Ethical Hacking

Sophia Greene
CEH Tripled My Salary and Landed Me a Vulnerability Management Analyst Job!

CEH Tripled My Salary and Landed Me a Vulnerability Management Analyst Job! Greene Current Employer: FDMCurrent Designation: Infosec Compliance and Vulnerability Management AnalystCountry: United States In this article, Sophia Greene, a military veteran, shares her unbelievable career journey which allowed her to grow from a webmaster in an elementary school to a vulnerability management…

Read article
Man on laptop using password sniffing techniques
Password Sniffing in Ethical Hacking and Its Types Explained

Password Sniffing in Ethical Hacking and Its Types Explained | Ryan Clancy |Ethical HackingSniffing is capturing data packets as they are transmitted across a network. Using a sniffer tool, you can capture sensitive information such as passwords and credit card numbers. Here we will discuss the different types of sniffing and the tools used for…

Read article
Computer screen with the word security displayed, representing the MITRE ATT&CK knowledge base
MITRE ATT&CK: Meaning, Uses, and Benefits  

MITRE ATT&CK: Meaning, Benefits and Mitre Attack Framework | Ryan Clancy |Ethical Hacking MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a knowledge base used by cybersecurity experts, but do you really know what it is and why it matters? Read on to learn everything you need to know about this important security tool.…

Read article
Nest thermostat Internet of Things (IoT) device installed on a wall
What Is IoT? Internet of Things Explained in Detail

What Is IoT? Internet of Things Explained in Detail | Ryan Clancy |Ethical Hacking The world is rapidly becoming more digitized, with nearly every aspect of our lives connected to the internet, from streaming services to smart devices. IoT, or the Internet of Things, refers to the interconnectedness of everyday objects and devices that can…

Read article
Malicious file identified on computer for malware reverse engineering network security threats
A Quick Guide to Reverse Engineering Malware 

A Quick Guide to Reverse Engineering Malware | Ryan Clancy |Ethical Hacking When most people think of malware, they associate it with viruses and Trojans that can cause wreak havoc on their computers. However, malware is a broad term covering a wide range of malicious code, from simple viruses to complex spyware and ransomware. It…

Read article
A cloud connected to other devices, showing the complexities of cloud computing and ethical hacking.
Ethical Hacking in Cloud Computing 

Ethical Hacking in Cloud Computing | David Tidmarsh |Ethical Hacking Cloud computing is now an IT best practice for businesses of all sizes and industries. Thanks to the cloud, organizations can use a wide range of on-demand IT services delivered remotely over the internet without hosting or purchasing them internally. Given the widespread adoption of…

Read article
Computer screen showing someone entering code to symbolize enumeration in ethical hacking
What Is Enumeration in Ethical Hacking?

What is Enumeration in Ethical Hacking? | Ryan Clancy |Ethical Hacking Since the early days of computing, ethical hackers have used enumeration to access systems and networks. Enumeration is the process of systematically probing a target for information, and it remains an essential tool in the hacker’s arsenal. Enumeration can provide attackers with a roadmap…

Read article
CEH v12 Banner2
The All-New C|EHv12 with New Learning Framework

The All-New C|EHv12 with New Learning Framework: 1. Learn 2. Certify 3. Engage 4. Compete Who is a Certified Ethical Hacker? Ethical hackers are information security professionals who are trained to identify and mitigate vulnerabilities in networks and perform security assessments to prevent data breaches. Ethical hacking is a promising career path with extensive growth…

Read article
How Does Vulnerability Analysis Work
How Does Vulnerability Analysis Work?

What is Vulnerability Analysis, and How Does It Work? | Sydney Chamberlain |Ethical Hacking Did you know that 60% of all data breaches were made possible by unpatched vulnerabilities (Willis, V. 2019)? That staggering figure shows why a vulnerability assessment is critical to any cybersecurity strategy. There is no denying that every system has vulnerabilities.…

Read article
How Does Ethical Hacking Work?
How Does Ethical Hacking Work? 

What Is Ethical Hacking, and Why Is It Important? | David Tidmarsh |Ethical Hacking Though it may seem like it at first, ethical hacking isn’t a contradiction. While some individuals use their hacking knowledge for ill, others use it to help companies detect flaws in their IT environment. (Think of the difference between a burglar…

Read article