Archives
April 8, 2020 | by Matt | Blog posts

eLearnSecurity recently sat down with Chloé Messdaghi, discussing her journey from business consultant to cyber security professional.
Chloe is the VP of strategy at Point Three Security. She is a security research advocate who strongly believes that information security is a humanitarian issue.
Read more
March 27, 2020 | by Matt | Blog posts

Malware and phishing attacks during a global pandemic emphasize the need for trained cyber security professionals
The staggering number of new COVID-19 cases reported every day are one reminder that the world is facing massive upheaval. With an unprecedented amount of the workforce resigned to home offices and IT teams struggling to monitor activities of their co-workers, the coronavirus has also turned into a boon for cyber criminals.
Read more
March 19, 2020 | by Matt | Blog posts

Learn more about updates to our Threat Hunting Professional Course and Watch a Live Lab Demo
eLearnSecurity will release a new version of Threat Hunting Professionals (THPv2) during a live webinar on March 24th. During the one hour webinar, course creators Dimitrios Bougioukas and Slavi Parpulov will discuss the essentials of threat hunting and outline course updates that address the modern threat landscape.
Read more
March 12, 2020 | by Matt | Blog posts

We updated our threat hunting training course to include new hunting TTPs that address the modern cyber security threat landscape.
eLearnSecurity is proud to announce a new version of our Threat Hunting Professional (THPv2) course. THPv2, which is slated for release on March 24th, has been fully updated with new approaches to threat hunting and modern TTPs.
Read more
March 10, 2020 | by Matt | Blog posts

HONEST Security’s Amber Holcomb discusses innovations in Internet of Things connected devices and how to keep IoT safe from cyber criminals.
Amber Holcomb is Director of Operations at HONEST Security. She is passionate about encouraging and supporting young women in STEM and empowering women in the tech industry.
Read more
March 5, 2020 | by Matt | Blog posts

Finding your cyber security dream job starts with the proper training pathway.
Penetration testing is a fulfilling and lucrative position within the cyber security industry. Otherwise known as ethical hackers, pentesters work with companies to exploit weaknesses in their network, systems, and applications to ultimately create a safer online environment.
Read more
February 24, 2020 | by Matt | Blog posts

Tools of the trade for cyber security professionals
In the first article in eLearnSecurity’s introduction to pentesting methodology, Hisomeru discussed why Technical OSINT is foundational to penetration testing and introduced tools to gather information from a client. In this article, Hisomeru continues the discussion on how to collect Technical OSINT.
Read more
February 12, 2020 | by Matt | Blog posts

An Introduction to Cyber Security Methodologies
This is a new series of articles that will cover the complete penetration testing methodology based largely on case studies of previous hacks. These articles will cover initial reconnaissance, picking an attack vector, gaining a foothold, maintaining presence, lateral movement, and finally going after the prize.
Read more
January 29, 2020 | by Matt | Blog posts

Set your agenda and use RSA to advance your cyber security career
RSA is one of the largest cyber security conferences in the world, with more than 50,000 infosec professionals descending on San Francisco in late February. The agenda is overwhelming, whether this is your first trip or your tenth, with speakers, sessions, and topics covering a vast array of modern security subjects.
Read more
January 22, 2020 | by Matt | Blog posts

Today’s breaches continue to start with compromised email accounts, with monetary gain remaining the top motivation for stealing login credentials. Typically, these are opportunistic attacks, a sort of spray and pray tactic. According to ProofPoint’s report Human Factor 2019, 25% of phishing emails in 2018 were generic credential harvesting.
Read more