top of page
706.631.0778

David Bigger
1 min read
DoD Cyber Work Force Certifications
Snippet from EC Council's website showing the certifications they offer and how they correspond with DoD Cyber Work Force (DCWF) We offer...
41 views
0 comments


David Bigger
2 min read
Malicious Actors Exploit Versioning to Target Android Users
We discuss this very thing in our Ethical Hacking and Forensic courses! In the ever-evolving landscape of cybersecurity, threat actors...
11 views
0 comments

David Bigger
2 min read
Logging - SIEM vs SYSLOG
SIEM and SYSLOG are both tools that are used to monitor and secure networks and systems. However, they serve different purposes and have...
166 views
0 comments

David Bigger
2 min read
Weekly Cyber/IT Terminology 4-10-2023
LAN (Local Area Network) A type of computer network that is designed to connect devices within a small geographical area, such as a home,...
19 views
0 comments


David Bigger
3 min read
Expectation of Privacy
Expectation of privacy is a legal concept that refers to an individual's reasonable expectation that their personal information,...
28 views
0 comments
bottom of page