The battle for IT security has been nearly three decades in the making. IT professionals from every industry face the challenges of security every day. As technology continues to evolve and hackers become more clever, companies are left to wonder if anyone will be able to solve the security problem. Microsoft believes they have the solution today.Read More
With significant enhancements, the latest version 12 release of F5 Big-IP is loaded with features to help you leverage the variety of cloud options to extend F5′s services platform. Released in September 2015, the innovations improve deployment agility, security, and performance of the software.Read More
Centriq customers know they can contact us for all of their IT training needs, even if the technology they’re seeking isn’t on our website. We have a network of training partners we work with so no training need goes unsatisfied.
As 2015 was drawing to an end, we observed an increase in requests for unique technology training, few of which were featured on our website. However, we were able to satisfy these needs through our training partners.Read More
(Written by Kasama Kasemvudhi/Centriq Training)
Certified Ethical Hacker v9 Here to Save the Day
As a network admin, you know you have been killing yourself to optimize your environment. Also, you try your very best to balance overall usability and security. However, after rolling everything out, implementing all the useful tips from your friends, following every painstaking detail learned from whitepapers, investing so much effort and money working with multiple vendors to construct an ideal heterogeneous ecosystem where everything is converged and everyone (else) is contented, you still lay awake at night apprehensively predicting how your network would go down because its security posture has never been thoroughly tested. Thankfully, you could ease up a bit now because CEH v9 IS HERE TO SAVE THE DAY!Read More
The EC Council Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one!Read More
Software defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors in programming.
Hence, it has become a must for developers to learn secure coding practices.Read More