CERT-CSIH Domain #3: Triage & Analysis

Triage and Analysis is the third domain of the CERT-CSIH certification exam and constitutes 28% of the overall objectives of the exam. Triage and analysis go hand-in-hand to help a CSIRT team in... Go on to the site to read the full article ... Read More

CERT-CSIH: Renewal Process

Introduction In the evolving world of technology, innumerable unforeseen cyber-crimes occur every day. Under such circumstances, a Certified Security Incident Handler, or CSIH, plays a pivotal role... Go on to the site to read the full article ... Read More

Threat Hunting: Detecting Threats

| | Detecting Threats
Introduction There has been a recent colossal surge in targeted attacks, including complex penetration techniques, compromise of users’ credentials, fileless malware, use of legitimate rights,... Go on to the site to read the full article ... Read More

10 Tips for Effective Threat Hunting

Cyber-attacks are increasing in number every day, as well as in their frequency and sophistication; worse, they often circumvent organizations’ existing protective controls. Therefore, organizations... Go on to the site to read the full article ... Read More

How to Conduct a Threat Hunt – 10 Steps

Introduction An overwhelming increase in sophisticated and targeted attacks from threat actors, or even nation-states such as Iran, China and Russia, have made threat-hunting services necessary for... Go on to the site to read the full article ... Read More

Threat Hunting Maturity Model

Introduction Before moving forward in describing the threat hunting maturity model, we need to understand what threat hunting is. Threat hunting is the act of proactively and iteratively searching a... Go on to the site to read the full article ... Read More

The CAP Exam: Application Process, Rules and Eligibility, Exam Length and More

| | IT Certifications
The Certified Authorization Professional (CAP) certification exam is one of the most-demanded and industry-leading IT certifications. To qualify for this exam, the candidates must fulfill the... Go on to the site to read the full article ... Read More

CAP (Certified Authorization Professional) Certification Overview

| | IT Certifications
Introduction Are you looking to build your career and demonstrate your expertise in information security and the Risk Management Framework (RMF)? Do you want to differentiate yourself with employers... Go on to the site to read the full article ... Read More

CCSP Study Resources

| | CCSP Resources
Passing any certification exam requires smart study: wasting time on irrelevant resources or information will bring your progress to a standstill. To thwart this issue, (ISC)2 offers a great deal of... Go on to the site to read the full article ... Read More

Earning CCSP CPE Credits

| | CCSP CPE Credits
Whether a member or associate, earning CCSP Continuing Professional Education (CPE) credits is indispensable for every candidate who wishes to keep their CCSP certification active and alive. The CCSP... Go on to the site to read the full article ... Read More
Loading...