• EHCS Coupon Code – Save on EC Council’s EHCS Course

    Authorized EC-Council CyberSecurity Online Course Reseller

    EHCS – ETHICAL HACKING CORE SKILLS

    SAVE ON ETHICAL HACKING CORE SKILLS FROM EC-COUNCIL

    **USE EHCS COUPON CODE INFOSEC15 FOR A REDUCED RATE**

    Get started

    EC-Council’s Ethical Hacking Core Skills course is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security.

    Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training.

    About the Ethical Hacking Core Skills (EHCS) Online Training Course

    In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build a solid knowledge of the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric.

    Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training. For many, when you take a class like the Certified Ethical Hacker (CEH) you have not established the foundation that is needed to get the most from the course, this is where ethical hacking core skills come in, it is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security.

    Recent news about the EHCS course


    Get started

    **USE COUPON CODE INFOSEC15 FOR A REDUCED RATE**

    EHCS Online Course FREQUENTLY ASKED QUESTIONS

    Not sure if EC Council’s EHCS Online Course is right for you? Read our FAQs below to help clear up any uncertainty.

    If I use the EHCS Coupon Code, how much will I save?

    Due to the current terms of our partnership with EC-Council, we aren’t allowed to specify the % discount, but you will find out when you enter the code at the checkout.

    Who is the EHCS Course for?

    In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build solid knowledge on the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric.

    Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training. For many, when you take a class like the Certified Ethical Hacker (CEH) you have not established the foundation that is needed to get the most from the course, this is where the Core Concepts course comes in, it is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security.

    What Modules does the EHCS Course include?

    Module 1: Introduction To Required Skills For Security
    Module 2: Introduction & Overview
    Module 3: UNIX/Linux
    Module 4: Introducing Linux
    Module 5: Overview of Virtual Machines
    Module 6: Introduction to Vulnerability Assessment
    Module 7: Introduction to the Hacking Process Hacking Methodology
    Module 8: Challenges of Staying Current

    What does the EHCS Online Training Package include?

    You can choose either a Live, Online, Instructor-led or Private Team Training course, or if you prefer to do things at your own pace you can choose the self-paced online course using EC-Council’s iLearn option.

    How do I use ISCN’s EHCS Coupon Code to receive the Reduced Rate?

    To receive the Reduced Rate you need to enter ISCN’s EHCS Coupon Code “INFOSEC15” when purchasing the course.

    **SAVE ON EHCS ONLINE TRAINING FROM EC-COUNCIL – USE COUPON CODE INFOSEC15**

    Get started

    REDUCED RATE

    VALID
    Show Coupon
  • CBP Coupon Code – Reduced Rate on EC-Council’s CBP Course

    Authorized EC-Council CyberSecurity Online Course ResellerCBP – Certified Blockchain Professional

    SAVE ON CBP ONLINE TRAINING FROM EC-COUNCIL

    **USE CBP COUPON CODE ‘INFOSEC15‘ FOR A REDUCED RATE**

    Introducing the first Blockchain Professional Training and Blockchain Certification Program to set the global standard in Blockchain Technology.

    Get started

    The Certified Blockchain Professional is fully vendor-agnostic and practical, focusing on the current state of blockchain technology as well as its future potential. The Certified Blockchain Professional course digs deep into the main characteristics and features of the distributed ledger technology (DLT) as well as introduces Blockchain’s new 3S (Secure-Scalable-Sustainable) proprietary framework. Students will also get a deep understanding of blockchain technology and mining of cryptocurrency.

    The Certified Blockchain Professional course begins with the technical foundations of blockchain, such as distributed and decentralized systems, cryptography, and mining. Students will then learn how to develop applications using Ethereum, a decentralized virtual machine. Additionally, students will explore different blockchain enterprise applications such as Hyperledger, introduced by the Linux Foundation and widely used by IBM. Most importantly, the course will cover multiple blockchain implementation concepts by immersing students into sustainable and scalable blockchain development, the cornerstone of a decentralization strategy.


    Get started

    **USE CBP COUPON CODE ‘INFOSEC15’ FOR A REDUCED RATE**

    If I use the CBP Coupon Code, how much will I save?

    Due to the current terms of our partnership with EC-Council, we aren’t allowed to specify the % discount, but you will find out when you enter the code at the checkout.

    What is included with the course?

    The CBP course is divided into 4 phases:

    Phase 1: Blockchain Fundamentals

    Phase 2: Applications of Blockchain Technology

    Phase 3: Blockchain Project Implementation

    Phase 4: Advanced Blockchain Development

    How is the course delivered?

    You can choose either a Live, Online, Instructor-led or Private Team Training course, or if you prefer to do things at your own pace you can choose the self-paced online course using EC-Council’s iLearn option.

    Who is the course designed for?

    The CBP program is specifically tailored to full-stack developers.

    What is the aim of the course?

    The main aim of the Certified Blockchain Professional Course is for full-stack developers to get a comprehensive and complete understanding of blockchain from the fundamentals of how the technology works to advanced application and implementation strategies.

    The aim is that after completing the course you will possess in demand ethical hacking skills that employers are crying out for!

    **SAVE ON CBP ONLINE TRAINING FROM EC-COUNCIL – USE CBP COUPON CODE INFOSEC15**


    Get started

     >> Choose the training option that suits you

    REDUCED RATE

    VALID
    Show Coupon
  • CISM Promo Code (20% Discount)

    20% Discount on CyberVista’s CISM Online Course with our CISM Promo Code

    **USE CISM PROMO CODE ‘ISCN20’ FOR A REDUCED RATE**

    To obtain the discount, please add the course to your cart here, then insert the CISM promo code ‘ISCN20’ when prompted.

    Get started - Discount for the CISM Course with our CISM Promo Code


    Basic information about the Online CISM Training Course

    ISACA’s Certified Information Security Manager (CISM) online course is one of the most recognized and popular cyber security courses. It came in 3rd place in our list of the best cyber security certifications in 2021. The certification is issued by ISACA, which is one of the most respected names in the information security sector.

    In order to get CISM certified, candidates must take the CISM exam, as well has have a minimum of 5 years of experience working in information security management. As such, the certification is not for beginners.

    The requirements may seem difficult, but they can be handsomely rewarded with CISM graduates earning an average salary average salary of $126,442.

    Average salary of CISM

     

    What is more, you can get a 20% discount on the cost of course with our CyberVista CISM Promo Code. To obtain the discount, please add the course to your cart here, then insert the CISM promo code ‘ISCN20’ when prompted.

    Get started - Discount for the CISM Course with our CISM Promo Code


    Online CISM Certification – FAQs

    What does CISM stand for?

    CISM stands for ‘Certified Information Security Manager’.

    Why get the CISM Certification?

    In our survey of the top information security courses in 2021, the CISM course ranked high due to its management qualities. In other words, if you are looking to enhance your career with cyber security management skills, then the CISM is likely a good investment for you. Not only can it enhance your career, but it can also give you real world management and strategy skills. For this reason, it has become one of the most popular and sought after cyber security certifications.

    Who can do the CISM course?

    Course participants need to have had 5 years of management experience working in information security management. As such, the course is design for people with the following roles:

    • Chief Information Security Officer
    • Security Manager
    • Director of Security
    • Security Auditor
    • IS/IT Consultant
    • Information Security Manager
    • Security Systems Engineer
    • Security Consultant

    What does the CISM training course include?

    The CISM online course includes the following:

    • 16+ hours of 5-15 minute on-demand training videos
    • Supplementary videos
    • 100 question diagnostic exam
    • 950+ practice question bank
    • 400+ digital flashcards
    • 100 question mid-term practice exam
    • 150 question final exam
    • Performance Tracker
    • Summary Notes
    • Summary Videos
    • CISM Review Manual (15th Ed.) by ISACA

    The above is divided between 4 distinct domains:

    Domain 1: Information security governance.

    Domain 2: Information risk management.

    Domain 3: Information security program development and management.

    Domain 4: Information security incident management.

    What is the best CISM Online Training?

    There are several providers of the CISM course, so why choose CyberVista’s CISM online training? There are three main reasons. First, the course consistently receives good feedback in terms of the quality of training. This is also reflected in the pass rate with over 70% of course graduates passing the CISM exam.

    CyberVista CISM Course Testimonial

    Second, CyberVista’s CISM course is online. This means you can take part in it from anywhere in the world. Third, it is about 50% less expensive than in-person versions of the CISM course.

    What is more, you can get a 20% discount on the cost of course with our CyberVista CISM Promo Code. To obtain the discount, please add the course to your cart here, then insert the CISM promo code ‘ISCN20’ when prompted.

    Get started - Discount for the CISM Course with our CISM Promo Code


    Online CISM Exam – FAQs

    How much does the CISM Exam cost?

    The CISM exam typically costs around $750.

    What is the CISM exam format?

    During the exam, you have 4 hours to answer 200 multiple choice questions. Below is a sample CISM exam question:

    Sample CISM exam question

    Sample CISM exam question. Source: https://www.isaca.org/-/media/info/cism-practice-quiz/index.html

    How many questions are there in the CISM exam?

    There are 200 multiple choice questions in the CISM exam.

    What is the CISM exam passing score?

    In order to pass the CISM online exam, candidates must obtain a score of at least 450 (out of 800).

    What is the CISM exam pass rate?

    The CISM online exam first time pass rate is typically around 50-60%.

    Can I take the CISM exam online?

    Yes, the CISM exam can now be taken online.

    How can I study for the CISM exam?

    In order to prepare for the CISM exam, most candidates take part in a CISM training course. If you would like to take the course online, then one option is CyberVista’s CISM online training course. To obtain a 20% discount on this course, please see the instructions below.

    CyberVista CISM Promo Code


    How can I get a 20% Discount with the CISM Promo Code?

    ISCN has negotiated a 20% Discount for CyberVista’s online CISM training course. To obtain this discount, simply add the course to your cart here, then insert the CISM promo code ‘ISCN20’ when prompted.

    Get started - Discount for the CISM Course with our CISM Promo Code

    20% Discount

    VALID
    Reveal offer
  • CSCU Coupon Code – EC Council’s CSCU Course – Reduced Rate with this Code

    Authorized EC-Council CyberSecurity Online Course ResellerCSCU Coupon Code – SAVE ON THE CERTIFIED SECURE COMPUTER USER ONLINE TRAINING FROM EC-COUNCIL

    **USE CSCU COUPON CODE INFOSEC15 FOR A SPECIAL REDUCED RATE**

    Get started

    Why take the CSCU Course?

    For those who are relatively new to the world of cyber security and want to get their first qualification, this one is a great starter option. As an introduction to cyber security, the course is designed for people with limited knowledge experience in the field. It aims to equip participants with a fundamental understanding of computer and network security threats such as:

    • identity theft
    • credit card fraud
    • online banking phishing scams
    • virus and backdoors
    • emails hoaxes
    • sex offenders lurking online
    • loss of confidential information
    • hacking attacks and social engineering

    Plus, as a result of completing the course, you are likely to learn ways to protect YOURSELF and your own data online.

    About the CSCU Online Training Course

    Soar to new Heights with this introduction to cyber security! The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats. These include identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

    CSCU Course Outline

    • Module 1 (Introduction to Data Security)
    • Module 2 (Secure Operating Systems)
    • Module 3 (Malware & Antiviruses)
    • Module 4 (Internet Security)
    • Module 5 (Security on Social Networking Sites)
    • Module 6 (Securing Email Communications)
    • Module 7 (Securing Mobile Devices)
    • Module 8 (Securing the Cloud)
    • Module 9 (Securing Network Connections)
    • Module 10 (Data Backup and Disaster Recovery)

    Recent news about the CSCU Course


    Get started

    **USE COUPON CODE INFOSEC15 FOR A REDUCED RATE**

    CSCU Online Course FREQUENTLY ASKED QUESTIONS

    Not sure if EC Council’s CSCU Online Course is right for you? Read our FAQs below to help clear up any uncertainty.

    Who is the CSCU Course designed for?

    This course is specifically designed for those just starting out in the field of cyber security, plus computer users in general. As the internet is quickly moving into a necessity, so is the need to learn how to safely browse, watch videos, send email, and even work online.

    What does the CSCU Course include?

    • Instructor-led, streaming video training modules – 1 year access
    • Official EC-Council e-courseware – 1 year access
    • iLabs, virtual lab platform – 1 year access
    • Certification Exam Voucher
    • Certificate of Attendance

    Can I see a Demo of the CSCU Course?

    Yes – you can – here you go! Click on the video below to view.

    How do I use ISCN’s CSCU Coupon Code to receive a Reduced Rate?

    To receive the Reduced Rate you need to enter ISCN’s CSCU Coupon Code “INFOSEC15” when purchasing the course. View the video below for a demonstration.

    **SAVE ON CSCU ONLINE TRAINING FROM EC-COUNCIL – USE COUPON CODE INFOSEC15**

    Get started

    REDUCED RATE

    VALID
    Reveal offer
  • Stuck at home during the lockdown? Use this time to ‘Level Up’ with our top 3 online cyber security certifications

    Posted on 07/04/2020 by | 0 comments

    With ‘half of humanity under lockdown‘, it is likely that you are reading this from your home, or wherever it is that you are isolating yourself.

    This is an unprecedented and hugely distressing time for many of us, especially for those of us who have lost any friends or family as a result of COVID-19.

    For others, currently restricted to the four walls of their homes, it is perhaps a time of frustration, or even boredom. To make matters worse, it has been reported that the current lockdown could last for months.

    Stuck at home? Why not 'Level Up' with Online information security courses

    As great pragmatists, it has always been our belief that we should make the best of any situation, or, as the saying goes, “when life gives you lemons, make lemonade”.

    It’s inspiring to see how people have come together to look after the more vulnerable members of society. Many of us are juggling our time between caring for family members and/or vulnerable neighbors.

    If you’re lucky enough to have spare time on your hands, you may be looking for ways to use this time of isolation, and to keep your mind active to stave off ‘cabin fever’. If this is the case, it could be worth considering looking to ‘Level Up’ your skills with one of these online cyber security certifications

    Emerge from isolation with a qualification under your belt, making you more desirable to employers

    The job market is likely to look very different in the coming months, with some sectors possibly taking years to recover. Now more than ever, having a strong resume is likely to give you an advantage in what is likely to be an even more competitive world.

    Perhaps you’ve been considering moving into cyber security for some time, but haven’t had an opportunity to do so? Or perhaps you’re looking for ways to prove your existing knowledge to potential employers?

    Instead of emerging from isolation with a well-used Netflix account, why not do so with new information security skills and qualifications under your belt?

    If this sounds like a logical idea to you, then your next question is probably “OK, but which qualification should I choose?” To answer this, you may wish to read our list of the Top 10 Cyber Security Certifications in 2021.

    Alternatively, for your convenience, here are 3 of our favourites below:

    Top 3 Online Cyber Security Certifications

    CEH - Certified Ethical Hacker
    1. Certified Ethical Hacker (CEH)
      Version 10 of the CEH online training course covers 20 of the most up to date and important security domains you will need to consider as an ethical hacker. Learn more.

    CCISO - Certified Chief Information Security Officer
    1. Certified Chief Information Security Officer (CCISO)
      The industry-leading CISO training program from EC-Council for senior security professionals in leadership positions. Learn more.

    1. Certified Information Systems Security Professional (CISSP)
      Still the most widely recognized and sought-after qualification for information security generalists, although less relevant for specialist positions. Learn more.

    About Infosec-Careers.com

    The Information Security Careers Network (ISCN) started out in November 2008 as a group on LinkedIn.

    The aim of the group was to provide a resource and networking area where cyber security professionals, hiring managers and recruiters can get in touch with each other and provide useful tips to help people progress and further their careers in IT security, information security, network security, disaster recovery, and more!

    Now with over 80,000 members, we’re the largest group on LinkedIn specifically dedicated to helping people further their careers in InfoSec. This means we’re able to work closely with well known and respected security training providers such as EC-Council and CyberVista to bring you specially negotiated offers, coupon codes and discounts on the most popular online cybersecurity training courses and respected security certifications.

    View all Security Training Courses and Discount Codes here.

    Read more
  • Enough of the politics. Technologically speaking, should Western governments permit Huawei’s involvement in 5G networks?

    Posted on 06/02/2020 by | 0 comments

    For months, the mainstream media has been reporting about the supposed security threat posted by Huawei’s involvement in 5G networks. However, these news reports often gloss over the technical side of things. They talk about ‘backdoors’ and ‘security risks’, but at no point do they actually explain how Huawei would ‘steal’ information, or how, technologically speaking, it could be stopped. This blog post aims to change that by zeroing in on the technology specifics of this whole Huawei 5G saga.

    Are ‘backdoors’ in 5G networks possible?

    In April, 2019, Bloomberg published a story alleging that Vodafone had found evidence of backdoors its fixed line network way back in 2009. However, in an article by TechRepublic, they point out that this allegation is based upon the Telnet interface, which is common in many other products, essentially meaning that there is a long list of other hardware suppliers supposedly guilty of creating backdoors. So, with regards to this particular case, it seems that, yes, backdoors are possible, however intent is hard to prove.

    Switching the focus to 5G networks, it seems these older security flaws might remain. Bruce Schneier, a lecturer at Harvard Kennedy School, writes:

    “…there’s so much backward compatibility built into the 5G network that older vulnerabilities remain.”

    Bruce Schneier, writing in ForeignPolicy.com

    According to him, the new 5G networks will likely be an extension of the 4G networks, leading to a continuation of old technology (and, therefore, security flaws) into the new networks.

    What is more, he claims that the inherent complexity of 5G networks makes them much harder to secure. The blurring of data between the wireless side of the network with the ‘core portion’ leads, in Schneier’s words, to ‘increased points of vulnerable’ attack.

    Verdict: Yes, backdoors in 5G networks are possible.

    5G cyber-security
    Modern city with smart 5G wireless communication network concept .

    Will the UK government’s steps to limit Huawei’s involvement make a difference?

    On the 28th of January, 2020, the UK government announced a list of restrictions to Huawei’s involvement in the 5G network which will, according to the UK government, mitigate any risk. Among others, these restrictions included:

    • Excluding ‘high risk vendors’ (such as Huawei) from ‘core parts’ of the 5G networks;
    • Restricting network involvement of high risk vendors to 35% of the network.

    So, will this mitigate the risk? Well, first of all, it remains unclear what exactly constitutes ‘core’ parts of the UK 5G infrastructure. Moreover, there are some who even say within a 5G network it is not even possible to carve out isolated safety zones.

    With regards to the 35% cap, this may decrease the chances of Huawei ‘intercepting’ certain information, by virtue of reducing the volume of data passing though Huawei equipment. However, from a risk management perspective, it would seem the specific data itself, not the quantity of it, that matters here.

    Verdict: It reduces the risk, but certainly does not remove it.

    Technologically speaking, what are the best solutions here?

    So, if Huawei is an issue, why not simply accept a bid from another vendor? It seems that there are not a lot of other options. The solutions offered by Nokia and Erikson are reportedly not one-to-one alternatives. One idea, which could perhaps be the model of future networks, is the notion of making all related-software open-source. By doing so, this would allow for governments and third parties to independently check if any supposed backdoors exist and if any traffic is passing though them. The O-RAN Alliance, supported by Orange among a number of other major mobile operators, seems to be calling for progress in this direction.

    Mobile operators, such as Orange, are supportive of the O-RAN Alliance and calls for making radio networks open-source.

    One of the major issues with Huawei’s technology is the opaqueness, which makes it difficult to see not only if backdoors exist, but if they are being accessed.

    Another solution would be to improve security software protecting and monitoring 5G networks. That, however, becomes increasingly difficult when considering the complex 5G typology mentioned previously.

    Verdict: At present, there are no great solutions, however there seems potential for improving 5G cyber-security via simultaneously removing opaqueness and increasing third party monitoring of networks.

    Conclusion

    We have tried to focus on the technological side of the debate here, BUT, as with the political side, instead of finding black and white answers, there are just shades of grey. Are backdoors in Huawei’s 5G networks possible? Yes, but it is hard to prove if they are deliberate or even being used. Will the UK government’s restrictions on Huawei’s involvement in their 5G network mitigate the risks? Partly, but not entirely. Are there any better solutions? Potentially, but not yet.

    However, one thing is clear. 5G will not only offer a range of cyber-security problems, but will, concurrently, create a huge demand for cyber-security professionals.


    20% Discounts on Online Cyber-Security Courses

    Want to improve your resumé and skills? Get more qualified by completing more cyber security certifications. Infosec-Careers.com has discount codes for the following information security certifications:

    Read more
  • The 5 biggest Cyber Security stories of 2019

    Posted on 09/12/2019 by | 0 comments

    2019, like every other year in recent times, has been rammed full of cyber security attacks. For most people, these are scary times. However, if there is a silver-lining to this cloud, then it’s for cyber security professionals. The one positive from all of these attacks is that cyber security specialists are needed.

    Here’s a quick recap of the 5 biggest cyber security stories of 2019:

    1. US Customs & Border Protection hacked

    It’s perhaps a bit ironic that US Customs & Border Protection, the agency responsible for maintaining border security, could not adequately secure its online data. In May earlier this year, the agency learned that photos and license plate information for up to 100,000 people had been hacked.

    It is reported that the attack may have been via a subcontrator. This falls in line with a string of other recent attacks, which gain access to their main target via the supply line.

    Customs & border protection hacked

    2. Even giants can be taken down: Amazon DDOS attack of October 22, 2019

    On October 22, 2019, Amazon underwent an 8 hour DDOS attack. An old, simple, yet still very effective strategy, DDOS attacks work by flooding a site with traffic.

    Want to understand the basics of DDOS attacks? This video explains:

    Amazon, in an email to users, confirmed that the cause of the outages was indeed a DDOS attack. However, beyond this, the company refused to publicly say more.

    Perhaps the most interesting thing here is that an internet giant, which is trusted with so many people’s information, can still succumb to cyber attacks.

    3. VPN: Is it really private?

    A study by VPNPro in June this year revealed that most VPN providers (101 of them) are owned by just 23 firms. Even more interestingly, 6 of these (including the major mobile VPN companies) are owned by Chinese companies. There have long been suspicions about such companies allowing the Chinese government access to their data.

    So it seems, ironically, that a service with the word “Private” in it, might not keep your data that private after all.

    4. Iran identified as source of DNS hijacking

    Way back in January, Iranian IP addresses were identified as the source of DNS hijacking. Reportedly, the attack affected Internet Service Providers, government, as well as other companies across the world. The attack allowed for sensitive data to be collected, which apparently is of no financial value, but may have value to the Iranian government.

    Iran flag

    5. Ransomware still effective

    The example of Riviera Beach, in Florida, is proof that ransomware (and it’s creators) are alive and well. Earlier this year, city officials from Riviera Beach extraordinarily voted in favor of paying the ransom to have get back usage of their computer systems. And the fee? A whopping $592,000 USD.

    Source: The New York Times.

    Ransomware. Your money or your...IT systems

    About Infosec-Careers.com

    One thing is clear from 2019: The need for information security professionals is only going to increase.

    Want to improve your resumé and skills? Get more qualified by completing more cyber security certifications. Infosec-Careers.com has discount codes for the following information security certifications:

    Read more
  • Quantum computing and the threat to to information security

    Posted on 19/07/2019 by | 0 comments

    Introduction – what is quantum computing?

    This has been defined as technology that:

    “makes direct use of distinctively quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data.”

    (Source: https://www.sciencedaily.com/terms/quantum_computer.htm)

    How does quantum computing work?

    In order to understand quantum computers, it helps to first understand ‘traditional’ computers. The computer or phone you’re using now to read this stores information in ‘bits’. This is a electronic and is a binary option of 0 or 1. Contrast this with quantum computers, which store information with ‘qubits’. These work in accordance with quantum physics, hence the name ‘quantum computing’. Quantum physics can be a bit counter-intuitive, with interesting ideas like ‘particles can simultaneously be everywhere at once’, or in the case of qubits, they can be 0, 1 or both at the same time! The bottom line here is that the potential processing power a quantum computer using qubits could far outstrip a traditional computer using bits.

    Quantum computing and information security

    Why is quantum computing a threat to information security?

    The simplest way to crack an encryption is to try all possible combinations until you get the right one. The current information security encryption technologies essentially rely on the fact that our current computers do not have the processing power to do this. For example, even with a 64 alpha-numeric encryption it took 300 computers over 4 years to crack. Increase this to 128 alpa-numeric symbols and we’re talking millions or even trillions of years. However, with qubits and quantum computing being much faster, they will be able to try all possible combinations at a much faster speed.

    When will quantum computing be able to crack the current encryption technologies?

    Quantum computers already exist, however the current processing power is not sufficient to crack any of the contemporary encryption technologies currently being used. It has been reported that the technology required is now only few years away.

    What can information security professionals do to combat the threat of quantum computing?

    Companies such as DigCertLabs are investing heavily in staying ahead of this threat. They have developed (and are developing) new technologies which provide additional obstacles for quantum computers. So, for now, information security professionals can breathe a small sigh of relief. However, the real question here is this: Will quantum computers develop at a faster rate than encryption technologies? Or will information security professionals always be able to stay one step ahead? Perhaps only time will tell.

    About Infosec-Careers.com

    infosec-careers.com is a provider online courses and discounts for information security professionals. Read about the best cyber security courses in 2021 or view our online cyber security course discounts.

    Read more
  • The Top 5 Cyber Security News Stories this Month (March, 2019)

    Posted on 21/03/2019 by | 0 comments

    This post aims to give you a quick update about the top 5 cyber security news stories which have happened in March, 2019.

    Online security training courses1. The Facebook DNS attack

    Anyone who still uses Facebook will know that the service (for many users, but not all) was temporarily down for several hours earlier this month. This was caused by a vulnerability of Facebook servers, leaving them open to DNS attacks. Although simple, these attacks were extremely effective, with the attacks also affecting Facebook’s other properties, Whatsapp and Instagram. The vulnerability has since been fixed, but it is a reminder of how quickly and easily even multinational tech conglomerates like Facebook can be brought to their knees.

    Read more about this story.

    2. Ransomware hackers target the industrial sector

    After successful ransomware attacks on the healthcare sector last year, ransomware hackers this month turned their attention to the industrial sector. One of the world’s largest aluminium producers, Hydro, admitted that its systems had been hacked. Nowadays, manufacturers like Hydro rely more and more on computerized systems, which can help productivity and efficiency, however it leaves them more vulnerable to such attacks. This attack is of particular significance because of the size of Hydro, which employs thousands of people worldwide in over 40 countries.

    3. SMS: The new platform for scammers?

    We are all familiar with emails from someone claiming to be a long lost aunt, the Prince of Arabia, or a Spanish lottery fund, all of whom claim to have great news for us in terms of offering us money. As information security professionals, we can spot such scams a mile away. And, fortunately, the average consumer is also (finally!) getting wise to such scams. HOWEVER, the scammers have responded by taking things up a level. They are now using SMS as a new way of reaching and interacting with their potential victims.

    Read more about this story.

    best cyber security courses4. Security spending now over $100 billion

    According to the IDC, information security spending reached $103 billion in 2018. For anyone in the cyber security sector, this is good news. It means our industry is growing, hence more employment opportunities. It shows a real (and growing) need for information security. This is, of course, an expected trend. With more and more processes being computerized and moved online, it’s logical that these processes (and the companies and organizations which run them) need to be protected.

    Read more about this story.

    5. Phishing attacks increased by 100% in 2018

    Not only is security spending increasing, but the number of attacks is also increasing! 2018 saw the number of phishing attacks DOUBLE. These attacks were comprised of traditional methods, as well as more innovative methods. The usual tactic of phishing on the back of mainstream events, such as the GDPR requirements, or other news stories, were commonplace. It stands to reason that phishing is working, else they would not continue. The next question then is how to defend against such attacks, or how to better educated staff and the general public to differentiate between authentic communication and phishing.

    Read more about this story.

    About ISCN

    ISCN is a provider of discounts for cyber security courses. You can browse discounts by company/organization, new courses, popular courses and more. You may also be interested in reading the results of our survey about the best cyber security certifications in 2021.

    Read more
  • 6 Cyber Security Predictions for 2019

    Posted on 28/12/2018 by | 0 comments

    It has been an eventful past 12 months in the world of cyber security. 2018 saw the boom and bust of crypto currency mining and markets, huge data loss issues (even the loss of government held user data), as well as ongoing malware attacks.

    What is less clear is what the future holds. However, here at Infosec-Careers.com we’re going to stick our necks out and make the following 6 predictions:

    1. The growing importance of AI

    AI is increasing in all areas of our lives and with it will come new opportunities for hackers. Tasks previously done by humans will become automated, opening the door to cyber security threats. What is interesting is that not only are AI systems being targeted, but AI systems are also being used by hackers as tools in the process.

    And guess what – AI will also be used to defend against such threats. In other words, we’ll have the bizarre situation where AI systems are being defended by other AI systems against (yes, you guessed it) AI systems.

    2. The expanse of 5G networks

    2018 already saw the growth of 5G, but 2019 will see this move to the next level. In case you’re wondering what this has to do with cyber security, well, the answer is a lot. The increased speed and volume of data which 5G networks can handle will result in a corresponding increase in companies and programs which utilize it. With more processes being conducted online, the hacking opportunities (and subsequent need for cyber security) will increase.

    3. Continued increase of data protection measures

    Anyone who has worked with clients in the EU will know how significantly government regulation can affect data protection. GDPR was unrolled in 2018 which ramped up the responsibility of companies to protect customer data, plus to inform those customers about what they intend to do with the data and how they will keep it safe. With the huge data hack scandals of 2018 (e.g. when Facebook lost the data of 2.2 BILLION users), it’s likely that this demand for security is being fueled not just by governments, but by a general public who is angry at such corporations. As such, this is a trend which is likely to continue well into 2019 and beyond.

    4. Increase in government sponsored activity

    In addition to governments attempting to protect their own citizens, we are likely to see an increase in governments also using cyber attacks as a means of offense. In a world where everything is digitalized, it can be far quicker, cheaper, and easier to weaken your enemies will well-targeted hacks instead of expensive and unpopular traditional means of warfare. What is more, such attacks can often be carried out with almost complete anonymity (if done well!) These may come in the form of straight out attacks with the intent of disabling or weakening systems, espionage, or may even election meddling, as reportedly seen with Russia’s involvement in the US and UK elections.

    5. Increasing role of multi-factor authentication

    With online fraud increasing, it seems logical to assume that companies will take measures to tackle this. And one of those methods is to require multi-factor authentication. Most of us have seen it already with online banking, however this may be extended further to many other companies (and organizations) not currently making use of it.

    6. Increasing importance of certifications

    With a booming cyber security industry, the number of employees in the field has correspondingly increased. With more competition for positions, how can employers filter out the ‘good’ employees from the ‘bad’? One way is by comparing education and qualifications on applicants’ resumes. As such, the importance of cyber security certifications is predicted to increase. For those interested in  developing their careers by obtaining such qualifications, it may be worth reading our previous blog post about “The Top 10 Cyber Security Certifications in 2019.”

    Read more