Nov 4 2012

Penetration Testing versus Vulnerability Assessment


Author: Shafeeque Olassery Kunnikkal | Category: Featured, Penetration Testing, Vulnerability Assessment | Leave a Comment

What are the differences between penetration testing and vulnerability assessment? Good question, quite difficult to conclude. Okay, there is often some confusion between penetration testing and vulnerability assessment in the IT industry. Many people in the security field incorrectly use these terms interchangeably. However there are striking distinctions between these two. So it is worth…..

Continue Reading
Nov 3 2012

What is Penetration Testing / Ethical Hacking?


Author: Shafeeque Olassery Kunnikkal | Category: Featured, Information Security, Penetration Testing | Leave a Comment

Crackers or hackers penetrate into the information system and take away critical data, like passwords, credit card details and financial records by employing powerful tools. Every day we read about these kinds of security breaches from every nook and corner of the world. Companies and organizations are facing tough time and their credibility is at…..

Continue Reading
Oct 16 2012

Certifications in Computer Forensics


Author: Shafeeque Olassery Kunnikkal | Category: Cyber Forensics | Leave a Comment

Various certifications in Computer Forensics are as follows. SANS offers a number of valuable certifications in computer forensics, like GIAC-certified forensic examiner (GCFE), GIAC Certification Forensic Analyst (GCFA). For details log on to http://computer-forensics.sans.org CCE – Certified Computer Examiner: This is offered by International Society of Forensic Computer Examiners (ISFCE, LLC). For more details log…..

Continue Reading

Categories

Tags

Archives