CISSP: DoD Information Assurance (IA) Levels

Introduction Information assurance (IA) is a crucial consideration for today’s businesses as well as with government agencies and branches of the US military. In order to ensure the safety and... Go on to the site to read the full article ... Read More
A Guide to XML File Structure & External Entity (XXE) Attacks

A Guide to XML File Structure & External Entity (XXE) Attacks

Modern forms of markup languages such as HTML, XML and XHTML are mostly used in designing web pages. XML, which stands for Extensible Markup Language, defines a set of rules for encoding documents in... Go on to the site to read the full article ... Read More
Computer Forensics: Embedded Device Analysis and Examination Steps

Computer Forensics: Embedded Device Analysis and Examination Steps

Introduction Nowadays, digital devices are everywhere and everything is connected via the Internet. These devices include digital watches, gaming consoles, multimedia appliances, etc. The growing use... Go on to the site to read the full article ... Read More
Wireshark, an Open-Source Forensic Tool

Wireshark, an Open-Source Forensic Tool

Overview “Today we are at a defining moment in the evolution and growth of the Internet. Large-scale data breaches, uncertainties about the use of our data, cybercrime, surveillance and other... Go on to the site to read the full article ... Read More
Computer Forensic Report Writing and Presentation

Computer Forensic Report Writing and Presentation

Introduction The demand for inter-networking keeps increasing amongst users and organizations where access to and sharing of data is a daily requirement. As if in resonance, the intention to... Go on to the site to read the full article ... Read More
InfoSec Institute Partners with ISSA International

InfoSec Institute Partners with ISSA International

Exclusive IT Security Training Discounts Available to All Members MADISON, WI — March 19, 2018 — InfoSec Institute, the leading provider of professional IT security education and cybersecurity... Go on to the site to read the full article ... Read More
The Ultimate Guide to CCSP Certification

The Ultimate Guide to CCSP Certification

If you work in the IT field, you’re obviously familiar with the cloud. What was once a bit of a novelty has now become commonplace, meaning every company and government is making use of it. This also... Go on to the site to read the full article ... Read More
$500 Off Online Training Special, March Only!

$500 Off Online Training Special, March Only!

 The post $500 Off Online Training Special, March Only! appeared first on InfoSec Resources. $500 Off Online Training Special, March Only! was first posted on February 28, 2018 at 10:53... Go on to the site to read the full article ... Read More
Threat Hunting – Malware/Angler EK Analysis with Security Onion – GOOFUS AND GALLANT

Threat Hunting – Malware/Angler EK Analysis with Security Onion – GOOFUS AND GALLANT

This is a lab analysis based on the resources available on malware.trafficanalysis.net and publicly available information on threat hunting/malware analysis. Scenario: Tom and Jake are recent hires... Go on to the site to read the full article ... Read More
Loading...