Posts in "Phoenix TS IT Security Blog"

What Is The CyberSec First Responder (CFR) Certification?

Phoenix TS adds CertNexus’ CFR Certification to Maryland, Virginia & Online Training Schedule.  CyberSec First Responder (CFR) is the “blue team” certification for cybersecurity and validates a professional’s ability to: Assess information security risk in computing and networking environments Analyze the cybersecurity threat landscape Analyze post-attack techniques on computing and network environments Collect cybersecurity intelligence Analyze […]

March 11, 2019 | Ashley Wheeler" class="author">Ashley Wheeler | Views: 926

CEHv10 and CEHv9: Comparing The Versions

CEH, Certified Ethical Hacker, by EC-Council is a highly sought after IT security certification. EC-Council recently released a new version of the exam, CEHv10. We’ve taken the guesswork out of deciphering what has changed between the latest version and the older version so take a few moments to read over what we’ve found. CEHv10 versus […]

August 27, 2018 | bradleym | Views: 4096

Why Your Organization Needs To Measure Risks

The importance and need to measure risks can’t be understated.  Whether it is performed in the initial Basis of Estimate (BOE) or kickoff meeting, risk identification is one of the first items a project team plans at the beginning of a project.   During the BOE or kickoff meeting, the project team will collaborate to identify […]

March 19, 2018 | Guest Blog | Views: 1678

Social Engineering: The Quick Facts

The purpose of social engineering is for an attacker to utilize numerous tactics and manipulating individuals to divulge information, potentially critical, that could cause serious damage to an organization.  While there are many methods that can be utilized to gather material, it’s also important for workers and all organizations to be aware of their surroundings […]

March 2, 2018 | Guest Blog | Views: 2404

What is CCSP Certification?

Cloud computing is an information technology paradigm that offers an innovative business model for enterprises to adopt IT services without prior investment. Although cloud computing has various advantages, enterprises hesitate to accept it because of the security challenges and issues associated with it. Security issues are major stumbling blocks to the progress of cloud computing. […]

January 23, 2018 | Hannah Brandon | Views: 11666