Looking In: Top Five Takeaways from RSAC 2024
Trending on INE’s blog
Filters
By areas
NetworkingCyberSecurityData ScienceCloudIT EssentialsAdvanced Penetration Testing: Evolving Techniques for 2024
This blog explores the latest advancements in pentesting methodologies, the value of up-to-date ethical hacking certifications, and the growing integration of incident response in modern security practices.
Bridging the Gap: Modern Cybersecurity Education
By partnering with INE, higher education institutions can ensure that their students are prepared not just for today's cybersecurity challenges, but for the evolving landscape of tomorrow.
Challenges in Penetration Testing Active Directory
Discover the intricate challenges of penetration testing Active Directory in our latest blog. Delve into the complexities of AD environments, from sprawling domains to intricate trust relationships, and learn how to navigate these with expert precision.
Looking In: Top Five Takeaways from RSAC 2024
RSAC 2024, one of the largest cybersecurity conferences of 2024, is officially in the books! We’ve unpacked our swag bags and have begun to unpack some of the incredible and innovative ideas we heard this year. As we reflect on RSAC 2024, one standout is how on-point the theme was. “The Art of Possible” was reflected in every corner of the conference, specifically regarding incredible developments in artificial intelligence (AI) as it relates to cybersecurity potentially turning the industry on its head. Here are our top five takeaways from an energizing RSAC 2024.
Unlocking Cybersecurity Success: The Benefits of Pentesting Certification
Cyber threats loom large and data breaches have devastating consequences; cybersecurity has become a critical concern for organizations worldwide. Businesses increasingly rely on technology to conduct their operations, and the need for skilled professionals who can safeguard digital assets and infrastructure has never been greater. This is where penetration testing certification plays a crucial role in fortifying cybersecurity defenses and advancing career opportunities.
Introducing Cisco HyperShield: The New AI for Network Security
Cisco's recent announcement of HyperShield, a new "AI-Native" Security Architecture, marks a significant step forward in addressing the need for innovative solutions to address growing cybersecurity threats. . Before you turn the keys to the network over to Skynet though, let’s talk about why a next-gen Security Architecture like HyperShield is sorely needed, and how Cisco’s never-before seen application of AI hopes to get us there.
Navigating Cloud Security in 2024: Insights and Solutions
As businesses race towards digital transformation, cloud adoption has become not just a trend but a necessity for staying competitive. This shift comes with its own set of challenges, particularly in ensuring robust security measures. The "Future-Proofing Cloud Security: Challenges and Solutions in 2024" report delves deep into these issues, offering insights based on a survey of more than 700 IT/IS leaders. The report explores the state of cloud security today and how organizations can navigate these challenges effectively.
Phobos Ransomware Defense: How To Strengthen Your Cyber Defense
The emergence of Phobos ransomware has prompted heightened warnings from key U.S. agencies. This ransomware-as-a-service (RaaS) model poses a significant risk to government entities and critical infrastructure, making it imperative for organizations to bolster their defensive cybersecurity measures. In this blog, we explore not only the tactics employed by Phobos ransomware but also delve into how proactive security measures, red team training, and incident response can effectively prevent and mitigate such attacks.
INE Starts 2024 with Best Certifications for Cybersecurity Awards & Recognitions
INE has roared into 2024 full of big goals and ambitions, and we are excited to announce milestone achievements with some brand-new industry awards!
Code Blue: Strengthening Healthcare Cybersecurity Defenses
Another high-profile healthcare cyber attack is sending shockwaves through the healthcare industry. This time, a Chicago children’s hospital is at the center of a damaging, costly, and life-threatening cyber attack. In the face of unprecedented challenges and an endless onslaught of healthcare cybersecurity attacks, we sat down with INE Security’s Defensive Security Instructor Brian Olliff to talk about healthcare cybersecurity solutions.
Capture the Flag for Empowered Cybersecurity Training
Organizations are now looking for ways to keep their teams more engaged in the training that helps them stay prepared for emerging cybersecurity events and trends. INE is excited to announce CTF Arena - free Capture the Flag challenges that put security professionals to the test in real world scenarios. Monthly challenges are a fun, competitive way to supplement training and spark some excitement in teams that are prone to burnout.
How Team Training Can Help You Find Your Way Out of the Talent Desert
The growing demand for skilled cybersecurity professionals far surpasses the available talent pool. In 2023, 3.4 million cybersecurity jobs will go unfilled. This cybersecurity talent shortage poses a significant challenge for organizations globally. To address this gap, upskilling and training programs have emerged as powerful tools to equip existing employees with the necessary skills and knowledge.
Creating a Growth Culture in Your Organization through Upskilling Programs
Talent shortages in cybersecurity means qualified candidates have an advantage when interviewing and during the offer process. One way to attract outstanding new hires and retain employees is to foster a culture of growth and continuous learning in your organization. At INE, we believe that the key to implementing an effective upskilling program is to understand and embrace the organizational objectives first.
The Real Cost of a Breach and How Upskilling Can Help
According to an analysis by IT Governance reported by Cyber Magazine, there was a 951% increase in publicly disclosed incidents year-on-year since March 2022. And in 2022, a report by Ponemon Institute and IBM Security revealed that the average cost of a data breach was $4.35 million. With no relief in sight, organizations must invest in training and technologies to give their cybersecurity teams the best chance to reduce attack surfaces and secure the infrastructure.
Enhance Your Pentesting Journey with the Updated eWPT Certification
The INE team released an updated eWPT Learning Path this summer to offer more timely content and a better user experience. To align with the Learning Path, our team also updated the Certification. Through our beta testing of both the learning path and certification, we were able to assess what was working and what needed improvement - and our beta testers loved the experience!
Unmasking Web Exploit Development: A Vital Skill for Web Application Penetration Testers
Web applications are susceptible to a myriad of threats, from data breaches to service disruptions. Web Application Penetration Testers must be armed with a critical skillset that includes exploit development to help detect and prevent. In this blog post, we'll dive into the process of exploit development for web environments, highlight its importance for Web Application Penetration Testers, and explore the security breaches it can help prevent.
Introducing Skill Dive
Professional technology training has to evolve as quickly as technology does. INE’s newest immersive lab offering, Skill Dive, is designed to do just that.
Beyond Boundaries: The Evolving Relationship Between Networking and Cybersecurity
The evolution of technology has created a convergence between Networking and Cybersecurity. While these two disciplines were traditionally seen as separate but equally critical, there’s now a growing crossover among job roles and teams as technology becomes increasingly interconnected. INE recently surveyed nearly 1,800 IT/IS professionals from around the world to better understand how this shift to interdependence is impacting the functionality of their roles and the security of their organizations.
INE Brings Home the Gold
It is feeling like awards season here at INE, and we couldn’t be more excited or proud to be racking up some serious bling over the last few months. In case you have missed the news, we wanted to share some of our favorite recognitions here. These aren’t just average pats on the back; they are heavy-hitting industry accolades that highlight INE’s position as a leader when it comes to technical training.
OWASP Top 10 for Large Language Model (LLM) Security - A Web Application Penetration Tester's Guide - Part 2
In this blog, we will explore the second half of the OWASP Top 10 for LLM and their impact on the role of a penetration tester. When you’re done with this blog, don’t forget to visit ine.com/security to check out all of our cybersecurity for penetration testers and beyond.
Elevating Your Career with Accredible Digital Badging
Continuous learning and professional development are the cornerstones of success in the technology field. We are excited to announce our partnership with Accredible Digital Badging - helping you show that you’ve got what it takes to stand out in a crowd of technical professionals.
INE + INE Security: The Formula for Success
INE acquired eLearnSecurity in 2019 to add cybersecurity certifications to our offerings and now we’re taking it to the next level - combining the know-how and strength of INE training with eLearnSecurity certifications - now available on ine.com/security.
OWASP Top 10 for Large Language Model (LLM) Security - A Web Application Penetration Tester's Guide - Part 1
Language models have become an integral part of various applications, ranging from chatbots to content generation. However, with their increasing adoption comes a set of security challenges that need to be addressed. The OWASP Top 10 for Large Language Models (LLM) focuses on the most critical security risks associated with large language models. As a Web Application Penetration Tester, understanding these risks is crucial for ensuring the security of applications that leverage these models. In this blog, we will explore each of the OWASP Top 10 for LLM and their impact on the role of a penetration tester.
How to Combat Skill Misalignment on Your IT/IS Team with Skill Sonar
As a technology leader, you can take steps to eliminate skill misalignment and reduce your attack surface. Keep reading to find out key indicators of “right person, wrong seat” and how INE’s Skill Sonar (skill assessments) can help.
20 Years with INE: Our Origin to Evolution
INE is excited to be celebrating 20 years in the IT training industry. Starting in Networking training and expanding to Cloud Computing and Cybersecurity training, we continue to offer the best in hands-on, practical training for IT and IS professionals. Learn more about our story in this blog.
Black Hat USA 2023: Trends and Insights for Cybersecurity Training and Beyond
Team INE is returning back to our offices (or home offices!) filled with gratitude, energy, and fresh ideas after a fantastic experience at Black Hat USA 2023. As we head into the second half of 2023 and plan for 2024, we wanted to recap five of the most significant takeaways from this year’s show and offer some perspective on the changing landscape of cybersecurity.
Why INE: See how INE is Aligning with Cisco’s Roadmap
Cisco recently released its Certification Roadmap, and we thought we’d take a moment to show you how INE is aligning our content to sync up with the roadmap and ensure you are fully prepped for your exam.
Retention, Retirement, and Recruitment: The Shape of Modern IT Teams
Skillsoft’s annual IT Skills and Salary survey revealed that the top two issues facing IT teams in 2023 are talent retention (30%) and recruitment (24%). As more of the Baby Boomer generation enter retirement age, IT teams are also facing legacy skill gaps. So why are people leaving, what problems does it cause for organizations, and how can any IT team combat these issues? Read on to find out!
Why INE? Because We Check All of the Boxes
When it comes to online IT/IS training, we know that there’s no shortage of options. It can be daunting to make a decision, but we’ve found that most learners are looking to check similar boxes when it comes to needs, including topics, availability, delivery, and affordability. Learn how INE addresses those learning needs to be the best IT training provider.
Understanding Network Access Controls and Which One to Implement for Your Organization
Explore the world of network access controls, including role-based, attribute-based, and policy-based access controls. Discover the pros and cons of each approach and determine the best fit for enterprise and SMB environments. Find valuable resources to learn how to implement these controls effectively.
Unleashing Cybersecurity Expertise: Harnessing the Benefits of Practical Labs
To combat the relentless onslaught of cyber threats, theoretical knowledge alone is not enough. Hands-on experience in the form of realistic practical labs has become an invaluable asset for aspiring cybersecurity professionals to excel in the field. Practical labs are essential for developing competent and well-rounded cybersecurity experts. At INE, we develop and integrate realistic practical labs into our courses, learning paths and certifications to help our learners retain information and confidently transfer it to the real world.
The Future of IT Training: Key Takeaways from Cisco Live Vegas 2023
We’ve almost caught our breath after having a great time at Cisco Live Vegas 2023! This year’s conference brought together industry professionals, thought leaders from around the globe, and a huge contingent of people just as passionate about tech and training as we are. As we reflect on this year’s conference through the lens of IT training, we found it shed light on the evolving landscape of the industry and offered valuable insights into the future of IT education.
Fueling Lifelong Growth: Why INE’s IT Training Platform is Ideal for Foundational Learners
In today's fast-paced and ever-evolving professional landscape, the ability to continuously learn and adapt is critical to success. For those at the beginning stages of their careers, having access to effective learning and development (L&D) methodologies is crucial.
Best Cybersecurity Online Training: An Overview
Cybersecurity online training helps IT pros gain the skills to protect organizations from data breaches and cyber threats.
Why INE: The Power of Hands-On Training in Networking and Cybersecurity
The Power of Hands-On Training in Networking and Cybersecurity: Building Practical Skills for Success In the rapidly evolving fields of Information Technology (IT) and Information Systems (IS), theoretical knowledge alone is no longer sufficient. The ability to apply that knowledge effectively in real-world scenarios has become paramount. Hands-on, practical training is pivotal in bridging the gap between theory and practice, equipping IT and IS professionals with the skills they need to succeed.
Exploring Top Types of Cybersecurity Training
Learn how to keep your organization secure with the industry's top cybersecurity training programs. Upskill your team with specialized, technical courses offered by INE.
Am I Ready for the CCIE Security Certification Exam?
The Cisco Certified Internetwork Expert (CCIE) Security v6 is a highly sought-after certification that validates the skills required to design, implement, maintain, and troubleshoot complex security solutions. Learn what it takes to pass the exam.
Strengthening Enterprise Defenses: The Role of IT Training in Combating the BianLian Ransomware Threat
The FBI recently released a joint Cybersecurity Advisory highlighting the tactics, techniques, procedures, and indicators of compromise specifically associated with BianLian, a notorious ransomware developer, deployer, and data extortion group. Here, we’ll explore how understanding these concepts can empower enterprise teams to effectively combat not only the BianLian threat but the ongoing ransomware threat as a whole.
Introduction to Cybersecurity Risk Assessment Training
Cybersecurity risk assessment training equips professionals with the knowledge and skills to identify, analyze, and mitigate cybersecurity risks.
INE at RSAC: Our Top 5 Takeaways
The RSA Conference (RSAC) is one of the world’s most significant information security events, bringing together professionals from various industries to discuss current and emerging issues in cybersecurity. This year’s conference highlighted five key takeaways that could help shape the future of IT training. This article explores the top five takeaways from RSAC regarding IT training.
Firewall Policy Best Practices for Security Engineers
Firewalls are often viewed as the first line of defense in an organization’s cybersecurity posture, so designing and implementing an effective firewall policy is a critical skill set. INE recently released the Check Point Certified Security Administrator (CCSA) Learning Path to help Check Point Firewall administrators and system/support engineers upskill and improve their organization’s network security. Whether you work with Check Point’s Next Generation Firewall or one of its competitors, you can use this Firewall Policy Best Practices Guide from Security Instructor Piotr Kaluzny to drive how you design and implement your firewall policy.
Introduction to Network Security Analyst Training
Comprehensive network security analyst training prepares professionals to identify threats, prevent attacks, and respond to incidents.
Prep for Your Next Step: Cisco Certified Networking Professional Enterprise Learning Path
Prep for Your Next Step: Cisco Certified Networking Professional Enterprise Learning Path
Coming This Summer: Enterprise Defense Administrator (eEDA) Certification
eLS is Retiring 5 Certifications: Here's What You Need to Know
eJPT Certification is Here to Kickstart Junior Pentesting Careers
A Junior Penetration Tester is an entry-level role on a cybersecurity team that searches for vulnerabilities and attempts to exploit them as a preventative cybersecurity measure. With INE’s release of the eJPT Certification, you can learn and demonstrate mastery of all the necessary skills for the cybersecurity or red team work role at your own pace.
Cyber Security Capture the Flag (CTF) Labs
INE's Capture the Flag (CTF) learning path offers 1900+ unique, real-world lab scenarios on topics spanning from recon, exploitation, post-exploitation, data exfiltration, web applications, traffic analysis, CVEs, network components, infrastructure attacks, privilege escalation, forensics, firmware analysis, reversing, secure coding, IoT networks, Metasploit, Python for infosec and many others.
Discover the INE Cyber Security Lab Experience
This one of a kind, hands-on lab experience path offers 1900+ unique, real-world lab scenarios on topics spanning from recon, exploitation, post-exploitation, data exfiltration, web applications, traffic analysis, CVEs, network components, infrastructure attacks, privilege escalation, forensics, firmware analysis, reversing, secure coding, IoT networks, Metasploit, Python for infosec and many others.
CCNP Enterprise - ENARSI Practice Labs
In this course, you’ll be given dozens of opportunities to identify what is wrong with a network, fix it, and then view a solution to see if you resolve the problem correctly. There are also several “configuration” labs to ensure you can configure topics required to pass the ENARSI exam, such as advanced IGP redistribution, DMVMP, and IPsec.
Wrapping up 2022 with a bang (and lots of G2 badges)!
Your success is our biggest motivator, and at INE we pride ourselves on listening to our students and implementing changes based on your needs. That's why we are thrilled to unveil a seriously impressive list of Winter 2023 badges that we’ve been awarded from G2.
XSLT Injections for Dummies
Discussing this often-overlooked class of vulnerabilities and possible attack surfaces.
[CVE-2021-44967] LimeSurvey RCE
This exercise is to understand how to exploit the LimeSurvey application.
eJPTv2 Certification is Here!
We’re excited to announce the eJPTv2, powered by Pentester Academy’s industry leading lab platform, is now available to the public! This browser-based, hands-on, exam mirrors real world junior penetration tasks using a methodological approach. Not only does our exam environment feature modern infrastructure, operating systems, and current versions of software, but it also uses innovative dynamic and static flagging technology to make each user’s testing experience unique.
Premium Monthly is Here!
For a limited time, we're offering INE Premium, our most popular plan, as a monthly subscription for only $99/month.
Endless Possibilities with INE's New Business Platform
INE's new business platform provides long-awaited features to our industry leading training experience, including custom content playlists, SAML single-sign on, and actionable advanced analytics so that you can help your team complete their training goals.
[CVE-2021-21809] Moodle SpellChecker Path Authenticated RCE
This exercise is to understand how to exploit the Moodle server using the Metasploit Framework and manually.
5 Things They Don’t Tell You About Training a Team
We’ve compiled a list of five examples of how quality IT training can empower your team to take their goals, and yours, to the next level.
[CVE-2021-43908] VSCode RCE
This exercise is to understand how to exploit the VSCode RCE CVE-2021-43908 vulnerability.
[CVE-2018-7600] Drupalgeddon 2
This exercise is to understand how to exploit the Drupal server using the Metasploit Framework and manually.
Final Lab Practice for CCIE Enterprise Infrastructure
This training is the one of the last steps in your preparation for achieving the prestigious CCIE certification.
AZ-900 Azure Fundamentals Learning Path
This learning path is designed to help professionals understand Azure concepts and basic implementation. You will learn what cloud services are, what Azure is, how resources are managed in Azure, how resources are billed, and how Azure implements information security.
[CVE-2021-21307] Lucee Server Arbitrary File Write
This exercise is to understand how to exploit the Lucee server using the Metasploit Framework.
[CVE-2022–22978]: Authorization Bypass in RegexRequestMatcher
Let’s learn about a quick win trick to bypass authorization in vulnerable versions of Spring Security leveraging misconfigured RegexRequestMatcher expressions!
Cyber Security Accessibility for Small Businesses
Small businesses are most likely to suffer following cyber attacks. Hackers see small businesses as easy targets because smaller businesses often-times do not have the infrastructure, training, or bandwidth that larger companies have at their disposal. INE can help small businesses develop the skills necessary to protect their critical infrastructure.
Lab Walkthrough - Shockin’ Shells: ShellShock (CVE-2014-6271)
Let’s learn about the (in)famous ShellShock vulnerability and how it was leveraged by the malicious actors to mass pwn the affected servers leading to code execution!
Vulnerability Lab: WordPress Plugin wpDiscuz Unauthenticated RCE
This exercise is to understand how to exploit the WordPress Plugin wpDiscuz (v7.0 - v7.0.4) to gain a shell on the target machine (CVE-2020-24186).
CCNP Enterprise ENCOR Practice Labs
Ask anyone and they’ll tell you…Cisco’s CCNP Enterprise Core 350-401 exam (aka “ENCOR”) is a beast when one considers the scope and depth of topics contained within the exam. This course is designed to help you to assess your configuration and verification skills across a broad spectrum of topics tested within the CCNP ENCOR exam.
CCNA 200-301 Practice Labs
Whether preparing to take Cisco CCNA 200-301 exam, or just trying to refresh your skills, hands-on practice within a lab environment is a must. This course provides you with exactly that.
Adminer SSRF Vulnerability (CVE-2021–21311)
Let's learn to leverage a database management tool to retrieve data from an internal service!
ECS: Retrieving Secrets From Task Definitions
In this lab, learn how to retrieve secrets from the task definition and the running container in Amazon ECS.
ImageTragick: A Tragick Image Conversion Tale
Let’s explore the (in)famous ImageTragick vulnerability and how it was used by attackers to gain code execution on the affected servers!
How To Use AWS Secrets Manager
AWS Secrets Manager allows you to replace hardcoded credentials, such as passwords, in your code with an API call to Secrets Manager to get the secret programmatically. Learn more about it in this post.
INE Palo Alto Firewall Labs
INE's Palo Alto Firewall labs were designed to provide PCNSA and PCNSE students with a tool to learn and understand practical aspects of controlling Palo Alto Networks Next-Generation Firewall platforms.
WordPress Plugin SP Project and Document Manager RCE (CVE-2021-24347)
This exercise is to understand how to exploit the WordPress Plugin SP Project and Document Manager v4.21 to gain a shell of the target machine (CVE-2021-24347).
Hunting for Mass Assignment
If there is nothing preventing users from touching sensitive data, eventually an attacker will do so! This article shows you how to develop an intuition for Mass Assignment and exploit it like a pro.
LIBSSH Auth Bypass (CVE-2018-10933)
This exercise is to understand how to exploit the Libssh server using the vulnerable Metasploit framework module and a python script.
Introducing INE's Enterprise Defense Administrator Learning Path
An unmatched, hands-on Enterprise Defense Administrator learning path designed for professionals just starting their defensive cyber security or security engineering journey.
How to Use AirIAM
AirIAM is a tool that can be used to automate the least privilege IAM principle in AWS using Terraform. This article will demonstrate how to use the AirIAM tool.
How to Use Amazon Macie
In this article, we will learn how to use the Amazon Macie service to find the sensitive data leak into the S3 bucket.
The Zip Slip Vulnerability: Zip Files Slipping under Your Nose!
Let’s learn about Zip Slip — an interesting and critical arbitrary file overwrite vulnerability leading to RCE in certain scenarios!
AWS CloudTrail: Athena and CloudWatch Alerts
In this article, we will be using Amazon Athena to process this data (events) and configure AWS CloudWatch alerts for CloudTrail.
How to Use Amazon Inspector
In this article, we will learn how to install a vulnerable component on an EC2 instance, pack it as a docker image, push it to ECR, and detect the vulnerability using the Amazon Inspector service.
Look at You… Looking at Us!
Discover why INE is the 'Fall 2022 Momentum Leader' in Technical Skills Development and Online Course Providers with glowing client reviews. Join us today!
How To Use AWS Config
In this article, we will learn how to use AWS Config to construct various rules that will identify resources that do not adhere to the rules specified in the AWS Config.
Lab Walkthrough - WordPress Plugin Backup Guard RCE
This exercise is to understand how to exploit the WordPress Plugin Backup Guard v1.5.8 to gain a shell of the target machine (CVE-2021-24155).
How to Use AWS CloudTrail: Creating Trails
In this article, we'll look at how to utilize AWS CloudTrail service to create trails for various types of events.
[CVE-2020-35847 - CVE-2020-35846] Cockpit CMS RCE
This exercise is to understand how to exploit the vulnerable Cockpit CMS using the Metasploit Framework.
ExifTool Command Injection (CVE-2021-22204)
This exercise is to understand how to exploit the vulnerable ExifTool utility using the malicious file.
The Return of the WIZard: RCE in Exim (CVE-2019–10149)
Learn about an interesting vulnerability in the Exim mail server resulting in an easy RCE!
Using Amazon GuardDuty: CloudWatch Alerts
In this article we will look at how we can use AWS Simple Notification Service (SNS) with CloudWatch to generate alerts using AWS GuardDuty Findings.
Using Amazon GuardDuty: IAM Findings
In this article we will look at how we can use AWS GuardDuty to detect potential security threats using IAM Finding types.
This is my ICCA Journey. I got certified! (By the skin of my teeth)
When INE announced our own entry-level cloud certification (ICCA), I realized this could be my opportunity. Getting a certification would enable me to offer and expand on my answers to clients exponentially.
Using Amazon GuardDuty: S3 Findings
In this article we will look at how we can use AWS GuardDuty to detect potential security threats using S3 Finding types.
Using AWS IAM Access Analyzer to Find and Resolve Issues
Here, we'll learn how to create an Access Analyzer and utilize it to get rid of permissions that are overly permissive and could be used maliciously by an attacker.
How to Create a Storage Bucket with Terraform
In this article, you will learn how to Create a Storage Bucket with Terraform on Google Cloud Platform.
How to Create a Storage Bucket using GCP Console
In this article, you will learn how to create a Storage Bucket using a GCP Console.
GitLab_File_Read_Remote_Code_Execution
Understand how to exploit the vulnerable Gitlab (CVE-2020-10977) to gain a meterpreter session on the target machine.
[CVE-2019–11043]: Exploiting the PHuiP-FPizdaM Vulnerability
This bug shows how web vulnerability can lead to a memory corruption vulnerability (buffer underflow) resulting in OS command execution!
How to Create a Serverless Cosmos DB
The purpose of the lab is to help you in understanding the creation of Serverless Cosmos DB, using both Azure portal and Azure CLI.
Getting started with Cloud Storage - Microsoft Azure
Microsoft Azure Storage platform offers a flexible, secure, scalable storage system for storing a variety of data objects on the cloud and is easily accessible from anywhere across the world. In this article, we will learn how to get started with Azure Cloud Storage.
Supply Chain Attacks: Case Studies
Let’s take a look at a few case studies on the different Supply Chain Attacks.
Lab Walkthrough - Heap-Based Buffer Overflow in Sudo (Baron Samedit)
In this lab walkthrough, learn how to exploit the Heap-Based Buffer Overflow in Sudo aka Baron Samedit vulnerability (CVE-2021-3156).
Lab Walkthrough - [CVE-2022–0543]: Lua Sandbox Escape in Redis
Let’s explore an interesting Lua sandbox bypass in Debian-specific Redis installations! In this article, we will learn to exploit a vulnerable installation of Debian-specific Redis server to break out of the Lua sandbox and execute commands on the underlying server.
Lab Walkthrough - Roxy-WI Unauthenticated Remote Code Executions
Learn how the Roxy-WI Unauthenticated Remote Code Executions vulnerability (CVE-2022-31137) is exploited in this article.
Create a VM using Terraform on GCP
Terraform is an infrastructure as code tool that lets you define both cloud and on-prem resources in human-readable configuration files that you can version, reuse, and share. In this article, you will learn how to create a Virtual Machine Using Terraform on Google Cloud Platform.
IAM User Management using AWS CLI
As an AWS Administrator, you will find yourself granting access to various resources. One way to grant this access is through IAM users. So learning how to manage IAM users is important. In this article, we will look at performing common operations on IAM users using the AWS CLI. These operations include creating, reading, updating, and deleting users.
Create a Cloud Function using GCP Console
Google Cloud Functions is a serverless execution environment for building and connecting cloud services. With Cloud Functions you write simple, single-purpose functions that are attached to events emitted from your cloud infrastructure and services. In this article, we will learn how to create a Cloud Function using GCP Console.
Lab Walkthrough - Exploiting Spring4Shell (CVE-2022–22965)
In this article, we will learn to exploit the Spring4Shell vulnerability in a realistic environment and gain code execution on the target server!
Lab Walkthrough - Apache Spark Shell Command Injection
Understand how to exploit the Apache Spark Shell Command Injection vulnerability (CVE-2022–33891).
Lab Walkthrough - The WannaCry Ransomware
Understand how the wannacry ransomware works and how it encrypts all the personal data on the Windows system.
Lab Walkthrough - Exploiting PwnKit (CVE-2021–4034)
Unlocking CVE-2021-4034: Delve into Pwnkit exploitation with INE. Learn hands-on techniques & insights to secure your systems.
Lab Walkthrough - Create a Virtual Machine using ARM
In this lab walkthrough, learn how to create an instance of B1s virtual machine (Ubuntu 18.04) using ARM.
Getting Started with Azure
Start your journey to the cloud with Microsoft Azure! In this post, we cover the basics of Azure and show you how to start using it.
Getting Started with AWS
In this post, we'll explore the fundamentals of Amazon Web Services & how to get started with it.
AWSGoat: A Damn Vulnerable AWS Infrastructure
You’ve learned individual AWS exploits and pentesting techniques. But how do you put it all together? Enter AWSGoat: a deliberately vulnerable AWS infrastructure featuring OWASP security risks and misconfigurations based on AWS services.
Lab Walkthrough - Server Side Request Forgery
In this walkthrough, learn how a vulnerable lambda function can be leveraged to perform an SSRF attack and read files from the running container.
Lab Walkthrough - Command Injection
Learn how a vulnerable lambda function can be leveraged to perform a privileged operation.
Lab Walkthrough - Overly Permissive Permission
Not adhering to minimum privileges when establishing roles and permissions exposes you to security threats. Read on to learn how overly permissive permission can lead to AWS attacks.
Lab Walkthrough - DynamoDB: SQL Injection
SQL injection provides those hackers a clever way to enter a database and DynamoDB is no exception.
Supply Chain Attacks: A Ripe Area For Research
Let’s discuss about Supply Chain Attacks and why it’s a great research area in the recent times.
Lab Walkthrough - Pass Role: EC2
In this lab walkthrough, we show how in AWS EC2, overly permissive permissions can be abused by a user to perform privileged operations!
INE Fundamentals is Here!
The new INE plans have been released! Here's what's new with your INE subscription and what you can expect as the content in these plans grow.
Active Directory Security: Start Your Red Team Journey with CRTP, CRTE, PACES certifications
Learn Red Teaming, AD security & earn CRTP, CRTE, PACES certifications with INE. Get hands-on training for a lucrative cybersecurity career!
IaC (Terraform) for Pentesters
Infrastructure as Code (IaC) makes managing infra easy, and is used in many cloud deployments. In this post, learn how attackers can leverage IaC and subvert your cloud infra.
Configuring BGP Local Preference on Juniper Routers
Learn how to configure BGP local preferences on Juniper routers with sourcing and topography examples with INE expert, Rohit Pardasani.
Building a Brand in InfoSec
A 3-step-guide to building your personal brand and advancing your InfoSec career.
The Fight Against Imposter Syndrome
Imposter Syndrome is present in all industries and professional settings. Here's how you can combat Imposter Syndrome in IT.
6 Ways to Hack Your Cyber Security Career
We’ve compiled a list of six ways you can hack your cyber career to get ahead of the curve and the competition.
May the Fourth be with You
In honor of Star Wars Day, we're giving you the Jedi Code of Security so you can use the force and protect your business and your data.
Difference Between Good and Great IR Professionals
What skills make a great incident response professional? Discover the skills required to be successful in IR!
What is Gamification?
We’re taking a deep dive into how gamification is used, why it works, and what INE is doing to gamify our student’s learning experience.
Tax Season Scams
We're highlighting the most common schemes used during tax season as well as ways you can avoid becoming a victim.
Introducing INE Fundamentals
INE is introducing new plans in anticipation of all-new content! Find out more about the plans and what that means for your IT training.
New eJPT COMING SOON
The eLearnSecurity Junior Penetration Tester (eJPT) exam is getting an upgrade! Learn more about how the eJPT is changing and what you can expect as you prepare for the exam.
Top Skills for a Career in Incident Handling & Response
Do you want to know what it takes to be successful in incident handling and response? Check out what skills are needed in this Cyber Security role.
Cyber Warfare and Your Enterprise
Learn more about the potential impacts of cyber warfare on your enterprise and the ways you can mitigate them.
INE Launches Zero Day Energy Drink
INE is thrilled to announce the newest study tool for your training journey, Zero Day Energy! The sugar-free drink is packed with energy-inducing supplements that are guaranteed to help you crush even the most challenging labs and power through your training with crazy focus.
Wrapping Up Women's History Month
If you missed out on any of the action from this month, or want to enjoy it again, we’ve included a detailed recap with links to everything we shared in March!
Black Girls in Cyber EXCLUSIVE
Women's History Month brought about a new partnership for INE, Black Girls in Cyber. Here's an exclusive look at how BGiC and INE are addressing the challenges faced by women in STEM.
Femme Tech: Organizations Leading Female Progression in IT
Explore organizations that are challenging the status quo by promoting women in the technical space to celebrate Women's History Month!
Day in the Life: Women in Tech
In honor of Women's History Month, INE is highlighting one of our women working behind the scenes in tech, Amanda Martin! Read more to learn about Amanda's journey to becoming an Instructional Designer at INE.
Day in the Life: Female Cyber Security Engineer
In honor of Women's History Month, INE is highlighting one of our best female IT practitioners, Lola Kureno! Read more to learn about Lola's journey to becoming a Cyber Security Engineer.
Data Queen: How Women are Leading in Tech
In this blog, we’re focusing on the modern day female heroes in technology and IT who have blazed trails and left their mark on the world.
Dive Into New Networking Labs & Cyber Security Quizzes
Our cutting-edge, in-browser lab platform will allow you to put your networking skills to the test across 24 upgraded courses. Nearly 300 new quiz questions have been added to our Cyber Security courses.
Kicking Off Women's History Month: Women in IT
As we kick off Women’s History Month, we want to highlight four women who helped advance technology while shedding light on the areas where further progress can be made for current and future generations of women in tech.
Scaling Your Mt. Cloud Skills
As we wrap up our Mt. Cloud blog series, we’re going to highlight how businesses benefit from the Cloud and how you can continue learning even after the hike is over.
Summit: Reaching the Peaks of Mt. Cloud
Cloud experts know that it takes years of dedication to get to the top. Here's more on how you can reach the summit and what you can expect once you've made the climb.
Hiking Mt. Cloud
Are you experienced in Cloud but feel like you still have room to grow? Whether you are looking to improve you corporate Cloud experience or enhance your Cloud career, we've got you covered!
Transitioning to Cloud and Cyber Security Concerns
Learn more about how you can keep your data safe and have a successful Cloud implementation journey with INE, Cloud, and Cyber Security!
Starting the Hike
In this blog, we’ll make sure your compass is pointed in the right direction and your map highlights exactly where you need to go to begin your Cloud journey.
More on Multi-Cloud
MultiCloud is a major business decision that can come with several hangups if you aren't prepared. We're here to make sure you're ready for all things multicloud!
Driving Around the Mountain
In this blog, we take a look at what the Cloud is, how it works, as well as who and what makes Cloud functional within the IT sector.
A Look at Mt. Cloud
Get a firsthand look at the multitude of resources available for you to achieve all of your training and career goals in INE's latest Cloud blog post.
What are Hybrid Cloud and Multi-Cloud Solutions?
Cloud is all the hype, especially in the post-COVID era of remote and hybrid workspaces. Find out more about the types of Cloud your business can utilize!
The Future of Cloud
In this blog post, we’re breaking down which cloud computing trends you, or your company, should keep an eye on.
Certifications for Your IT Concentration
Whether you’re looking to get your foot in the door or trying to advance your already established information technology career, certifications can help you on your professional journey.
Launching INE Certified Cloud Associate
We’re thrilled to announce the launch of the first INE-branded certification, INE Certified Cloud Associate!
Meet Mike Pfeiffer
Get to know the founder of CloudSkills.io and the new INE Cloud Director, Mike Pfeiffer, with this exclusive interview.
INE Acquires CloudSkills.io
INE has acquired CloudSkills.io to transform the current Cloud learning experience! Learn more about what this means for you.
Throwback to CyberJutsu Interview
We're giving you a window back in time to the interview we had with Mari Galloway from CyberJutsu back in October 2021. Revisit the ways you can be an innovative and engaging member of the cyber security community.
Teacher, Mentor, Master: “World’s Youngest Engineer” Named CCIE Lifetime Emeritus
4x CCIE Brian McGahan Celebrates 20 Years of Certification
6 Ways to Stay Ahead in InfoSec
Check out this list of six ways to stay ahead of the knowledge gap and stimulate your career in information security.
Looking Forward to 2022 with INE
A lot has happened in 2021 with INE, and we have even more exciting things planned for 2022. Here's a quick recap and sneak peek just for you!
Adaptability in Business: 6 Ways to Prepare for 2022
In this blog we discuss 6 trends that businesses need to implement for 2022, including higher security threats, remote work, cloud transition & more.
Are All Hackers Villains?
You see it all the time in Hollywood films. Hackers bring chaotic and wreck havoc everywhere they go. But does that make all hackers villains? Read more!
Career Paths: Data Science
Join us as we explore the career paths found in Data Science and learn how you can get ahead with INE!
What IT Professionals and Superheroes Have in Common
What do Superman and a Network Administrator have in common? A lot more than you’d think. Learn more in our latest blog post!
Cyber Security Career Paths
Join us as we pull back the curtain on the Hollywood expectations and give you a glimpse of what a career in cyber security could look like for you.
National Computer Security Day
Learn more about the history of National Computer Security Day and how you can keep all of your devices protected from a potential attack.
We Phish You a Merry Christmas
While many people are counting down the days until the holiday season, cyber criminals are counting down the days too, but for a much different reason.
5 Key Soft Skills to Have in InfoSec
Learn more about the soft skills needed to succeed in information security as well as the ways you can convey them on an application or resume.
Cloud Career Paths
We are diving into the different Cloud career paths. Read more if you're looking for a new job or looking to advance in your Cloud career.
National STEM Day
National STEM Day is celebrated by institutions across the country. See what STEM means to INE!
Let's Cross the Streams with Microsoft Defender for Cloud
Microsoft has announced Microsoft Defender for Cloud. Learn more about this single point of control for securing Azure and AWS environments.
Networking Career Paths
Discover the world of networking careers, from Network Administrator to Network Architect, and how INE can help you excel in this field with hands-on training.
Cyber Security Awareness Month Highlights
To wrap up Cyber Security Awareness Month, we've captured the highlights in one place! From streams, blogs, and stats, we loved exploring cyber security.
How Can You Be Cyber Smart?
Learn more about how you can ensure you're taking the appropriate steps to keep your most valuable information safe from a cyber attack.
Common Security Concerns with Transitioning to Cloud
We know switching to the cloud is scary but we have the concerns and solutions for you and your Information Security efforts!
Penetration Testing 101: Lateral Movement Part 2
Scenario 2: Mixed Domain In part 2 of our Lateral Movement article series, we’re going to cover a second penetration test scenario which focuses on mixed domains.
Penetration Testing 101: Lateral Movement
In the last article we talked about surveying a network that a penetration tester may land in during a penetration test. Finding and scanning hosts is integral to lateral movement.
INE and Pentester Academy Join Forces
INE together with Pentester Academy will continue to provide students with access to the tools needed to find success in the ever-evolving digital age.
What is Penetration Testing?
The end goal for a penetration tester is to help an organization better prepare itself against potential threats by thinking like a threat actor and emulating their behavior.
7 Steps Businesses Can Take to Prevent Cyber Attacks
While organizations continue their full-scale integration within the digital world, hackers are targeting companies that aren’t fully secure. $2.9 million is lost every minute.
The Anatomy of a Ransomware Attack
See the anatomy of a ransomware attack as we We take a deep dive into the stages and how you or your company can respond in this blog.
Building Your Cyber Security Dream Team
With the growing threat of cyber crime creating challenges for organizations around the world, here's how you can build your cyber security dream team.
Understanding Purple Team Roles
Learn more about what's involved in a Red Team role within an organization and how INE Cyber Security training helps prepare you for success.
Understanding Blue Team Roles
Learn more about what's involved in a Blue Team member role within an organization and how INE Cyber Security training helps prepare you for success.
Understanding Red Team Roles
Learn more about what's involved in a Red Team role within an organization and how INE Cyber Security training helps prepare you for success.
Show Off Your Certs on LinkedIn
Now that you've earned the certification you've worked so hard for, it's time to show it off on LinkedIn! Learn more about how in our latest blog.
Pros and Cons of Online Training
Learn more about the pros and cons associated with online training. INE offers many online learning paths that help you get started from wherever you are!
National Online Learning Day
It's National Online Learning Day! As a leader in online learning, INE has blazed a trail to give students and businesses greater educational access.
National Day of Civic Hacking
National Day of Civic Hacking is coming up soon! INE is the leading online learning platform to enhance your technical skills in Information Security.
INE Live Goes Live!
The wait is over, and we're thrilled to launch INE Live! Learn more about our weekly live streams and what to expect during our first session.
Bridging the Gap in IT Education
Not all employees are the same, and not all organizations are the same, so how do you create an effective strategy to keep the talent you have?
Tech Giants Pledge to Strengthen Cyber Security
How are cyber security companies responding to the Biden Administration announcement? Learn more about tech giant responses and INE solutions.
Pentesting 101: Surveying Part 2 - Metasploit Framework
In Surveying part 2, we cover Metasploit frameworks to use during a penetration test as well as troubleshooting techniques. Click here to learn more.
Master Data Center Management With Brian McGahan
Discover the concepts and practices you need to know in order to take on the CCNP Data Center exam with help from three new courses from INE Networking expert Brian McGahan.
How To Craft A Strong Information Technology Resume
Check out these five tips on how to write your resume in a way that showcases your skills as the right candidate for your dream Information Security job.
5 Ways to Stay Organized This School Year
In honor of another school year beginning, we’re sharing five helpful tips on how to get started and stay organized throughout your studies.
Pentesting 101: Surveying
Pentesting 101 includes understanding the host network and how surrounding devices is critical during a penetration test. Click here to learn more.
Five Skills That Will Boost Your Penetration Testing Career
Whether you want to break into cyber security or you’re a seasoned veteran, here are five skills you need to master your penetration testing career.
Hacker Summer Camp is Back!
Black Hat USA and DEF CON 29 are returning to in-person events for 2021 and our team is excited to participate!
How To Get Into Information Security
If you’re interested in pursuing a role in Information Security, we've compiled key points to know as you kickstart your career.
Pentester Tools to Know & When To Use Them: Part 2
Check out part 2 of the top tools every Penetration Tester should know, and when to use them during each crucial phase of a penetration test.
INE Sponsors The Diana Initiative!
INE is proud to be a Diamond sponsor of The Diana Initiative 2021 virtual event taking place July 16 and 17!
Celebrating Online Communities on Social Media Day
In honor of social media day, we're discussing the importance of online communities in the technology industry. Join us!
National Work from Home Day
The working landscape has completely shifted and employers around the world are seeing the benefits of a remote workforce. Here are a few!
Pentester Tools to Know & When To Use Them: Part 1
INE has compiled a list of the top tools every Penetration Tester should know, and when to use them during each crucial phase of a penetration test.
Machine Learning Gone Wrong with Janelle Shane
A.I. Humorist Janelle Shane joined redefINE and gave an intriguing talk focused on artificial intelligence and the ways algorithms can get things wrong.
redefINE Full Recap
redefINE was filled with roundtable talks, panel discussions, and compelling topics addressed by industry experts. Catch up on all the action here!
A Fireside Chat with Brian Krebs
INE was thrilled to have Brian Krebs join us at redefINE! If you missed it live, check out this recap which includes a link to the full recorded session.
redefINE Day 3 Recap
redefINE day 3 was filled with engaging discussions by industry experts and current INE students. Check out our recap in case you missed it live!
redefINE Day 2 Recap
Day 2 of redefINE has come to a close. If you missed out, don’t worry! We have included a summary and links to today’s sessions just for you!
redefINE Day 1 Recap
redefINE day 1 has come to a close! In case you missed it, here is a list of the major updates that were announced during today's keynote!
Tips From Self-Taught Security Pros
We’ve narrowed down insights from self-taught cyber security pros into to four key pieces of information to help you on your cyber and IT security journey.
Premier Provider of Cloud Training Solutions
As one of the most important tools in the IT field, the need for highly trained Cloud professionals is on the rise, and INE can help fill those gaps.
How to Detect and Avoid Phishing Scams
Cyber criminals continue to use email phishing to obtain vital personal and business information. Here's how you can detect and avoid these scams.
INE Releases New Networking Training Courses!
INE releases new Networking courses focused on Border Gateway Protocol, Intermediate System to Intermediate System implementation, and more.
INE announces redefINE, a free 3 day virtual event!
Join INE as we redefINE what it means to be the premier provider of technical training for IT and digital professionals at our upcoming keynote event.
INE Sponsors IoT Village at RSAC 2021!
INE is sponsoring the interactive IoT Village at RSAC 2021, one of the leading cyber security events in the world, and we can't wait to see you there!
Pentesting 101: Callback Part 2
Hisomeru's Pentesting 101 article is a follow up in his callback series and takes a look at SSH through VPS, utilizing NGROK and more.
Cyber Attack Halts Operations of Largest U.S. Gas Pipeline
The largest U.S. gas pipeline suspended all pipeline operations and shut down several IT systems after falling victim to a ransomware attack.
World Password Day Tips & Tricks
INE celebrates world password day by discussing the most common passwords, password hacking techniques, how to create a strong password, and more!
Shocking Ways Amazon Macie Can Make You a Better Bass Player
INE Instructor Brooks Seahorn guides readers through the uses of Amazon Macie and how it interacts with other AWS services.
Master Your Networking Skills with Three New Courses!
INE releases 3 new networking courses for students to learn configuring BGP, the inner workings of IS-IS, differences between OSPFv2 and OSPFv3, and more.
Help Your Team Excel with INE Business Plans
INE is offering team training solutions for IT professionals through Business Plan pricing. Sign up for a 10 day free trial today!
Apple Announces N.C. Campus with 3,000 Jobs and $1B Investment
Apple announced plans to open new campus in NC, bringing 3,000 software engineer and machine learning jobs as well as a $1B investment to the area.
EU Proposes Ban of AI Technology That Invades Privacy and Safety
The European Union announces regulations and bans of artificial intelligence technology which risk people's privacy and safety.
A Message From Our CEO: The Future of Education
INE CEO Richard McLain provides a company update and addresses the future of online learning in his latest blog post.
Cloud Week Recap: Q&A Sessions, Webinars, and Giveaways, Oh My!
INE recaps cloud week to include videos of our AWS framework webinar, Azure Q&A, Biz-Tech Blueprint, Twitch stream and more!
Strengthen Your Cloud Knowledge With Our New Course Offering!
INE has released the latest cloud course material which covers the fundamentals needed to start your cloud journey.
INE Online Bootcamps Available For Individual Purchase!
INE Online Bootcamps now available for individual purchase!
INE Kicks off Cloud Week!
From webinars and videos to a live twitch stream and Q&A sessions, we have exciting topics and engaging discussions hosted by industry experts.
Pentesting 101: Callback Part 1
INE's very own Hisomeru continues with a look at different callback techniques as well as simple SSH tunneling in this Pentesting 101 article series.
Stimulus Checks Burning a Hole in Your Pocket? Here's How To Use It.
Stimulus checks are landing in bank accounts of more than 160 million Americans this week. Have you thought about how you will spend yours? Consider spending just a small portion of stimulus money by investing in yourself, and enjoy a lifetime return on your investment.
Close Out Cyber Security Week With Two New Courses
We're closing out Cyber Security Week with two new courses from INE instructor Piotr Kaluzny, now available with your INE subscription.
Pentesting 101: Getting in with Social Engineering
As a continuation of INE's Cyber Security Week and Hisomeru's Pentesting 101 series, we cover social engineering and how your team can dangerous and costly attacks.
My eJPT Experience: Lily Clark
Aspiring for eJPT certification? Explore a newcomer's journey with exam prep and study tips to see if eJPT is right for you.
Master Data Science Technologies With Three New Courses
Dive into both fundamental and professional-level Data Science concepts with three new courses from INE's expert instructors. These courses feature hours of on-demand instruction, as well as quizzes to help reinforce core concepts after each topic and supplemental course files to aid in studying.
New Networking Courses Now Part Of Your Subscription
Ready to take advantage of your shiny new INE subscription or just curious to check out some new content on the platform? Check out three new Networking courses.
Have you Heard? Online Bootcamps Are BACK!
In case you missed it, we dropped some pretty big news on Tuesday regarding INE's subscriptions. In the continued effort to make our clients the best experts in the IT industry we’re excited to announce that we will also be expanding our offering to include live online bootcamps, hosted by our expert instructors!
New Training Options Now Available From INE
INE is excited to offer a completely new pricing structure, which includes access to all our training verticals at a lower price point as well as a new monthly subscription option. We believe this change will make our training more accessible, allowing us to continue providing valuable IT education materials to as many people as possible.
Palo Alto Networks Firewall – Management Best Practices
Palo Alto Networks Firewall only works if there is secure administration access. Without it, the firewall won't work properly. Read more on firewalls here!
Pentesting 101: Hiding While Fingerprinting
In the conclusion of the Fingerprinting 101 series, we cover hiding with fingerprinting. Need to catch up? Check out our entire Pentesting 101 series here.
Master Windows Concepts With Chris Olsen's Latest Course
Check out INE instructor Chris Olsen's latest course covering the deployment and configuration of Windows 10. This course is part of the Modern Desktop Administrator Learning Path and aligns with learning objectives on the MD-100 certification exam. With over 6 hours of instruction master important skills such as deploying Windows 10 and post-installation configuration.
7 Device Settings to Change this Data Privacy Day
On each year's Data Privacy Day, use these 7 device settings to change as a means to keep your information safe from potential cyber threats.
Pentesting 101: Fingerprinting Continued
In the continuation of our Pentesting 101 series, we dive deeper into fingerprinting and nmap switches. Click here to read this blog from expert Hisomeru.
Check Out Four New Professional Level Networking Courses
This week dive into four new professional-level Networking courses, created by Rohit Pardasani, Piotr Kaluzny and Brian McGahan. These courses feature over 15 hours of in-depth video instruction, graded quizzes and supplemental course files to help you master the technologies and become an expert.
The Network Engineer’s Question: Why Learn Ansible?
In today's blog, INE instructor Keith Bogart discusses why it's worth it for Networking certification candidates to learn Ansible.
Master IP Addressing With Two New Cloud Courses
Working towards a professional level Azure certification? If so you'll want to check out Tracy Wallace's newest courses, included in your Cloud Pass. Each course contains several hours of in-in-depth instruction, graded quizzes to test your comprehension and hands-on Azure tasks to practice your skills.
Pentesting 101: Fingerprinting
Fingerprinting is part of the initial recon of a target and a means of gathering a target network fingerprint is done through scanning. There are many types of scanning like network/port scanning, web scanning, service scanning, and vulnerability scanning. Much like with OSINT, no network is accessed without first fingerprinting the network from the outside. It is important to identify the types of systems and networks in the target network to select the tools needed for the penetration test. Fingerprinting greatly increases the chances of success in gaining access to the target network.
Dive Into Programming Fundamentals With Three New Courses
Ready to dive into programming fundamentals with INE instructors David Mertz and Kristin Day? Check out three new courses , part of INE's Data Science Pass. Each course includes in-depth instruction, graded quizzes and hands-on practice with GitHub projects to help you master the technologies.
Pentesting 101: Human OSINT Continued
Google and file searches on a website are good ways to accomplish manual Human OSINT. However, most penetration testers like automation. There is a tool called “Maltego” that automates many of the search processes one would use on multiple search engines and social media platforms.
Pentesting 101: Human OSINT
OSINT comes in two different forms, technical and human. For penetration tests, it is important to know that human error is a large part of cyber breaches.
Check Out Four New Courses - Now Part Of INE Premium!
Networking is a fundamental part of IT management, with businesses depending on their teams to master an array of technologies within the industry.
Pentesting 101: How to Use Shodan for Cyber Security Technical OSINT
Learn how to use Shodan, a not-so-normal search engine like Google, to gather Technical OSINT on a penetration testing target. Click to read more.
Discover Concurrency, Parallelism & Unit Testing With Two New Python Courses
Known as one of the world's most popular and in-demand programming languages, knowledge of Python is a valuable skill in any Data Scientist's arsenal.
The Legal Ramifications of Cyber Security Threat Intelligence Gathering
While dark markets and the dark web can provide valuable information for cyber security professionals, organizations and individuals need to follow laws and regulations and maintain open lines of communication with law enforcement to avoid major investigative scrutiny.
Check Out New Microsoft Courses From Jonathan Summers
Looking for new professional-level Microsoft courses to help you become an expert? The winter holidays are the perfect time to dive into INE's newest content from Azure expert Jonathan Summers:
Penetration Testing 101: An Introduction To Cyber Security Methodologies
This is a new series of articles that will cover the complete penetration testing methodology based largely on case studies of previous hacks.
The Importance Of Cyber Security Awareness Training For Employees
Cyber security awareness can help organizations mitigate the possibility of a costly cyber security attack, make sure your organization is prepared.
Top Ten Email Phishing Attacks Deployed During the Holiday Season
Phishing attacks are one of the leading causes of corporate network breaches. As the holiday season approaches, organizations must focus their efforts on raising cyber security awareness to counter the effects of social engineering.
Master Networking Technologies with Three New Courses
Networking is a fundamental part of IT management as businesses depend on technology to maintain relevance and growth. With IT networking jobs projected to see a 5% increase or higher for at least the next 10 years, professionals can always expect a wide variety of opportunities to pursue with the right certifications under their belt. Check out three new courses from INE's Networking experts Keith Bogart and Brian McGahan. These courses cover the necessary skills needed to master the CCNP Data Center and CCNA certifications.
Explore INE's Red Team Training With These Courses
Red team tactics are at the heart of cyber security with organizations around the world. Check out some of the Red Team focused courses we have here at INE.
Understanding Malware Analysis with Dr. Ali Hadi
Malware analysis is the dissection of malicious code with the goal of discovering how it works, how systems can detect it and how to eliminate the threat.
No Data Science Instructor? No Problem. What to do instead.
Online data science may seem like a lonely task, but there are ways to seek community, and if you set your mind to it, there's a lot you can learn.
Take On The AZ-204 With Two New Courses
This week, prepare for your AZ-204 certification exam with two new development courses from INE instructor and Azure expert Tracy Wallace. Part of our Azure Developer Associate learning path, these courses give you the foundational knowledge to take on the exam with confidence.
Introducing INE Tasks for Azure
Learning requires hands-on practice. It is a simple rule, and one I am happy to say we at INE support with our Azure cloud content. We now have hundreds of hands-on tasks that you can work on while completing your Azure courses and learning paths.
IOT Security: Redefining reality through security
HONEST Security’s Amber Holcomb discusses innovations in Internet of Things connected devices and how IoT security keeps you safe from cyber criminals.
No Tricks, Just Treats: Four New Courses Now Available!
Don't miss out on four new networking courses, now part of your INE Premium Subscription! Join INE expert instructors for over 20 hours of content and quizzes.
Python Concurrency Tutorial
Confused about Python concurrency? In this quick tutorial, we'll teach you how to effectively write concurrent programs, about parlellism, and much more!
Master The Basics of Pentesting With New Courses
For a novice, entering the information security field can be overwhelming. You may not know what the career paths are, and professionals tend to use a lot of industry jargon.
Credential Harvesting: Phishing Campaigns and MitM Attacks
Login credential harvesting, phishing campaigns, and MitM attacks are a few of today's most common breaches. Learn how to mitigate these campaigns here.
Grow Your Python Skills With Two New Courses
Data Science is one of the fastest-growing sectors in the IT industry, with the number of open positions growing especially quickly for professionals proficient in Python. Master the skills needed to meet the needs of these in-demand positions and get vital hands-on experience with two new courses from INE instructor and Data Science expert David Mertz.
Breaking Down Business Email Compromise
In this blog, we discuss what Business Email Compromise is and why should cyber security professionals care during this Cyber Security Month.
Three New Cloud Courses To Prepare You For Your AZ-104 & AZ-204 Exams
This week, we have released three new courses created to help you solidify the skills needed to navigate the AZ-104 and AZ-204 certification exams and get certified.
The Wait Is Over! New SD-WAN & SD-Access Courses Now Available!
INE's newest SD-WAN and SD-Access courses are now available! Check them out today with your INE Premium Subscription to get started!
Learn About Python Standard Library & Save On Training
Discover key skills needed to master technologies within Data Science with INE instructor David Mertz's latest course- now a part your INE Premium Subscription!
New CCNP CISCO SPCOR Courses Now Available
Ready to take on the CISCO SPCOR certification exam? We released 3 new CCNP Service Provider courses, led by INE and Networking expert Rohit Pardasani.
Why You Need An IT Certification
With careers in the IT sector increasing significantly in 2020 and beyond, you may wonder is making the effort to obtain an IT certification worth it to get hired or to grow within a company? In short, the answer is yes.
Implementing A Hybrid Cloud Solution Now (Video)
Watch as our experts go over the process of hybrid cloud solutions and demonstrate how to securely integrate components on-premises in AWS & Azure.
Take On The SPCORE Exam With Two New Courses
Follow along with Rohit Pardasani as he takes you through implementing and optimizing OSPF v2/v3 and ISIS Protocols as part of your INE Premium Subscription!
Three New Courses Now Part Of INE's Data Science Program
Establish key skills and gain a deeper understanding of programming with three new courses from INE instructors David Mertz and Adriana Patterson.
Learn About Palo Alto Firewall Basics with a FREE Course
This week enjoy free courses and training demos covering topics relevant to securing your personal and business networks.
New Microsoft 365 Courses Now Available!
Working towards your Teams Administrator Associate certification? Check out our newest Microsoft 365 courses - just added our IT Essentials library, which comes included with your subscription!
A Journey to Microsoft certified: Devops engineer expert
Want to become Microsoft certified? INE's Mbong Hudson Ekwoge discusses his devops engineer expert journey, approach & results in this step-by-step blog.
Watch "BGP Path Selection" Now!
Don't miss Rohit Pardasani's interactive introduction to BGP Path Selection. Follow along with Rohit and learn how to configure BGP Attributes. Start now!
Master Data Center Management With Brian McGahan
Want to master data center management? Discover the concepts you need in order to take the CCNP Data Center exam with help from INE expert Brian McGahan.
What Organizations Need to Know About Mobile Security
Mobile application security is essential for businesses across the world. Unfortunately, many apps can be breached easily by attackers.
Watch "DOT1X and MAB" Now
Are you interested in how DOT1X or MAB is configured? If so you'll want to check out INE expert instructor Rohit Pardasani's webinar - "DOT1X and MAB".
Take On The AZ-304 With Three New Courses
Are you ready for the AZ-304? Before you take the exam be sure to check out Azure Solution Expert Tracy Wallace's newest courses, created for IT professionals who design solutions in Azure.
Watch "Planning A Cloud Migration" Now
Are you interested in becoming a Microsoft Certified Azure Solution Architect Expert? If so, check out Microsoft Azure instructor Tracy Wallace's webinar: Planning A Cloud Migration.
Check Out Our Upcoming Live Webinars
Looking to learn something new? Check out INE's weekly live webinar series. Covering a variety of IT's most in-demand topics, these free webinars feature hands-on exercises and even provide an opportunity for attendees to ask their questions directly to the instructor. Check out our upcoming webinars and sign up today
Three New IT Essentials Courses Now Available
No matter what you're IT goals entail, learning the basics are the first step to success. Check out three new courses we've added to the IT Essentials Pass (included with every subscription!), and get a head-start on your certification success!
Three New Courses Added to INE's Data Science Path
As part of the new Data Science Pass, INE has released three new courses combining expert-level instruction with hands-on practice for real world problems:
Prepare For The AZ-500 With INE's New Azure Security Engineer Courses
Get ready to ace your Azure Security Engineer Associate exam with 5 new courses from Azure Solutions expert Tracy Wallace.
Watch Part 2 of the Building Applications in Azure Webinar Series Now
Join Tracy Wallace as he explores the container services available in Azure. Tracy discusses the platform options available for hosting container solutions in Azure, and he will demonstrate building a container image, hosting the image in Azure Container Registry, and deploying the image to Azure Container Instances, Azure Kubernetes Service, and Azure Web Apps for Containers.
Data Science Week Recap
Thank you for celebrating our new Data Science Pass with us during INE's Data Science Week. If you missed any of the events or would like to relive the fun, you can find links to all of the events here.
Python Visualization Libraries you should know in 2020 and how to use them
Python is continuing its path as the fastest growing and most used programming language for data science, and the number of available libraries for data visualization is also rising. It's extremely important to know all the data visualization libraries out there - including their strengths and weaknesses - before choosing one to create data science project graphs.
Watch INE's Manipulating Sequence Files with Jupyter and Biopython Webinar Now
Join Data Science expert and Biotech consultant Adriana Patterson for a live introduction to Biopython as a tool for efficiently working with sequences and their related metadata. We'll do it all in jupyter notebooks, which is an excellent environment for keeping track of all your code, calculations, and visualizations.
Watch INE'S Free Machine Learning for Business Applications Webinar
Join Data Science expert Santiago Basulto for a LIVE workshop, covering the most important concepts for applying Machine Learning to business applications. He'll use concrete examples demonstrating how businesses and individuals can use classification to predict and prevent customer churn.
The Data Science Revolution in Baseball
Data Science's significant impact on baseball is explored in this blog post discussing the 2010 Cy Young Award, a shining example of Data Science at work.
Free Data Science Course on Python and Pandas
Enjoy this 100% free course on Reading Data with Python and Pandas, led by Data Science expert Santiago Basulto, as INE kicks off our Data Science Week
Relive the Magic of Networking Week
Catch up on or revisit the Networking Week events created in celebration of INE's new Networking Pass.
Cloud Week Recap: The Webinars! The Exclusive Info! The Prizes!
All of the specials and events of Cloud Week, celebrating the release of INE's new Cloud Pass, can be found right here for you to enjoy over and over again
Ace the CCIE Enterprise Infrastructure Exam with INE's New Course
Study for your CCIE Enterprise Infrastructure Exam with INE's new review course, led by Brian McGahan, covering all you need to know to pass the test
INE's New Course Gets You Ready for Your CCIE Service Provider v5 Exam
Become fully prepared for your CCIE Service Provider v5 exam with INE's new course, CCIE Service Provider v5 Exam Review, led by expert Rohit Pardasani
Cisco Live 2020 - Recap
INE expert instructor Brian McGahan shares his initial thoughts and reflections on Cisco Live 2020, including tech highlights and what to look forward to.
Watch INE's Palo Alto Firewall Course
Learn more about Palo Alto Next Generation Firewall, one of the industry's leading security systems, in INE's new course led by expert Piotr Kaluzny.
Find Azure Management & Security Solutions in INE's New Course
Discover the best Management and Security Solutions in Azure with INE's new Azure Architects course, led by Azure expert instructor Tracy Wallace.
New Azure Architect Course Released
Prepare for your AZ-304 exam with INE's new course for Azure Architects on Application Solutions, led by expert instructor Tracy Wallace
More New Azure Courses Now Available
Learn more about Azure Infrastructure and Monitoring with INE's new course led by Azure expert Tracy Wallace, covering vital topics for the AZ-303 exam.
Discover EVE-NG With A Free Introduction Video
Rohit Pardasani discusses Eve-NG, the first clientless multivendor network emulation software, with its CEO Uldis Dzerkals, demonstrating installation.
We've been listening
As a company, INE has been listening. Racism in any form is inexcusable, period. We proudly stand with the Black community, and will not remain silent.
Watch Part 1 of the Building Applications in Azure Webinar Series Now
Watch INE's free webinar, Building Applications in Azure, Part 1 of Azure expert Tracy Wallace's series on the topic.
Ace Your CCNP ENARSI Exam with INE's New Study Course
Prepare for your CCNP ENSARI exam with our ultimate study guide and review course. INE expert instructor Keith Bogart covers every vital topic. Start now!
New Azure Data Platforms Course is Ready to Go
INE releases a new, quick course for Azure Architects on Data Platforms. Led by Azure expert Tracy Wallace, SQL and NoSQL options are explored and more.
Why Summer is the Superior Time to Reach Your Goals
Summer is the best time of year to achieve a significant goal. See how it measures up to New Year's resolutions, Spring Cleaning, and Back to School fever.
Master Design Business Continuity in Azure with INE's New Course
Learn more about business continuity solutions in Azure and prepare for the AZ-304 exam with INE's new course on Azure Architecture, led by Tracy Wallace.
Watch INE's Azure Course on Design Infrastructure
Click here to get ready for the AZ-304 exam by watching expert Tracy Wallace in INE's new course, Azure Architect: Design Infrastructure.
Watch INE's Q&A Featuring the Entire Networking Team
INE's expert Networking Team, Brian McGahan, Keith Bogart, Rohit Pardasani, and Piotr Kaluzny come together to answer pressing study questions
Jump Into INE's New Course on Overlay Protocols & Packet Flow Analysis
INE's new course, Applying Overlay Protocols & Packet Flow Analysis, led by expert instructor Brian McGahan, is now available.
Keith Bogart's Free IPv4 Addressing & Subnetting Webinar is Here
Enjoy INE's free IPv4 webinar on Addressing and Subnetting, led by Networking expert instructor Keith Bogart, created for the launch of the Networking Pass.
Free OSPF & NSSA Mini-Course You Can Watch Now
Exclusively for Networking Week, INE expert instructor Rohit Pardasani leads this free mini-course, OSPF Stub, Totally-Stub, NSSA, and Totally-NSSA.
The Youngest CCIE Candidate is Still Focused
Michael Hilton, the youngest CCIE candidate ever, continues his journey towards certification success.
Watch INE's Free Spanning-Tree Protocol Webinar Now
Watch INE's free webinar Understanding and Implementing Spanning-Tree Protocol, led by expert instructor Rohit Pardasani, covering basic STP functions.