• Quantum computing and the threat to to information security

    Posted on 19/07/2019 by | 0 comments

    Introduction – what is quantum computing?

    This has been defined as technology that:

    “makes direct use of distinctively quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data.”

    (Source: https://www.sciencedaily.com/terms/quantum_computer.htm)

    How does quantum computing work?

    In order to understand quantum computers, it helps to first understand ‘traditional’ computers. The computer or phone you’re using now to read this stores information in ‘bits’. This is a electronic and is a binary option of 0 or 1. Contrast this with quantum computers, which store information with ‘qubits’. These work in accordance with quantum physics, hence the name ‘quantum computing’. Quantum physics can be a bit counter-intuitive, with interesting ideas like ‘particles can simultaneously be everywhere at once’, or in the case of qubits, they can be 0, 1 or both at the same time! The bottom line here is that the potential processing power a quantum computer using qubits could far outstrip a traditional computer using bits.

    Quantum computing and information security

    Why is quantum computing a threat to information security?

    The simplest way to crack an encryption is to try all possible combinations until you get the right one. The current information security encryption technologies essentially rely on the fact that our current computers do not have the processing power to do this. For example, even with a 64 alpha-numeric encryption it took 300 computers over 4 years to crack. Increase this to 128 alpa-numeric symbols and we’re talking millions or even trillions of years. However, with qubits and quantum computing being much faster, they will be able to try all possible combinations at a much faster speed.

    When will quantum computing be able to crack the current encryption technologies?

    Quantum computers already exist, however the current processing power is not sufficient to crack any of the contemporary encryption technologies currently being used. It has been reported that the technology required is now only few years away.

    What can information security professionals do to combat the threat of quantum computing?

    Companies such as DigCertLabs are investing heavily in staying ahead of this threat. They have developed (and are developing) new technologies which provide additional obstacles for quantum computers. So, for now, information security professionals can breathe a small sigh of relief. However, the real question here is this: Will quantum computers develop at a faster rate than encryption technologies? Or will information security professionals always be able to stay one step ahead? Perhaps only time will tell.

    About Infosec-Careers.com

    infosec-careers.com is a provider online courses and discounts for information security professionals. Read about the best cyber security courses in 2019 or view our online cyber security course discounts.

    Read more
  • The Top 5 Cyber Security News Stories this Month (March, 2019)

    Posted on 21/03/2019 by | 0 comments

    This post aims to give you a quick update about the top 5 cyber security news stories which have happened in March, 2019.

    Online security training courses1. The Facebook DNS attack

    Anyone who still uses Facebook will know that the service (for many users, but not all) was temporarily down for several hours earlier this month. This was caused by a vulnerability of Facebook servers, leaving them open to DNS attacks. Although simple, these attacks were extremely effective, with the attacks also affecting Facebook’s other properties, Whatsapp and Instagram. The vulnerability has since been fixed, but it is a reminder of how quickly and easily even multinational tech conglomerates like Facebook can be brought to their knees.

    Read more about this story.

    2. Ransomware hackers target the industrial sector

    After successful ransomware attacks on the healthcare sector last year, ransomware hackers this month turned their attention to the industrial sector. One of the world’s largest aluminium producers, Hydro, admitted that its systems had been hacked. Nowadays, manufacturers like Hydro rely more and more on computerized systems, which can help productivity and efficiency, however it leaves them more vulnerable to such attacks. This attack is of particular significance because of the size of Hydro, which employs thousands of people worldwide in over 40 countries.

    3. SMS: The new platform for scammers?

    We are all familiar with emails from someone claiming to be a long lost aunt, the Prince of Arabia, or a Spanish lottery fund, all of whom claim to have great news for us in terms of offering us money. As information security professionals, we can spot such scams a mile away. And, fortunately, the average consumer is also (finally!) getting wise to such scams. HOWEVER, the scammers have responded by taking things up a level. They are now using SMS as a new way of reaching and interacting with their potential victims.

    Read more about this story.

    best cyber security courses4. Security spending now over $100 billion

    According to the IDC, information security spending reached $103 billion in 2018. For anyone in the cyber security sector, this is good news. It means our industry is growing, hence more employment opportunities. It shows a real (and growing) need for information security. This is, of course, an expected trend. With more and more processes being computerized and moved online, it’s logical that these processes (and the companies and organizations which run them) need to be protected.

    Read more about this story.

    5. Phishing attacks increased by 100% in 2018

    Not only is security spending increasing, but the number of attacks is also increasing! 2018 saw the number of phishing attacks DOUBLE. These attacks were comprised of traditional methods, as well as more innovative methods. The usual tactic of phishing on the back of mainstream events, such as the GDPR requirements, or other news stories, were commonplace. It stands to reason that phishing is working, else they would not continue. The next question then is how to defend against such attacks, or how to better educated staff and the general public to differentiate between authentic communication and phishing.

    Read more about this story.

    About ISCN

    ISCN is a provider of discounts for cyber security courses. You can browse discounts by company/organization, new courses, popular courses and more. You may also be interested in reading the results of our survey about the best cyber security certifications in 2019.

    Read more
  • 6 Cyber Security Predictions for 2019

    Posted on 28/12/2018 by | 0 comments

    It has been an eventful past 12 months in the world of cyber security. 2018 saw the boom and bust of crypto currency mining and markets, huge data loss issues (even the loss of government held user data), as well as ongoing malware attacks.

    What is less clear is what the future holds. However, here at Infosec-Careers.com we’re going to stick our necks out and make the following 6 predictions:

    1. The growing importance of AI

    AI is increasing in all areas of our lives and with it will come new opportunities for hackers. Tasks previously done by humans will become automated, opening the door to cyber security threats. What is interesting is that not only are AI systems being targeted, but AI systems are also being used by hackers as tools in the process.

    And guess what – AI will also be used to defend against such threats. In other words, we’ll have the bizarre situation where AI systems are being defended by other AI systems against (yes, you guessed it) AI systems.

    2. The expanse of 5G networks

    2018 already saw the growth of 5G, but 2019 will see this move to the next level. In case you’re wondering what this has to do with cyber security, well, the answer is a lot. The increased speed and volume of data which 5G networks can handle will result in a corresponding increase in companies and programs which utilize it. With more processes being conducted online, the hacking opportunities (and subsequent need for cyber security) will increase.

    3. Continued increase of data protection measures

    Anyone who has worked with clients in the EU will know how significantly government regulation can affect data protection. GDPR was unrolled in 2018 which ramped up the responsibility of companies to protect customer data, plus to inform those customers about what they intend to do with the data and how they will keep it safe. With the huge data hack scandals of 2018 (e.g. when Facebook lost the data of 2.2 BILLION users), it’s likely that this demand for security is being fueled not just by governments, but by a general public who is angry at such corporations. As such, this is a trend which is likely to continue well into 2019 and beyond.

    4. Increase in government sponsored activity

    In addition to governments attempting to protect their own citizens, we are likely to see an increase in governments also using cyber attacks as a means of offense. In a world where everything is digitalized, it can be far quicker, cheaper, and easier to weaken your enemies will well-targeted hacks instead of expensive and unpopular traditional means of warfare. What is more, such attacks can often be carried out with almost complete anonymity (if done well!) These may come in the form of straight out attacks with the intent of disabling or weakening systems, espionage, or may even election meddling, as reportedly seen with Russia’s involvement in the US and UK elections.

    5. Increasing role of multi-factor authentication

    With online fraud increasing, it seems logical to assume that companies will take measures to tackle this. And one of those methods is to require multi-factor authentication. Most of us have seen it already with online banking, however this may be extended further to many other companies (and organizations) not currently making use of it.

    6. Increasing importance of certifications

    With a booming cyber security industry, the number of employees in the field has correspondingly increased. With more competition for positions, how can employers filter out the ‘good’ employees from the ‘bad’? One way is by comparing education and qualifications on applicants’ resumes. As such, the importance of cyber security certifications is predicted to increase. For those interested in  developing their careers by obtaining such qualifications, it may be worth reading our previous blog post about “The Top 10 Cyber Security Certifications in 2019.”

    Read more
  • The Top 5 Sites to Stay Informed about Cyber Security Threats

    Posted on 25/09/2018 by | 0 comments

    As an information security professional, we know that you’re usually the one that your colleagues, managers, or shareholders rely on to have an up-to-date understanding of the current threats out there, and advice for how to avoid them.

    This blog post aims to list the top 5 sites which help you do this.

    What are the top 5 sites to stay informed about cyber security threats?

    1. https://www.us-cert.gov/ncas/alertsThe United States

    US Cert

    Figure 1: Screenshot from US-CERT

    The United States Computer Emergency Readiness Team publishes a list of current cyber attacks and potential threats.


    The alerts are available in RSS format, meaning you can be kept up-to-date with these threats via your RSS Feed Reader on your phone.


    The downside is that these update are few and far between. The most recent alert is from June 20, 2018 (correct at time of writing), which is already months ago!

    2. https://www.ncsc.gov.uk/threats

    The National Cyber Security Center (a part of the UK’s GCHQ) is essentially the UK’s version of US CERT. It issues alert notices regarding cyber attacks detected in the UK. Despite being a UK site, many of these attacks will also have global relevance.


    The alerts are available via Twitter.


    As with US-CERT, the frequency of updates is poor. The most recent update was the 25th of July 2018 (correct at time of writing), several months ago.

    3. http://www.digitalattackmap.com/

    The Digital Attack Map provides a real time map of DDoS attacks showing where the attacks are taking place and the country of origin of those attacks.


    If you are a visual person, this map is for you. It provides a great visual representation of DDoS attacks, combined with the ability to change the view according to attack type, country, duration, as well as other variables. It is also in real time.


    Despite providing a great visual, it’s hard to see the direct benefit to Information Security professionals. The information is on such a macro level (the country being the smallest unit of analysis), the the information is not really usable.

    4. http://map.norsecorp.com/#/

    Norse Threat Detector

    Figure 3: Norse Real Time Cyber Attack Map

    This is another map showing real time cyber security attacks. Norse boasts the world’s largest dedicated threat intelligence network with over 8 million servers.

    One of the great advantages of this map over the Digital Attach Map, is its specificity when it comes to the source of the attack. With more specific data, cyber security professionals are able to better pinpoint the source of the attached and, therefore, how to stop it.


    Real time cyber security information with more detail than the Digital Attack Map.


    The map is a tool to persuade you to sign up to Norse’s paid-for services.

    5. https://www.bbc.com/news/topics/cp3mvpdp1r2t/cyber-attack

    For those of you looking for a more mainstream, article style newsfeed, the BBC is not a bad option. Based on the last few weeks, it has been publishing 3 to 4 articles a week about cyber security attacks. Of course, these articles will often lack the technical detail many cyber security professionals are accustomed to, however, for a general overview and update of mainstream threats, it is a nice option.


    Regular updates in article form. Accessible language which can be forwarded to clients or non-technical colleagues.


    Lack of technical details and always retrospective, not in real time.

    Further Information

    Are you a cyber security professional looking to advance your career? Take a look at our list of the Top 10 Cyber Security Certifications in 2019.

    Read more
  • What are the Best Cyber Security Certifications to have in 2019? (List of the Top 10)

    Posted on 16/07/2018 by | 0 comments

    Are you looking for a definitive list of the best Cyber Security Certifications in 2019? We surveyed over 200 cybersecurity professionals and created a list of the top 10. See the results below!

    What are the Best Cyber Security Certifications to have in 2019? – Introduction

    Cyber security certifications can be a great way of fast tracking your career. The right course can get you that promotion you want. However, they require an investment of both time and money, and you don’t want to waste either of these on the wrong course.

    This is why it’s worth taking some time to choose carefully. We surveyed over 200 cyber security professionals and have used the results to create a list of the best cyber security certifications to get in 2019.

    The Top 10 Cyber Security Certifications in 2019 are…

    CISSP discount code

    1. CISSP – Certified Information Systems Security Professional – from ISC2

    In 1st place by some distance is the CISSP (Certified Information Systems Security Professional). In our survey of over 200 cyber security professionals, this was voted the best cyber security certification to have. A whopping 44.8% of respondents stated that CISSP was the best security course they have completed (see Figure 1.1 below).

    Best Cyber Security Certifications 2019

    Figure 1.1: In response to the question: “What would you rate as the best security certification you have completed?”

    This popularity was even higher in the Americas (55.75%), so it seems to be a “must have” course for any serious IT security professionals in North America and South America. It was also the most popular course among the majority of industries, including Energy, Engineering, Investments, Hospitality, Utilities, Wholesale, Legal and Professional Services.

    Why do security professionals think CISSP is the best course?

    When we asked them this, the majority (a combined total of 31.4% – see Figure 1.2 below) stated that it enabled them to do their job better. This shows that CISSP is relevant in the real world. It does not just teach you theory – it gives you skills which you can actually use in real world scenarios. Other reasons for choosing the course included “It helped me to get my current position” and “It increased my salary”.

    Why was it the best cyber security course?

    Figure 1.2 in response to the question: “Why was it the best course you completed?”

    CISSP was also the course which the highest percentage (14.8%) want to take next, which shows that the popularity of the course is likely to continue into 2019.

    Read more about the CISSP Online Course or use our CISSP Discount Code to save $500 on this course.


    2. CISM – Certified Information Security Manager

    The second best cyber security certification (according to the survey results) is the CISM (Certified Information Security Manager) course with 9.5% of the votes. This course is particularly popular in Europe (13%) and APEC (12%), as well as in the education (20%) and consulting (18%) industries. Behind CISSP it is also the second most popular course among cyber security professionals earning between $81,000-$150,000.

    The course is designed for managers and has a strong focus on strategy and policies. However, this one is not for beginners – a minimum of 5 years experience in Information Security is required before you are permitted to take the course. Plus this cannot be 5 years back in high school – the experience must be relevant from within the last 10 years. But if you meet the criteria, then the rewards (especially financial) are very handsome indeed.

    CEH - Certified Ethical Hacker

    3. CEH – Certified Ethical Hacker – from EC-Council

    In 3rd place is the CEH (Certified Ethical Hacker) Course with 7.6% of the votes. It is particular popular in MEA (Middle East and Africa) with over 27% of the votes for this region. It was also popular among those working in the military, manufacturing, software and telecommunications sectors.

    The CEH online training course covers 18 of the most up to date and important security domains you will need to consider as an ethical hacker when you are looking to test how well your organization is prepared for attacks, and to improve information security policies through identifying potential weaknesses. Taking you through 18 modules, the course comprehensively covers over 270 attack methods and technologies commonly used by cyber criminals and hackers.

    Read more about the CEH Online Course or use our CEH Coupon Code to get a 20% Discount.

    CompTIA Security+ Discount Code

    4. CompTIA Security+

    In 4th place is the CompTIA Security+ Course with 7.1% of the votes. Interestingly, it is popular among respondents earning over $175,000 with over 11% of this category stating it was the best cyber security certification they have completed. It was most popular in the Americas (9%) and healthcare sector (8%).

    $175,000 Best Security Certifications 2019

    Figure 1.3 showing the most popular security certification among the those earning over $175,000.

    For people interested in making their first steps toward a career in cyber security, the CompaTIA Security+ Certification is a great start. It is widely seen as one of the best introductory qualifications and a great way into the cybersecurity sector. By gaining the Security+ certification, you will be qualified to deal with a wide range of considerations that need to be taken into account to implement successful security strategies.

    Read more about the CompTIA Security+ Online Course or use our CompTIA Security+ Discount Code to save $500 on this course.

    OSCP Certification5. OSCP – Offensive Security Certified Professional – by Offensive Security

    In 5th place is the OSCP (Offensive Security Certified Professional) Course with 4.8% of the votes. It is very popular among those in the wage bracket $60-80,000 (16%), in the APAC region (16%), and in the mining (20%) and pharma (16%) sectors.

    The OSCP course has been described as a difficult certification to obtain, but one which will give you the necessary skills to understand the penetration testing process and life-cycle. Offered by Offensive Security as an ethical hacking certification, they ask candidates to sit a 24 hour certification based on real world situations, which they argue offers real world benefits. These benefits include the ability to identify vulnerabilities in security systems, write simple Bash/Python scrips, compromise vulnerable PHD scrips, and carry out controlled attacks.

    A prerequisite for this course is the Penetration Testing with Kali Linux training course, also offered by Offensive Security.

    CCSP6. CCSP – Certified Cloud Security Professional

    In 6th place was the CCSP (Certified Cloud Security Professional) certification program with 1.9% of the votes. It also seems to be a sought after course for 2019 with 13.8% of respondents planning to take it as their next certification.

    CCSP from ISC2 is becoming more popular with the spread of cloud computing systems. It is specifically designed for information security professionals with a minimum of 5 years work experience, including a minimum of 1 year of cloud security experience and 3 years of information security experience.

    This certification program is suitable for mid to advanced-level professionals involved with information security, IT architecture, governance, web and cloud security engineering, risk and compliance, as well as IT auditing. CCSP credential holders are competent in the 6 CCSP domains mentioned below:

    ● Architectural Concepts and Design Requirements
    ● Cloud Data Security
    ● Cloud Platform and Infrastructure Security
    ● Cloud Application Security
    ● Operations
    ● Legal and Compliance

    The average annual salary for CCSP certificate holders is currently $81, 374.

    ISO27001 Certified ISMS Lead Implementer7. ISO27001 Lead Implementer

    In 7th place is the ISO27001 Lead Implementor course with 1.4% of the votes. It was most popular in Europe (4%) and APAC (4%) and 4.3% of all respondents state that it is the security certification they would like to take next.

    This course equips you with the knowledge necessary to implement and maintain an Information Security Management System (ISMS) which is compliant with ISO27001. This course is relevant and useful for anyone involved in a company’s (or organization’s) ISMS, including managers, consultants, those responsible for maintaining ISO27001 compliance, and ISMS team members. There are several different providers of this course, some offering it as an in-person course, others offering it online, so be sure to explore which version is the best fit for your specific needs and circumstances.

    CAST611 Course - APT Coupon Code8. APT – Advanced Penetration Testing – by EC-Council

    In 8th place is the APT (Advanced Penetration Testing) Course with 1% of the votes. It was most popular in Europe (2%), in particular in the computer hardware (14%) and consulting (3%) sectors and among those earning between $81,000-$100,000.

    Similar to OSCP and OSCE, the APT course prepares ethical hackers for real world scenarios. Students have to overcome defenses as well as discover targets, similar to situations you may encounter in ‘the real world’. Not only does the course teach you how to perform a professional security test, but it also shows you how to then present your findings in reports. For IT professionals who are serious about a career in information security, this course is a valuable addition to your skills and qualifications.

    The course includes invaluable training about real world penetration issues, including:

    • Exploitation
    • Post Exploitation
    • Advanced Techniques
    • Data Analysis
    • Reporting

    Read more about the APT Online Course or use our APT Coupon Code to get a 20% Discount.

    OSCE Certification9. OSCE – Offensive Security Certified Expert – by Offensive Security

    In 9th place is the OSCE (Offensive Security Certified Expert) with 1% of the votes. It also looks like a popular course for the future with 3.8% of respondents stating that they intend to take it as their next cyber security certification.

    The OSCE course is another ethical hacking certification offered by Offensive Security. As with OSCP, the OSCE course is designed for professional penetration testers. The exam itself involves a vulnerable network which has been designed to be penetrated within a 48 hour (yes, this exam is 48 hours long!) period. Their are a variety of hosts and points are awarded for each one compromised. Passing this exam demonstrates the candidate’s ability to think laterally and penetrate information security systems in real world scenarios.

    A prerequisite is the Cracking the Perimeter (CTP) exam.

    10. GSEC – GIAC Security Essential – by SANS (and other providers)

    In 10th place is the GSEC-GIAC Security Essential course, also with 1% of the votes.It was most popular in the Americas, in particular in the banking sector (5%).

    The GSEC course is a good option for entry level information security professionals. It is considered to be a good “all-rounder” demonstrating not just theoretical knowledge about information security, but also hands on practical skills. These include the ability to prevent common wireless attacks, password management, DNS, and cryptography fundamentals among others.

    The exam itself takes 5 hours and has 180 questions.

    Honorable Mentions

    The courses below did not make the top 10 in our survey, but we have picked them out as honorable mentions:

    CCISO Coupon CodeCCISO – Certified Chief Information Security Officer – from EC-Council

    The CCISO Certification from EC-Council is an industry-leading CISO training program that recognizes the variety and depth of real-world experience that is required to succeed at Executive level in information security. Itwas listed above the CISSP as one of the certifications held by top earners in Certification Magazine’s ‘Salary Survey 2015: An All-New Salary Survey 75’.

    Read more about the CCISO Online Course or use our CCISO Coupon Code to get a 20% Discount.

    EC-Council CES Course - CES Coupon CodeECES – Certified Encryption Specialist – by EC-Council

    Encryption is becoming an increasingly important part of cyber-security. This course will teach you the foundations of modern symmetric and key cryptography, including the details of algorithms such as Feistel Networks, DES, and AES. In terms of practical application, you will learn how to set up a VPN, encrypt a drive, knowledge of steganography and cryptographic algorithms.

    EC-Council’s ECES Course is for anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype.

    Read more about the CES Online Course or use our CES Coupon Code to get a 20% Discount.


    CHFI – Computer Hacking Forensic Investigator – by EC-Council

    The CHFI from EC-Council is a computer forensics course that will give you a range of skills to help you identify an intruder’s footprints and teach you how to gather the necessary evidence to prosecute.

    You will be taught about many of the top tools used in computer forensics, including hardware, software, and specialized techniques.

    It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?”

    Make sure you’re ready by completing this online training course and getting certified as a Computer Hacking Forensic Investigator.

    Read more about the CHFI Online Course or use our CHFI Coupon Code to get a 20% Discount.

    CND Coupon Code

    CND – Certified Network Defender – by EC-Council

    The CND course from EC-Council is the most advanced Certified Network Defense course with 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect, and respond to the network attacks. Using the CND coupon code (“INFOSEC20”) allows you to obtain this qualification with a 20% discount.

    Read more about the CND Online Course or use our CND Coupon Code to get a 20% Discount.

    Save on the best Cyber Security Certifications through ISCN

    Many of these training courses are available through our partners at discounted rates for the ISCN community (which you are a part of if you’re using this site). You can view the full list of our current training discounts on our homepage.

    Start today to find out more and start your journey, get certified, and get that promotion!

    Get started

    Read more
  • Introduction to Cybersecurity Course



    Get started

    Introduction to Cybersecurity Course MentorshipWhy take the Introduction to Cybersecurity Course?

    This is a great introductory course for anyone considering a career in cybersecurity. The course will:

    • Give you an overview of the cybersecurity industry, including the most popular certifications and jobs within the industry;
    • Provide you with a foundational understanding of key concepts, such as “security architecture”, “networking”, and “risk management”, among others;
    • Give you an opportunity to practice what you learn in a lab environment;
    • Give you the knowledge you need to pass the CompTIA Security+ Exam.

    About the Introduction to Cybersecurity Course by Springboard

    If you are brand new to the world of cybersecurity, then this is an ideal course for you. One of the key advantages of this course is that it offers support by mentors (real humans!) along the way. So, if at any point you do not understand something, a friendly and knowledgeable mentor will be available to answer your questions.

    Many beginners choose this course for the following reasons:

    • They can practice real world scenarios. Are you someone who learns by doing? Practice what you learn in real life scenarios. For example, you will run real security tools against a network environment of a fictitious company;
    • They get weekly mentorship. Stay on track with 30 minutes / week of 1:1 mentorship;
    • Network with peers. As with any career, one of the main ways to get ahead is through networking. This course will give you the chance to meet others who are entering a career in cybersecurity. These connections may prove to be helpful later on in your career!

    More Information about the Course Mentors

    Introduction to Cyber Security Course - Course Mentor

    Hi! My name is Hallie Yang! I am one of the Course Mentors (aka “Student Advisors”).

    This course can be challenging, so I’m here to help you succeed! Working with mentors like me allows you to:

    • Get feedback on your work;
    • Set your own agenda (discuss what YOU want to discuss);
    • Hear from my real life cybersecurity experience!

    Introduction to Cybersecurity Course – Curriculum

    The course is split into 8 units:

    1. Fundamentals of Information Security
    2. Architecture and Design
    3. Technologies and Tools
    4. Threats, Attacks, and Vulnerabilities
    5. Risk Management
    6. Identity and Access Management
    7. Cryptography and PKI
    8. Capstone Project

    Get started


    Introduction to Cybersecurity Course FREQUENTLY ASKED QUESTIONS

    Not sure if this course is right for you? Read our FAQs below to help clear up any uncertainty.

    How long does the course take?

    The course is self-paced and takes about 80-100 hours to complete all 8 units.

    How much does the course cost?

    The course is normally 15% more expensive, but purchasing this course via Infosec-Careers.com gives you access to a 15% Discount.

    What is the CompTIA Security+ Certification?

    As mentioned previously, this Introduction to Cybersecurity Course will help to prepare you for the CompTIA Security+ Certification. But what is it exactly? Read more about the CompTIA Security+ Certification.

    Is the course online or in person?

    All 8 units are instructed 100% online.

    Are there any prerequisites for the course?

    No, there are no prerequisites for the course, because the course is designed for beginners who are new to the field of cybersecurity.

    How do I use ISCN’s Discount Code to receive the Reduced Rate?

    To receive the Reduced Rate you need to enter ISCN’s Discount Code “ISCN15OFFCS1” when purchasing the course. View the video below for a demonstration.

    how to apply promo code


    Get started

    15% DISCOUNT

    Reveal offer
  • 1st Quarter of 2018: 3 Cyber Security News Stories which shocked the World

    Posted on 07/04/2018 by | 0 comments

    We’re already a quarter of the way through 2018. And it seems the cyber security trends of 2017 are continuing into 2018. Just 3 short months have passed, but we have already seen 3 big stories break the news.

    1st Quarter of 2018: 3 Cyber Security Stories which shocked the World

    1. Facebook compromises data of 2.2 billion users

    Yes, that’s right – 2.2. billion. So the odds are that if you have a Facebook account and you’re reading this, then you are likely to have one of the compromised accounts. However, unlike other data breaches which involve hacking, this data was willingly handed over. It has caused a media frenzy and raised questions about the ethnics of data sharing. It raises the question of where should the line be drawn and the responsibility of data protection for individual users vs. companies. Read more about this story.

    2. Indian Government Identity Card Database Leaks Data of 1 Billion

    Now this story was perhaps even more shocking. Unlike Facebook, residents of India do not have a choice of whether or not to provide their data. Aadhar is the Indian Government’s identify card database and apparently their data is being sold off (illegally) for a mere 500 RS. What is unnerving about this story is that it is government held data. After all, if national governments cannot keep people’s data safe, then it raises the question of who can. One thing is for sure – the cyber security skills necessary in 2018 and beyond are evidently lacking. Subsequently, it is no wonder that courses such as EC-Council’s Certified Ethical Hacker Course have become so popular. Interested in this course? Get a discount on this course with our CEH Coupon Code. Or read our recommendations of the Top Cyber Security Certifications in 2018.

    3. The Growth in Crypto Currency Mining

    Despite the recent decrease in the value of Bitcoin, data currency mining has continued to boom. But how does this relate to cyber security? The answer is that crypto currency mining requires a large about of processing power. This has led many mining projects to ‘steal’ the processing power of third party computers. In other words, they are hacking other computers to use them to help mine. Subsequently, from a cyber security perspective, it is important for users to be diligent about protecting their computers from such malware.

    About ISCN

    ISCN provides online security discount codes for some of the major online security certifications. We now have discount codes for many online security training courses. Here are some of our most popular offers. Click on the links below to view the discounts available:

    Or view all Security Training Courses here.

    Read more
  • CSCU Coupon Code – EC Council’s CSCU Course – Reduced Rate with this Code



    Get started

    Why take the CSCU Course?

    For those who are relatively new to the world of cyber security and want to get their first qualification, this one is a great starter option. As an introduction to cyber security, the course is designed for people with limited knowledge experience in the field. It aims to equip participants with a fundamental understanding of computer and network security threats such as:

    • identity theft
    • credit card fraud
    • online banking phishing scams
    • virus and backdoors
    • emails hoaxes
    • sex offenders lurking online
    • loss of confidential information
    • hacking attacks and social engineering

    Plus, as a result of completing the course, you are likely to learn ways to protect YOURSELF and your own data online.

    About the CSCU Online Training Course

    Soar to new Heights with this introduction to cyber security! The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

    CSCU Course Outline

    • Module 1 (Introduction to Data Security)
    • Module 2 (Secure Operating Systems)
    • Module 3 (Malware & Antiviruses)
    • Module 4 (Internet Security)
    • Module 5 (Security on Social Networking Sites)
    • Module 6 (Securing Email Communications)
    • Module 7 (Securing Mobile Devices)
    • Module 8 (Securing the Cloud)
    • Module 9 (Securing Network Connections)
    • Module 10 (Data Backup and Disaster Recovery)

    Recent news about the CSCU Course

    Get started



    Not sure if EC Council’s CSCU Online Course is right for you? Read our FAQs below to help clear up any uncertainty.

    Who is the CSCU Course designed for?

    This course is specifically designed for those just starting out in the field of cyber security, plus computer users in general. As the internet is quickly moving into a necessity, so is the need to learn how to safely browse, watch videos, send email, and even work online.

    What does the CSCU Course include?

    • Instructor-led, streaming video training modules – 1 year access
    • Official EC-Council e-courseware – 1 year access
    • iLabs, virtual lab platform – 1 year access
    • Certification Exam Voucher
    • Certificate of Attendance

    Can I see a Demo of the CSCU Course?

    Yes – you can – here you go! Click on the video below to view.

    How do I use ISCN’s CSCU Coupon Code to receive a Reduced Rate?

    To receive the Reduced Rate you need to enter ISCN’s CSCU Coupon Code “INFOSEC20” when purchasing the course. View the video below for a demonstration.


    Get started


    Reveal offer
  • ECSA Coupon Code – EC Council’s ECSA Course – Reduced Rate with this Coupon Code



    Get started

    Why take the ECSA Course?

    For those who have already taken the Certified Ethical Hacker (CEH) Course, the ECSA Course is a great “next step”. Using skills learned from the CEH Course, it takes things to the next level by offering you a pen test methodology deployed through its hand-on component; EC-Council’s online cyber range. In other words, it will teach you how to apply your hacking skills in a pen test scarnio. The scenarios cover the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

    About the ECSA Online Training Course

    EC-Council’s Penetration Testing Certification Training Course – ECSA version 9 takes the skills taught in our Certified Ethical Hacker course to the next level by offering cyber security professionals a pen test methodology deployed through its hand-on component; EC-Council’s online cyber range.

    Since CEH came on the market like a whirl wind, over 100,000 IT Security professionals have become Certified Ethical Hackers. Today the term “ethical hacker” has become a baseline, description for an IT Security professional. EC-Council brought you that term.

    Each candidate will be required to write and submit a penetration test report which they will develop throughout the course and which will be based on the labs in the course delivered via EC-Council’s iLabs cyber range platform. Only candidates who can successfully complete the challenges and pass the report writing portion of the course will be allowed to take the EC-Council Certified Security Analyst (ECSA) certification exam.

    ECSA Course Outline

    • Security Analysis and Penetration Testing Methodologies
    • TCP IP Packet Analysis
    • Pre-penetration Testing Steps
    • Information Gathering Methodology
    • Vulnerability Analysis
    • External Network Penetration Testing Methodology
    • Internal Network Penetration Testing Methodology
    • Firewall Penetration Testing Methodology
    • IDS Penetration Testing Methodology
    • Web Application Penetration Testing Methodology
    • SQL Penetration Testing Methodology
    • Database Penetration Testing Methodology
    • Wireless Network Penetration Testing Methodology
    • Mobile Devices Penetration Testing Methodology
    • Cloud Penetration Testing Methodology
    • Report Writing and Post Test Actions

    ECSA Discount Code

    Recent news about the ECSA Course

    Get started



    Not sure if EC Council’s ECSA Online Course is right for you? Read our FAQs below to help clear up any uncertainty.

    Who is the ECSA Course designed for?

    The ECSA penetration tester course was designed by professionals to teach ethical hackers how to apply their hacking skills (Not limited to but including The Five Phases of Ethical Hacking) in a pen test scenario. The scenarios cover the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report. It is recommended that you first complete the Certified Ethical Hacker (CEH) Course prior to taking the ECSA Course.

    What does the ECSA Course include?

    • Instructor-led, streaming video training modules – 1 year access
    • Official EC-Council e-courseware – 1 year access
    • iLabs, virtual lab platform – 1 year access
    • Certification Exam Voucher
    • Certificate of Attendance

    How do I use ISCN’s ECSA Coupon Code to receive the Reduced Rate?

    To receive the Reduced Rate you need to enter ISCN’s ECSA Coupon Code “INFOSEC20” when purchasing the course. View the video below for a demonstration.


    Get started


    Reveal offer
  • Master Mobile Application Developer Discount Code (MMAD)

    Save 20% on Master Mobile Application Developer (Exam MAD-111) when you use our Master Mobile Application Developer Discount Code.

    Use our MMAD Discount Code ISCNVOUCH20 when you get to the check out page to receive a 20% discount.

    Get started

    About the Master Mobile Application Developer (Exam MAD-111) Exam

    Target Audience

    This exam is intended for an application programmer or web developer who is relatively new to developing Android and iOS apps. The candidate has experience using a computer running Windows 10 or Mac OS X and developing applications using object-oriented programming languages and tools. The ideal candidate also has basic project management skills and experience.

    Exam Content

    To ensure exam candidates possess the aforementioned knowledge, skills, and abilities, the MMAD exam will test them on the following objective domains with the following weightings:

    Domain % of Examination
    1.0 Android Mobile Application Development 40%
    2.0 iOS Mobile Application Development 38%
    3.0 General Principles of Secure Mobile Application Development 13%
    4.0 Project Management Fundamentals 9%
    TOTAL 100%

    Exam Specifications

    Number of items: 75

    Passing Score: 57 out of 75 (75%)

    Duration: 120 minutes (Note: Published exam times include the 5 minutes you are allotted for reading and signing the Candidate Agreement and the 5 minutes you are allotted for the Pearson VUE testing system tutorial.)

    Exam options: In person at PearsonVUE testing centers

    Item formats: Multiple Choice/Multiple Response/True-False

    Retake Policy: This voucher includes one free retake for candidates who do not pass on the first attempt. Candidates who wish to use the free re-take must wait 30 days from the time of the original exam to schedule and/or sit the next exam.

    Get started

    How does the Master Mobile Application Developer discount code work?

    The MMAD discount code (also known as the MMAD Coupon Code) is ISCNVOUCH20. To save 20%, you just need to use our CSC discount code ISCNVOUCH20 when you get to the checkout page. The discount code field will only appear when you get to the final payment page – as shown here:

    master mobile application developer discount code

    Get started

    Use our CSC Discount Code ISCNVOUCH20 when you get to the check out page to receive a 20% discount!

    20% DISCOUNT

    Reveal offer