tips When Studying for an IT Certification Exam

Pursuing an IT certification can lead to an increase in salary, career advancement, or grant you access to your first cyber security career. Here are five tips to consider when studying. Understand the exam objectives Certification vendors periodically release updates to their exam learning objectives to keep up with emerging

Read More »

Top 5 IT Certifications for 2021

Whether you’re attaining an IT certification to advance in your career, join a community of professionals, or to boost your credibility, here are the top five IT certifications you need for 2021. Certified Ethical Hacker (CEH) Being familiar with the tools and techniques used by criminal hacking organization is a

Read More »

The Cyber Kill Chain in Practice

Introduction Maerk is a Danish-based cargo supply shipment company that is responsible for one-fifth of global freight operations. In 2017, Maersk’s Ukraine subsidiary was infected with a malware that caused over 200 million dollars in financial impact, and over 10 billion dollars in global damages. The malware is known as

Read More »

The Global Cyber Security Crisis

A National Crisis The global shortage of cyber security professionals is a national crisis. According to a recent survey conducted by (ISC)², “60% say their companies are at moderate or extreme risk of cybersecurity attacks due to this shortage.” The global need for cyber security professionals can be attributed to

Read More »

3 Most Dangerous Hacking Organizations

When planning defensive cyber operations or anticipating a cyber threat, by understanding your adversary you can better align your cyber defenses. #3: Criminal Hacking Organizations Criminal hackers are your everyday cyber criminals that target vulnerable computers to launch cyber attacks. These cyber attacks can potentially deny, degrade, disrupt, or destroy

Read More »