Remove Backup Remove Information Security Remove Linux Remove Network
article thumbnail

Is Information Security the Right Profession for Me?

Linux Academy

Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. In this post, I’ll fill you in about some of the available jobs in information security and what it takes to succeed in each one.

article thumbnail

March Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the information security industry, one thing we cannot do is become stagnant. This month, we’ll be covering the following topics: Backups. Network Awareness. Importance of data backups. Believe it or not, backups are one of the most important pieces of security. Network awareness of rogue devices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Top 5 Tips to Improve Your Linux Desktop Security 2017

Galido

Having Linux as your operating system is one of the better decisions you can make concerning your computer’s security. Having this OS on your desktop allows you to relax a little bit when it comes to many forms of security breaches, which would probably inflict serious damage to less security-oriented systems.

Linux 66
article thumbnail

16 best entry-level IT certifications to launch your career

CIO Business Intelligence

The new CCNA validates your skills and knowledge with network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability. Before you can take the exam, you’ll need to take the course Supporting Cisco Routing and Switching Network Devices (RSTECH).

SCRUM 135
article thumbnail

April Intro | Roadmap to Securing Your Infrastructure

Linux Academy

Why do I bring up car care when this is an information security blog? If you missed the last few blogs in this series on how to secure your infrastructure, check them out below: Security Awareness Training. Network Awareness Using ARPwatch. Welcome to April! Yep, it sure is. Vulnerability Scanning.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. What's in there?

System 52
article thumbnail

The Hacker Mind Podcast: Crimeware As A Service

ForAllSecure

William Bangham: Judy, the FBI said a group known as Dark Side is responsible for this cyber attack, which used what is known as ransomware ransomware is malicious computer code that blocks and owners access to their computer network until a ransom gets paid. That’s the amount of time the attacker is in your network.

Malware 40