theDocumentId => 1138751 TrainACE Releases White Paper That Examines Notable ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/29/2012
11:38 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

TrainACE Releases White Paper That Examines Notable Differences In CASP vs. CISSP Certifications

First publicized white paper explores two security certifications

GREENBELT, Md., Nov. 28, 2012 /PRNewswire/ -- TrainACE, a leading and internationally recognized provider of IT training, has ramped up their resources yet again. About a year ago TrainACE brought free cyber security training webinars to the public and now white papers have joined the free resources provided by this leading training organization. These white papers are written by TrainACE's own staff and subject matter experts who have years of training and experience in the fields which they write about. Topics are chosen by researching the most relevant and up-to-date areas being talked about by IT professionals. These important topics are then conceptualized and brought to industry professionals in easy to read, relevant, research style white papers.

The first publicized white paper explores two security certifications, CASP and CISSP. CompTIA's CASP is newly created and filled with the practical knowledge needed by cyber security professionals. Since it is so new, people are still pondering over whom the exam is best fit for and how it can be strategically placed into the IT certification puzzle. This particular white paper, "Examining the Notable Differences in CASP vs. CISSP", answers the questions many people have regarding the two certifications and explains how the exams actually work quite efficiently when paired hand-in-hand.

Be on the lookout for more topics to be added to the TrainACE White Paper page in the near future.

TrainACE is a renowned IT certification training leader. TrainACE has received international awards from many respected professional organizations that have recognized their commitment to training excellence. TrainACE is known as one of the few training vendors in the world that produces custom, five day, hands-on information assurance and advanced security classes. Many of these classes of which can be further customized and fitted to better accommodate the specific training needs of any organization or objective. TrainACE has proudly been training IT professionals since 2001. For more information about their white papers, free training webinars and training classes, visit their website http://www.trainace.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32686
PUBLISHED: 2021-07-23
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and ...
CVE-2021-32783
PUBLISHED: 2021-07-23
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy rem...
CVE-2021-3169
PUBLISHED: 2021-07-23
An issue in Jumpserver 2.6.2 and below allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets.
CVE-2020-20741
PUBLISHED: 2021-07-23
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if t...
CVE-2021-25808
PUBLISHED: 2021-07-23
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.