THE BLOG

Ethical Hacking: Bash Scripting security Jul 02, 2021

In this week's video, we look at creating a basic bash script in Kali Linux, a topic from a recently completed Ethical Hacking for Beginners course.

Enjoy the training!

Continue Reading...
SCOR (350-701) Topic: Indications of Compromise security Feb 12, 2021

 

This week's training video is a sample from our recently released SCOR (350-701) Video Training Series, which you can find over on our website.

Specifically, this week's...

Continue Reading...
Cisco Stealthwatch cybersecurity security Jan 29, 2021

 

Charles has been wrapping up production on the SCOR (350-701) Video Training Series this week, so we thought it’d be fitting to go over one of the topics on the blueprint with you!

In...

Continue Reading...
Cisco Email Security - Data Loss Prevention (DLP) security Jan 15, 2021

In this week's video, Charles looks at data loss prevention (DLP) policies within the Cisco Email Security Appliance (ESA), a security solution outlined in the SCOR (350-701) exam blueprint.

...
Continue Reading...
Cisco ASA High Availability Implementation security Dec 18, 2018

As a redundancy measure, it’s possible to deploy multiple Cisco ASAs together in a failover configuration, also known as a High Availability Implementation. This requires that the ASAs have...

Continue Reading...
 
ZPF Concepts and Implementation security Nov 27, 2018

Cisco Zone-Based Policy Firewalls are a more modern implementation of the interface-based stateful inspection. This allows you to group interfaces into zones, which have similar functions or...

Continue Reading...
VLAN Security Concepts security Nov 13, 2018

A Virtual Local Area Network (VLAN) is a logical grouping of devices on one or more LANS, configured to communicate as if they were on the same segment. In order to communicate with devices in...

Continue Reading...
Network Security Zones security Oct 09, 2018

Our organizational IT environments are constantly changing, driven by factors such as telecommuting, cloud technologies, and BYOD (Bring Your Own Device) policies. This requires modular and dynamic...

Continue Reading...
Cybersecurity Jobs security Jul 10, 2018

One question that I get asked all the time goes something like this: “How can I break into the cybersecurity field without any experience?” We hear the stats all the time about ...

Continue Reading...