Profile cover photo
Profile photo
Max Dalziel
742 followers -
I share FREE information security content. Live on the web. All the time.
I share FREE information security content. Live on the web. All the time.

742 followers
About
Max's posts

Post has attachment
CISSP or CEH Certification?

I get asked this all of the time, so I thought this summary (and limited time offer), might be helpfull.

CISSP is an advanced level certification for IT pros serious about careers in information security. Offered by (ISC)2, this vendor-neutral credential is recognized worldwide for its standards of excellence. The title signals an individual’s deep knowledge, extensive work experience and high standards. 

CISSPs today hold job titles including: security manager, IT director, security auditor, network architect, security analyst, security systems engineer and chief information security officer. 

Average annual salary is $109,650.

Certified Ethical Hacker (CEH) is an intermediate level certification offered by the EC-Council. It's a must-have for IT professionals pursuing careers in ethical hacking. 

Recognized by the DoD Directive 8570 (as is the CISSP certification), this qualification tests the individual’s knowledge in the mindset, tools and techniques of a hacker, fortifying it’s certification tag line: “To beat a hacker, you must think like one.” 

CEHs today hold job titles including: information security analyst, security engineer, security consultant, penetration tester, information security manager, network security analyst. 

Average annual salary is $96,290.

** What’s next?

Even if you’re still having trouble deciding, the first step in pursuing either of these InfoSec certifications, is to get the right training from a credible institution. You need to be sure that the training follows the exam objectives and goals in order to be fully prepared. The IT and InfoSec Certification Training Membership from Career Academy, features training for both the CISSP and CEH certification exams as well as 9 more InfoSec courses, all for only $99 a month. 

View here: http://goo.gl/x6UBPp


With this membership you can take the time to try out each of the training modules and decide which certification is right for you career path. 

View here: http://goo.gl/x6UBPp

Post has attachment
This is a special heads up to all of our female community members.

Our friends at SANS have included a "Women in Technology" networking event during the Security West cybersecurity training event in San Diego, CA (May 3 - May 12).

Go Here Now For Details: http://www.sans.org/u/2rY

Top security professionals from more than 20 organizations will be in attendance.

Speakers include Sarah Edwards, a top digital forensic analyst and SANS Instructor; Patricia Watson, an ICS Security Program Manager at Sempra; Heather Mahalik, a top digital forensic investigator and SANS Instructor; and many more.

SANS' Women in Technology event provides a rare opportunity for professionals on the West Coast to hear from top female IT professionals as they share their experiences and secrets to success. Attendees will learn how these women have successfully overcome challenges as well as listen to stories of innovation and inspiration. After the discussions there will be an opportunity to network with speakers and other attendees.

This event will be held in conjunction with SANS Security West taking place in San Diego May 3-12. SANS Security West 2015 offers more than 20 hands-on, immersion-style security training courses taught by real-world practitioners and interactive bonus sessions, led by some of the top names in cybersecurity.

For more information on the SANS Security West training event, or to register, please visit: http://www.sans.org/u/2rY

Post has attachment

Post has attachment

Post has attachment

Post has attachment

Post has attachment
CompTIA CEU's (Pre-Approved For Security+)

Here's a list of the Security+ continuing education classes that CompTIA has pre-approved for Security+ holders:

Applied Penetration Testing Level 1
32 CEU's > http://bit.ly/APT_Level1

How to Hack and Defend Your Website in 3 Hours
3 CEU's > http://bit.ly/Hack-Defend-3Hrs

Certified Metasploit Framework Professional
12 CEU's > http://bit.ly/Metasploit

How To Pentest with Metasploit: For Beginners
8 CEU's > http://bit.ly/Metasploit_Beginners

Fundamentals of Application Security
2 CEU's > http://bit.ly/Fundamentals_AppSecurity

Fundamentals of Secure Architecture
2 CEU's > http://bit.ly/Secure_Architecture

Fundamentals of Security Testing
2 CEU's > http://bit.ly/Security_Testing

Fundamentals of Secure Development
2 CEU's > http://bit.ly/Secure_Development

How to Test for the OWASP Top 10
1 CEU > http://bit.ly/OWASP_Top10

How to Create an Application Security Threat Model
1 CEU > http://bit.ly/Threat_Model

Fundamentals of the PCI DSS
1 CEU > http://bit.ly/PCI_Course

Introduction to Cryptography
1 CEU > http://bit.ly/Cryptography_Intro

Post has attachment
InfoSec Course Directory: http://bit.ly/InfoSec_Courses

In this 15 minute Hangout, Chris Truncer & Will Schroeder will 
discuss:

1. The Veil-Framework - an open source project that aims to bridge 
the gap between pen-testing and red team tool sets.

2. Veil-Evasion, a tool that generates AV-evading payload executables.

3. Cover other useful and effective tools within the framework including Veil-Catapult, Veil-PowerView and Veil-Pillage.

Follow us on Twitter: http://bit.ly/1fki6EQ
Register for LIVE Hangouts: http://bit.ly/1lJ2z1j 
Blog: http://bit.ly/1mSfHlp 

Post has attachment

Post has attachment
After attending this Google Hangout, you will learn:
1. Critical vulnerabilities found in the Stem Innovation “IZON” IP camera
2. Lessons for Internet of Things Security best practices
3. How security researchers are trying to improve IoT security through the initiative, BuildItSecure.ly
Wait while more posts are being loaded