This blog post is a transcript of Alpine Security’s Black Box Penetration Testing Explained video, which covers an explanation of Black Box Penetration Testing.
This blog post is a transcript of Alpine Security’s Risk Management Framework (RMF) Overview video, which covers an overview of RMF, as defined by NIST 800-37r2. Each step in the process is discussed at a high level:
If you are clear on a career in cybersecurity, spending 4 years on a bachelor's degree is more than likely a waste of your time and money. You can learn everything for free on the Internet. And, are "core" courses really going to help you? Political science, art appreciation, history?
A paper tiger is a fake tiger, made of paper. It may appear to be a real tiger, but it has no substance, is unable to stand up to challenge, and can't perform any other tiger duties. Let's do the cybersecurity industry a favor and work to get rid of the paper tigers.
Common sense is not always common practice, especially with cybersecurity. Most of the breaches we see today are not because some super cool artificial intelligence firewall failed.
Life of a CISSP "In Progress". What’s it like to be in the pursuit of a CISSP while balancing daily life commitments.
Follow these 9 tips and your chances of passing the CISSP Exam will greatly increase.
You're here most likely because you need or want to pass the CISSP certification exam. How do you decide which CISSP training will best enable you to pass the CISSP certification exam? This guide covers 9 points to consider before selecting a CISSP training provider.
Many CISSP training providers advertise high pass rates, such as we have a “99.9% CISSP Certification Exam” pass rate. This may entice you to consider that CISSP training provider, but their pass rate is really just an estimate.
Let's cut to the chase:
There is no way to guarantee you will pass the CISSP Certification Exam!
That's the bottom-line.
This post focuses on a tactic that advertises your credentials to all LinkedIn users. Rather than actively work to find a job and seek out opportunities, this method brings opportunities to you!
We get asked all the time - should I get a CISM, CISSP, or both?
The short answer is you should get the CISSP certification.
The long answer is that it really depends on your goals and what you are trying to accomplish.
CISSP "boot camp" is just a fancy term for CISSP "training". Many CISSP training providers use the terms interchangeably. A CISSP "boot camp" has a few distinctions though. Before we dive into these distinctions, let's take a step back. The term "boot camp" means a "short, intensive, and rigorous course of training". This definition holds true with CISSP boot camps. This post discusses the 5 things you should know about CISSP Boot camps.
There are many ways to land a job that requires the CISSP certification. In this post, I share three methods to empower you to find your ideal job, leveraging your CISSP certification.
Choosing a training provider for CISSP certification training is a tough decision. Our aim is to inform you on some of the common misconceptions about CISSP training, so you are empowered to make better choices.
This blog is a walkthrough of digitalworld.local: BRAVERY. The VM was created by Donavan and you can download it from VulnHub. According to the author, it was originally designed for OSCP (Offensive Security Certified Professional) practice.
Alpine Security CTO, “Doc” Sewell, describes his obsession with computers, programming, and cybersecurity from elementary school until now.
Many organizations hear the term “malware” and immediately screech in fear. If you are interested in malware research, as long as you are using safe practices, there is not a lot to be afraid of. For those of you who are interested in malware research and figuring out how and why these pieces of malicious software do what they do, this article might be for you.
When consumer WiFi was first introduced, it was all about keeping our neighbors from stealing our internet connection over our WiFi networks. Now, with the explosion of mobile devices, Internet of Things devices, and other “smart” devices connecting to our home WiFi there is a big chance of intruders being able to steal very sensitive information from us.
The rising instances of ransomware attacks is harrowing to say the least. Attackers seek to achieve quick financial gains through the use of this tactic and to be frank, it is working. This blog provides some solutions to help you avoid becoming the next ransomware victim.