877.791.9571 |

About the Author:

new horizons

New Horizons Computer Learning Centers Joins InfoSec Institute as a Platinum Partner

Illinois – April 7th, 2014 – New Horizons Computer Learning Centers, a provider of IT training with over 300 centers in over 70 countries, has added InfoSec Institute, the […]

xml-vulnerability

3 Cyber Threats, One Simple Solution

Vulnerability management has become a huge challenge in today’s malicious cyberspace. SQL Injections, Cross Site Scripting and DDoS Attacks are arguably the most commonly exploited vulnerabilities, constantly appearing in […]

vmware-logo

VMware Certified Professional Salary (VCP5)

The Cloud phenomenon is taking the world by storm (pun unintended)! Cloud and virtualization technology is becoming increasingly popular with both large and small sized enterprises, as it allows […]

afcea

InfoSec Institute partners with AFCEA International

Elmwood Park, IL  –  “The shortage of information security professionals is the biggest crisis facing the United States,” said President Barack Obama in his January 2014 State of the […]

cert-splash

New Training Programs!

, ,

You heard right, the InfoSec Institute is adding several new training programs to our award winning lineup of courses. Whether you want to master a new application, improve your […]

cisafeatured

Average CISA Salary 2014

,

As we become more dependent on technology the proper security of our data is more important than ever been before. It’s no surprise that the demand for competent IT […]

njvc

NJVC and InfoSec Institute Partner to Provide Cyber Security Training Services

,

CHANTILLY, Va., March 18, 2014— NJVC®, an information technology solutions provider headquartered in northern Virginia,  and InfoSec Institute, an information security training company, announce a strategic partnership to provide […]

cisa salary

Average MCSE Salary 2014

Modern Networks are vast, sophisticated and intricate. Network Administrators today need to be extremely well-versed with a company’s network to be able to plug security holes, ensure packets are […]

linux-kernel09252013

Common Linux Misconfigurations

Over the numerous configuration reviews and pentest engagements that we have performed for our clients, we’ve observed a common pattern in the configuration weaknesses in Linux systems. We believe reviewing these […]

CEH

Average Certified Ethical Hacker (CEH) Salary 2014

With a spate of successful hacking attempts on various banking and retail websites, ethical hacking has emerged as one of the most critical roles in protecting a company’s information. […]

Broken_01292014

Regulators Protect Their Data: Who’s Protecting Yours?

By Chris Clymer, SecureState Advisory Manager and Kerstyn Clover, SecureState Consultant

If there’s one constant for security practitioners across virtually all organizations regardless of size, industry, or location, it is […]

Big Data and Incident Detection- A Promising Future, but Mind the PResent

By Matthew Neely, SecureState Director of Strategic Initiatives

The Hype

Recently there’s been a lot of talk in the media and at security conferences about using big data tools to detect […]

sdlc

SCA, For a Secure SDLC

Today’s cyberspace has become a dangerous place for individuals and businesses. Vulnerabilities are exploited using sophisticated malware and complex hacking techniques. This is why Security Testing is needed in […]

ceh

CEH Exam Details

,

“To beat a hacker, you need to think like one!” Thinking outside the box is one of the underlying themes of EC-Council’s Certified Ethical Hacker (CEH) certification and that […]

PMP

Average PMP Salary 2014

The Project Management Professional (PMP) Certification is one of the most well known and recognizable certs within the IT industry today. According to the October 2013 Issue of PMI Today, there […]

SOA-Client11212013

Business Continuity & Disaster Recovery

Business Continuity
Within a business continuity plan exists a few steps:

Business Impact Analysis (BIA)
This involves determining the operational and financial impact of a potential disaster or disruption, including loss of […]

.1

Human Factors in Information Security Management Systems

, ,

It is hard to accept that nowadays, organizations get along without having an astute and decisive information system. Providing a reliable and coherence information system requires a solid security […]

cert-splash

Average CCNA Salary 2014

The CCNA (Cisco Certified Network Associate) is one of the most well known entry-level certifications within the IT industry; holding this credential proves your ability to install, configure, manage and […]

cert-splash

Average CISSP Salary 2014

,

The CISSP has long been considered the gold standard of security certifications and adding those letters next to your name is no easy task. In order to even qualify, you’re […]

Your Guide to the HP Cyber Risk Report

By: Geoffrey Vaughana a Security Consultant at Security Compass

This year at the RSA Conference HP officially released its annual Cyber Risk Report. This report is one among many industry reports that individuals […]