Blog Banner

New Horizons Announces Blockchain Training

Learn about how decentralized blockchain technology is increasing transparency and security across industries

We at New Horizons Learning Group are excited to be announcing our partnership with the Blockchain Training Alliance to deliver cutting edge Blockchain training and certifications!

10 Mobile Cybersecurity Threats according to Metova

Metova are the minds behind CyberCENTS cybersecurity training programs. Read on for a link to their full article as well as a quick rundown of their top 5 biggest mobile threats facing security professionals today.

Top 10 Critical Components of CEH v10

This course in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process.

The True Value of a Cybersecurity Professional

6 THINGS YOU MIGHT NOT KNOW

Cybersecurity has become a household word, but while we hear about data breaches and phishing scams on a daily basis, what does it all mean to your organization? To kick off cybersecurity month, we present six solid facts that prove the critical and urgent need for trained, experienced cybersecurity professionals.

Is Certified Chief Information Security Officer Right for Me?

C|CISO Role, Requirements & Target Audience

EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.

RSS

Contact author

x

Subscribe for Future Blog Notifications