top of page
706.631.0778

DoD Cyber Work Force Certifications
Snippet from EC Council's website showing the certifications they offer and how they correspond with DoD Cyber Work Force (DCWF) We offer...
David Bigger
1 min read
41 views
0 comments


Malicious Actors Exploit Versioning to Target Android Users
We discuss this very thing in our Ethical Hacking and Forensic courses! In the ever-evolving landscape of cybersecurity, threat actors...
David Bigger
2 min read
11 views
0 comments

Logging - SIEM vs SYSLOG
SIEM and SYSLOG are both tools that are used to monitor and secure networks and systems. However, they serve different purposes and have...
David Bigger
2 min read
183 views
0 comments

Weekly Cyber/IT Terminology 4-10-2023
LAN (Local Area Network) A type of computer network that is designed to connect devices within a small geographical area, such as a home,...
David Bigger
2 min read
19 views
0 comments


Expectation of Privacy
Expectation of privacy is a legal concept that refers to an individual's reasonable expectation that their personal information,...
David Bigger
3 min read
28 views
0 comments
bottom of page