article thumbnail

Black Hat USA, Linux Academy’s next stop.

Linux Academy

Linux Academy is officially a sponsor of Black Hat USA. Literally, you can win an extremely rare & enormous Linux Academy penguin. We will test you on common security misconfigurations that open doors to attackers! Black Hat Briefings and Trainings happen annually in the United States, Europe and Asia.

Linux 60
article thumbnail

Black Hat USA, Linux Academy’s next stop.

Linux Academy

Linux Academy is officially a sponsor of Black Hat USA. Literally, you can win an extremely rare & enormous Linux Academy penguin. We will test you on common security misconfigurations that open doors to attackers! Black Hat Briefings and Trainings happen annually in the United States, Europe and Asia.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Employee Spotlight – Bob Salmans, Security Training Architect

Linux Academy

Our Training Architects are dedicated to pushing the boundaries of online learning and helping professionals become cloud and Linux experts! Hear from one of our Security Training Architects, Bob Salmans, below and see why he loves working at Linux Academy. What do you do at Linux Academy? Sound strange?

article thumbnail

Backups | Roadmap to Securing Your Infrastructure

Linux Academy

As information security professionals, it may not be our job to manage system backups, but it is our job to realize the importance backups have in the realm of information security. So, now that we’ve established backups are a part of information security, what’s next? Vulnerability Scanning.

Backup 60
article thumbnail

March Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the information security industry, one thing we cannot do is become stagnant. We’ve talked about security awareness training , vulnerability scans , and patching. The post March Intro | Roadmap to Securing Your Infrastructure appeared first on Linux Academy Blog. See you next week!

article thumbnail

Roadmap to Securing Your Infrastructure

Linux Academy

As an information security professional, I’m often asked, “What can I do to make my company safe from cyber threats?” Unfortunately, there is no pixie dust to sprinkle around and make everything secure. For the month of February, we’ll be covering the first three topics: Security awareness training.

article thumbnail

16 best entry-level IT certifications to launch your career

CIO Business Intelligence

The CEH certification offers comprehensive training to help you start out as an ethical hacker. GIAC Information Security Fundamentals (GISF) The GIAC Information Security Fundamentals certification is offered through the GIAC, covering the foundations of IT security, networking, cryptography, and cybersecurity.

SCRUM 133