Start Your Career Path with Cybersecurity Primer

Get a taste of our Cybersecurity Foundations course and On-Demand training for free. Our Cybersecurity Primer is a free on-demand training course that gives you access to the first module in Cybersecurity Foundations. It’s a perfect launching point to a cybersecurity career.

The post Start Your Career Path with Cybersecurity Primer appeared first on Global Knowledge Blog.

Read more

Following Security Best Practices is Good But May Not Be Enough

If you look at books and publications on cybersecurity, it’s clear that we continue to emphasize common information security best practices: Keep up with patches, disable unnecessary services, have users work with limited privilege, follow system hardening principles, and maintain an ongoing program of user education. Depending on the industry, there are guidelines, standards, or even federal regulations that drive cybersecurity. Unfortunately, as shown by Heartland Payment Systems and Target Stores, these standards are often viewed as encompassing security solutions, rather than baseline, minimal requirements.

Read more

NSA Reveals Google Hacking Tricks

Google hacking is something I typically discuss when teaching ethical hacking. It’s a key component of the footprinting process. Footprinting is the blueprinting of the security profile of an organization, undertaken in a methodological manner. Footprinting is a passive process of that is designed to profile an organization with respect to networks.

Read more