eLearnSecurity Blog

Yearly Archives: 2016

Video: Hardening Endpoints Demo

Hello, everyone!

This video about hardening the endpoints is taken from our “Practical Network Defense” training course PND.

PND is one of eLearnSecurity’s hands-on IT Security training courses, which covers the defensive side of network security. These skills are highly valuable for both the defense team and offense team.

Tags: , , , , , , , , , , , ,

Read more

eLearnSecurity at RSA Conference 2016

One of our eLearnSecurity team members, Davide Carmeci attended the RSA Conference 2016 in San-Francisco this week. The event is held annually in the U.S., Europe and Asia.
eLearnSecurity is attending the RSA Conference, which aims to bring IT security specialists all over the world together to share their experiences, ideas and knowledge with other industry specialists.

Tags: , , , , , ,

Read more

How online training reduces the shortage of IT Security professionals

Hi, folks!

According to recent reports all over the world IT Security professionals are in high-demand. We created an info-graphic on how online training contribute into reducing the shortage of high-skilled professionals.

Here we go:

eLS-Infograph_Draft_design

 

Tags: , , , , , , , , ,

Read more

Why should IT admins, web developers and basically anyone with IT background switch to an IT security career now?

There are lots of articles in the news recently about how in demand IT security professionals are. And there’s also a great concern about the shortage of experts in the cyber security industry to meet this demand.

According to a 2015 analysis of numbers from the Bureau of Labor Statistics by Peninsula Press, a project of the Stanford University Journalism Program, there are more than 209,000 cybersecurity jobs in the U.S.

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Read more

IT Security professionals must eat, drink and live IT Security all the time

Imagine a young black-hat hacker, probably in his teens, who infiltrates systems and steals data from many different computer systems. He finally gets caught, and after facing the charges and maybe even jail time, he comes back to his passion of testing systems for vulnerabilities.

Tags: , , , , , ,

Read more

Go to top of page