Finally, we have updated this domain and all of the domain now have the same look and feel. Click on article title to learn more.
A brand new version of the domain is now available.
The Official (ISC)² CCSP® Sybex Study Guide. ISC2 has released the third version of their study book for the CCSP®. This one is from scratch, it is two new authors and new technical editors as well. Click the article title to see the details.
I am in dire need of some assistance to complete a few projects that are ongoing. Please read this article to see the details.
One of the site member is starting a new CISSP study group in New York city. Read the article to get all of the details.
Good Day to all! New Delhi is the Capital of India and we have just received the approval from ISC2 for an ISC2 chapter in New Delhi. See below the details and contact numbers.
Beginning this month, (ISC)² has a new annual continuing professional education (CPE) policy, which requires members to earn an equal number of CPEs each year within a three-year certification renewal period. This policy was updated to help our members remain current on their CPEs on an annual basis, therefore, making the comprehensive three-year certification renewal process easier for them to manage.
The first step in any penetration testing or ethical hacking exercise is to find out what hosts are alive on the network and what services they are running. One of the best tools for carrying out such enumeration is NMAP. Here I show you some of the basic uses of NMAP in a clear, easy to follow format.
I have just uploaded the MP3 file with the voice portion of our Cryptography CBT
The National Institute of Standards and Technology (NIST) has requested public comments on its newly proposed "Secure Hash Algorithm-3" (SHA-3) Standard, which is designed to protect the integrity of electronic messages.
I have just uploaded a new version of MP3 file for the Access Controls domain. Slver and Gold members can download it.
GUIDELINES FOR THE SELECTION, CONFIGURATION, AND USE OF TRANSPORT LAYER SECURITY (TLS) IMPLEMENTATIONS
AppVet is a simple web-based application for vetting mobile apps.
This NIST standard has a nice overview of Continuous Monitoring and where it fits in the Risk Management Framework
Managing Information Security Risks
Guide for conducting Risk Assessment
NIST has released the final version of it's Cyber Security Framework
The National SCADA Test Bed Program from Idaho National Laboratory (INL). The nation’s electric power grid. This system and the digital components that operate it are reliable and efficient, but often lack sufficient security measures to protect them from new and emerging cyber threats.
National Cybersecurity and Critical Infrastructure Protection Act of 2013