Finally, we have updated this domain and all of the domain now have the same look and feel. Click on article title to learn more.
A brand new version of the domain is now available.
The Official (ISC)² CCSP® Sybex Study Guide. ISC2 has released the third version of their study book for the CCSP®. This one is from scratch, it is two new authors and new technical editors as well. Click the article title to see the details.
Taking the exam in late April. I can host a study group at my office in Midtown Manhattan if anyone is interested (msg me)
I am in dire need of some assistance to complete a few projects that are ongoing. Please read this article to see the details.
One of the site member is starting a new CISSP study group in New York city. Read the article to get all of the details.
Good Day to all! New Delhi is the Capital of India and we have just received the approval from ISC2 for an ISC2 chapter in New Delhi. See below the details and contact numbers.
Beginning this month, (ISC)² has a new annual continuing professional education (CPE) policy, which requires members to earn an equal number of CPEs each year within a three-year certification renewal period. This policy was updated to help our members remain current on their CPEs on an annual basis, therefore, making the comprehensive three-year certification renewal process easier for them to manage.
The first step in any penetration testing or ethical hacking exercise is to find out what hosts are alive on the network and what services they are running. One of the best tools for carrying out such enumeration is NMAP. Here I show you some of the basic uses of NMAP in a clear, easy to follow format.
I have just uploaded the MP3 file with the voice portion of our Cryptography CBT
The National Institute of Standards and Technology (NIST) has requested public comments on its newly proposed "Secure Hash Algorithm-3" (SHA-3) Standard, which is designed to protect the integrity of electronic messages.
I have just uploaded a new version of MP3 file for the Access Controls domain. Slver and Gold members can download it.
GUIDELINES FOR THE SELECTION, CONFIGURATION, AND USE OF TRANSPORT LAYER SECURITY (TLS) IMPLEMENTATIONS