Skip to main content

Posts

INTRODUCTION TO ETHICAL HACKING

  Technology Brief Information Security Overview Information security ensures the confidentiality, integrity, & availability. An organization without security policies & appropriate security rules are at great risk, & the confidential information & data related to that organization are not secure in the absence of these security policies. An organization along well-defined security policies & procedures helps in protecting the assets of that organization from unauthorized access & disclosures. Essential Terminologies HACK VALUE – This is a value that denotes attractiveness, interest or something that is worthy. ZERO-DAY ATTACK – This refers to threats & vulnerabilities that can exploit the victim before the developer identify or address & release patch for that vulnerability. VULNERABILITY – IT refers to a week point, loophole or a cause in any system, software, or network which can be helpful & utilized by the attackers to go t...
Recent posts

CISM-: INFORMATION SECURITY GOVERNANCE (LESSON ONE PART ONE)

      CERTIFIED INFORMATION SECURITY MANAGER (CISM) CERTIFICATION TRAINING DOMAIN ONE: INFORMATION SECURITY GOVERNANCE LESSON ONE: PART ONE DOMAIN DEFINITION Establish &/or maintain an information security governance framework & supporting processes to ensure that the information security strategy is aligned with organization goals & objectives. LEARNING OBJECTIVES ·         Understand the purpose of information security governance, what it consists of & how to accomplish it ·         Understand the purpose of an information security strategy, its objectives, & the reasons & steps required to develop one ·         Understand the meaning, content, creation & use of policies. Standards, procedures & guidelines & how they relate to each other ·         Develop business cases & gain commitment from ...

THE C|EHv10 (PRACTICAL) EXAM

  The C|EH (Practical) is a 6-hours practical exam built to exacting specifications by subject matter experts in the Ethical Hacking field. Professionals that posses the C|EH credential will be able to sit for an exam that will test their limits in unearthing vulnerabilities across major: ü Operating Systems ü Databases ü Networks To those who meet & exceed the skills level set, they will earn the new industry required certification – the C|EH (Practical) certification. C|EH (Practical) is available fully proctored (meaning you are being invigilated), online with remote facilities globally. The combined benefit of a practical exam that is fully proctored anywhere in the world will provide organizations with a skills-validated & trusted credential when employing cybersecurity professionals. With its global availability, organizations can now quickly train, test & deploy a cyber-ready workforce effectively. You can check EC-Council website for applic...

THE C|EHv10 EXAM

  Speaking of the exam C|EH (ANSI), C|EH 312-50 The exam was designed to provide skills-and-job-roles-based learning, standard-based training modules, & better industry acceptance using the state-of-the-art labs. (in the official courseware & online). The exam consists of 125 multiple-choice questions & last for 4-hours. A passing score is, well, different for each exam. EC-Council now implements a “cut-score” for each of their questions. Should your test include multiple hard questions, your passing “cut-score” may be as low as 60%. If you get the easier questions, you may have to score upward of 78%. TARGET AUDIENCE ü Ethical Hackers ü Systems Administrators ü Network Administrators ü Network Engineers ü Web Managers ü Auditors ü Security Professionals in general. Enable Ginger Cannot connect to Ginger Check your internet connection or reload the browser Disable in this text field Edit Edit in Ginger Edit in Ginger ×

CERTIFIED ETHICAL HACKER v10

  C|EHv10 CERTIFICATION DESCRIPTION The Certified Ethical Hacker (C|EHv10) certification program is a trusted & respected ethical hacking certification program that any information security professional will need. Certified Ethical Hacker (C|EH) didn’t gain the reputation & value it has by being easy to attain. It’s challenging examination that tests more than just simple memorization. It’s worth has elevated it as one of the top certifications a technician can attain. This certification actually means something to employers because they know the effort it takes to attain it. C|EH is used as a hiring standard & is a core sought after certification by many of the Fortune 500 organizations, governments, cybersecurity practices, & a cyber staple in education across many of the most prominent degree programs in top universities around the globe. Hundreds of thousands of InfoSec Professionals as well as career Starter have challenged the exam & for thos...

THE 8 CISSP SECURITY DOMAINS

  CBK means Common Body of Knowledge. DOMAIN ONE: SECURITY & RISK MANAGEMENT This domain covers many of the foundation concepts of information systems security. Some of the topics covered are as follows: ü The principles of confidentiality, integrity, & availability ü Security governance & compliance ü Legal & regulatory issues ü Professional ethnics ü Personnel security policies ü Risk management ü Threat modelling DOMAIN TWO: ASSET SECURITY This domain examines the protection of assets throughout their life cycle. The following are topics examined in this domain: ü Asset identification & classification ü Maintaining information & asset ownership ü Privacy ü Asset retention ü Data security controls ü Information & asset handling requirements DOMAIN THREE: SECURITY ARCHITECTURE & ENGINEERING Domain three is all about the development of information systems that remain secure in the face of a myria...