CEH v9 Question of the Week: Password Attack Method

Kelly is a network security officer for a large state-run agency in California. Kelly is asked by the IT manager of another state agency to perform a security audit on their network. This audit she is asked to perform is an external audit. The IT manager thought that Kelly would be a great candidate for this task since she does not work for this other agency and is an accomplished IT auditor. The first task that she is asked to perform is an attempt to crack user passwords. Since Kelly knows that all state agency passwords must abide by the same password policy, she believes she can finish this particular task quickly. What is the best password attack method for Kelly to use in this situation?

Read more

How to Incorporate Social Learning into the Classroom

There’s been a lot of talk about social learning, yet most of what has been shared involves online or blended learning. Why not social learning in the classroom? Many of the recent instructor-led training (ILT) trends have elements of social learning. Below are at least four ways to incorporate social learning into the classroom.

Read more

The Role of Leadership in Developing a Learning Culture

Creating a learning culture offers a host of benefits for both the company and the employees. But what’s the role of leadership in creating one? What does that entail? After all, leaders are where the learning culture starts. They’re the folks who have to enforce the training initiatives and get the culture integrated into the workplace.

Read more