top of page
706.631.0778
David Bigger
1 min read
DoD Cyber Work Force Certifications
Snippet from EC Council's website showing the certifications they offer and how they correspond with DoD Cyber Work Force (DCWF) We offer...
36 views0 comments
David Bigger
2 min read
Malicious Actors Exploit Versioning to Target Android Users
We discuss this very thing in our Ethical Hacking and Forensic courses! In the ever-evolving landscape of cybersecurity, threat actors...
8 views0 comments
David Bigger
2 min read
Logging - SIEM vs SYSLOG
SIEM and SYSLOG are both tools that are used to monitor and secure networks and systems. However, they serve different purposes and have...
135 views0 comments
David Bigger
2 min read
Weekly Cyber/IT Terminology 4-10-2023
LAN (Local Area Network) A type of computer network that is designed to connect devices within a small geographical area, such as a home,...
18 views0 comments
David Bigger
3 min read
Expectation of Privacy
Expectation of privacy is a legal concept that refers to an individual's reasonable expectation that their personal information,...
23 views0 comments
bottom of page