Attend the Hacker Halted and CISO Forum Online Summits for Certified Ethical...
If you’ve attended my Ethical Hacking and Countermeasures course or obtained your Certified Ethical Hacking (CEH) credential in another way, you need to regularly refresh your knowledge and log CPE...
View ArticleRSA Conference 2013 – Are You Going?
I’ll be at the RSA Conference 2013 in San Francisco from February 25 to March 1. I’ll most certainly be at the opening and closing keynotes, as those are simply amazing insights into the world of...
View ArticleHacking the RSA Wireless Network: Bring Your A Game
I’m attending the RSA Conference this week. Right now I’m writing from the conference floor. The event looks to be amazing, with a great speaker line-up and really strong attendance. I can’t wait for...
View ArticleSelecting a Key Size for Your Root Certificate Server in Windows Server 2012...
Lots of different systems and platforms use certificates and Public Key Infrastructure (PKI). Many companies have decided to implement an internal Certification Authority to issue certificates to...
View ArticleSelecting a Cryptographic Key Provider in Windows Server 2012 AD CS
This is part 2 of selecting a Public Key Infrastructure (PKI) for your Windows Server 2012 environment. In part 1; Selecting a Key Size for Your Root Certificate Server in Windows Server 2012 AD CS, we...
View ArticleHow Long Does It Take to Generate an Asymmetric Cryptography Key Pair?
This is part 3 of using Public Key Infrastructure (PKI) and Private Key Cryptography for your Windows Server 2012 environment. Part 1: Selecting a Key Size for Your Root Certificate Server in Windows...
View ArticleDeciding Between Enterprise and Standalone Root Certification Authority in...
This is part 4 of using Public Key Infrastructure (PKI) and Private Key Cryptography for your Windows Server 2012 environment. Part 1: Selecting a Key Size for Your Root Certificate Server in Windows...
View Article