top of page
706.631.0778


DoD Cyber Work Force Certifications
Snippet from EC Council's website showing the certifications they offer and how they correspond with DoD Cyber Work Force (DCWF) We offer...

David Bigger
1 min read
Â
Â
Â


Malicious Actors Exploit Versioning to Target Android Users
We discuss this very thing in our Ethical Hacking and Forensic courses! In the ever-evolving landscape of cybersecurity, threat actors...

David Bigger
2 min read
Â
Â
Â


Logging - SIEM vs SYSLOG
SIEM and SYSLOG are both tools that are used to monitor and secure networks and systems. However, they serve different purposes and have...

David Bigger
2 min read
Â
Â
Â


Weekly Cyber/IT Terminology 4-10-2023
LAN (Local Area Network) A type of computer network that is designed to connect devices within a small geographical area, such as a home,...

David Bigger
2 min read
Â
Â
Â


Expectation of Privacy
Expectation of privacy is a legal concept that refers to an individual's reasonable expectation that their personal information,...

David Bigger
3 min read
Â
Â
Â
bottom of page