Dec
01
Phishing attacks have been a nuisance for the IT industry for a long time. As the holiday season approaches, organizations must focus their efforts on raising cyber security awareness to counter the effects of social engineering. Every day, cyber criminals find new ways to cheat individuals and businesses online. Whether it’s credential theft, ransomware or corporate espionage, new technologies make it increasingly easy for cyber criminals to disrupt our daily lives. Phishing continues to do... Read More
Nov
20
Red team tactics are at the heart of cyber security with organizations around the world offering rewarding, high-salary careers to ethical hackers who understand the importance of penetration testing. No matter where you’re at in your InfoSec journey, there’s an INE cyber security learning path for you. Here’s a look at our red team training, all included with your Cyber Security subscription. Read More
Sep
01
This week enjoy free courses and training demos covering topics relevant to securing your personal and business networks. Lead by professionals from INE and eLearnSecurity, this training provides hands-on, interactive instruction which will allow for easier understanding and implementation of concepts.  Read More
Aug
20
Most employees connect their personal cell phone to company networks. Here's what businesses need to know about mobile application security. Author: Esraa Alshammari Read More
Oct
24
Wireless LANs are nearly everywhere. However, without some form of Wi-Fi security, anything you send across that WLAN is visible for all to see. INE expert instructor Keith Bogart provides a strong foundation for anyone looking to understand and better navigate quality Wi-Fi security. Read More
May
20
Email and web-based attacks are the most common points of entry for hackers in our current world of Information Security. Understanding the nature of these attacks is critical to existing and aspiring network engineers. Read More
Aug
25
The first portion of INE's new CCIE Security Advanced Technologies Class for the 3.0 blueprint is now available in both streaming and download formats.  Subscribers to the All Access Pass already have access to this new course, and can upgrade to the download version for $159.  Non-subscribers can purchase the standalone download for $299, or subscribe to the AAP for just $159 per month.  Customers who have access to previous versions of the CCIE Security ATC will get access to the new... Read More
Jan
24
Today's challenge is drawn from the exciting area of CCNA Security. Enjoy. As always, you can find the answer in the comments area a day or two after the date of this post. Read More
Dec
01
Catalyst switch port security is so often recommended. This is because of a couple of important points: There are many attacks that are simple to carry out at Layer 2 There tends to be a gross lack of security at Layer 2 Port Security can guard against so many different types of attacks such as MAC flooding, MAC spoofing, and rouge DHCP and APs, just to name a few I find when it comes to port security, however, many students cannot seem to remember two main points: What in the world is Sticky... Read More
Oct
16
In this series of blog posts, we will examine WLAN security mechanisms in an even greater detail than in our popular 5-Day CCNA Wireless course. We will begin with one that is now considered legacy due to major weaknesses that were quickly discovered in its implementation. This security mechanism receives the least coverage in the CCNA Wireless materials and exam, because, as we stated, it is indeed considered legacy. The official title for this technology is Preshared Key Authentication with... Read More

Subscribe to INE Blog Updates

New Blog Posts!