UP TO 50% OFF on Combo Courses!
D H M S
blog-banner

Would you Delete your Social Media Account??

The startling revelations about Cambridge Analytica, a data analytics firm that worked with Donald Trump’s election team and the winning Brexit campaign, obtaining Facebook data on 50 million users has got everyone thinking about their social media accounts and a possible misuse of it. According to a sna...

read more

Domain 2 : Asset Security – Weightage 10% 2018

The Asset Security (Protecting Security of Assets) domain focuses on controls such as data classification, clearances, labels, retention, and ownership of data. It discusses about different storage devices and controls determination, including standards, scoping, and tailoring. Data protection skills are at...

read more

Domain 1 : Security and Risk Management – Weightage 15% 2018

The Security and Risk Management domain focuses on risk analysis and mitigation. This domain also details security governance, or the organizational structure required for a successful information security program. It also covers IT policies, procedures, roles and responsibilities, types of controls, risk m...

read more

All About BitCoin

Bitcoin was a nonexistent term in the past but now it is catching up really fast and grabbing everyone’s interest. Bitcoin is a cryptocurrency, well what is that? It is virtual money based on the technique of cryptography, not owned by any individual, corporation or government. It simplifies payments, m...

read more

CISSP Concentrations

Although Certified Information Systems Security Professional certification is a instant enhancement to a person’s resume, there are other CISSP concentrations as well which equip professionals in a better and more encompassing way. They not only provide better salaried jobs but also with lot more responsibi...

read more

Protecting your data from hack

Data protection the more passionate companies are towards protecting their data, the more determined hackers are in invading your space, your priority files and your chances of success. There are various anti-hacking techniques at work, but these don’t deter the hackers but that is because it is importa...

read more

C.A.T.! Lets be challenging

C.A.T.! This isn’t your usual meaning of the word ‘CAT’; it’s neither the animal nor the common admission test taken in India by MBA aspirants. It stands for Computer Adaptive Test. Haven’t heard about it before? You must not be acquainted with the name but I am sure you have seen how it works...

read more

Facebook: Another case study for data Privacy

Amidst the trending news, Facebook Data Breach has been a highlight given the large customer database and is a message to all other organizations and users to protect their information. The first step for users should be leaving sites that have any connection to any security breaches, any gaming or quiz si...

read more

KALI LINUX

Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS. More than 300 penetration testing tools: After reviewing every tool that was included in Ba...

read more
TOP
whatsapp