Information

Security

SCROLL

Security Audits & Assessments

Let us help you pass your next certification.

Science Technology Engineering & Math (STEM)

Check out our STEM program.

Security Training

We offer onsite and online training courses.

Custom Computers

Check out our custom computers that can meet your needs from business applications, simulations, virtual systems and gaming.

Product Review

Let us review your product

Document Review

We review documentation such as books, thesis, dissertations, articles and research.

Media Content

We help news and other media organizations with content related to tech, security, privacy, Internet safety and STEM

Learn more about the Executive Editor of our site.

Latest Post

Reflecting on National Cybersecurity Awareness Month 2023: A Call for Continued Vigilance

/
October is recognized as Cyber Security Awareness Month and as…

Comprehensive Guide to CISSP: A Review of “CISSP All-in-One Exam Guide, Ninth Edition” by Shon Harris and Fernando Maymi

/
"CISSP All-in-One Exam Guide, Ninth Edition" by Shon Harris and Fernando Maymi has long been considered a go-to reference for CISSP aspirants. In this comprehensive review, we will explore the book's content chapter by chapter.

The Benefits of Sock Puppets in Open-Source Intelligence (OSINT)

/
A Sock Puppet is fake persona, or an alternative online identity used to collect and investigate open-source information on a target.

The Open-Source Intelligence (OSINT) Cycle

/
Open-source intelligence, or OSINT, refers to the process of collecting information from public and legal data sources to serve a specific function. Some open sources components might include social media, videos, blogs, news, and the web (surface, Deep and Dark Web). 

Non-sensitive PII + Sensitive PII = Sensitive PII

/
Non-Sensitive PII together combined with Sensitive PII = Sensitive PII

The Civilian Cybersecurity Reserve: A National Guard-like program to address growing cybersecurity vulnerabilities faced by the U.S. government

/
This would be like a Civilian Cybersecurity Reserve and it would be voluntary and by invitation only.  This would allow our national security agencies to have access to the qualified, capable, and service-oriented American talent necessary to respond when an attack occurs.

5 Teen Internet Safety Tips

/
How could our teens live without their smartphones, laptops, and other devices that allow them to go online, communicate and have fun with their friends in a safe manner?  We have provided five (5) tips they should remember.

Update Greenbone Vulnerability Management Plugins on Kali (NVT, Cert Data & SCAP Data) Automatically

/
Once you have installed or configured the Greenbone Vulnerability Management system it is a good idea to ensure it is kept up to date and running the latest security scripts to find the latest vulnerabilities as well as sync to the most updated nvt, scap and cert data.  The best way to do this is to create a script that sync’s the necessary data for you automatically each day.

Kali 2020.1 Default Username & Password – kali kali

/
In Kali Linux 2020.1, both the default user and password will be “kali”

Testimonials

The programming class was great and I learned a lot.

The security assessment was spot on.