Sponsored by Keepnet Labs

Author - Erdal

So You Want to Be a Security Expert

Repost from Bruce Schneier Blog I regularly receive e-mail from people who want advice on how to learn more about computer security, either as a course of study in college or as an IT person considering it as a career choice. First, know that there are many subspecialties in computer security. You can be an expert in keeping systems from being hacked, [...]


Posted By Category: Cyber Security, How to ...?Tags: , Comments: 0

Martin Smith, National Sales Manager ANZ, Fastlane Asia Pacific

Erdal's breadth and depth of knowledge is certainly matched by his presentation and training skills, where his natural flair and character is certainly endearing to the audience. He knows what Delegates want and is always able to help them find answers to questions, either from his own experiences or through his understanding of the Microsoft technologies he is [...]


Posted By Category: FeedbackComments: 0

Mitch Garvis, Senior IT Consultant

Erdal is an incredible wealth of knowledge in several areas of IT, and his passion for teaching it makes him one of the better trainers and presenters whom I have had the pleasure of working with Mitch Garvis, Senior IT Consultant, Trainer, & Courseware Developer, SWMI Consulting Group


Posted By Category: FeedbackTags: , Comments: 0

Getting hacked by color

A hacking anatomy and what we can learn out of it! There is nearly no single week , we don’t read in the news that there is a attack launched against a government, business or organization. As we all know there is NO WAY to STAP a Hacker. All what we can do is make their job harder ? But how? The best way is [...]


Posted By Category: Cyber Security, NewsComments: 0

Australian Banking Security (!)

Online Security is getting every day more and more important. It’s so common these days to implement secure password policies, which is at least 8 characters, with minimum 1 special character like @$# …. More and more cooperation's taking care of Passwords  as nearly every day a new “hack incidents “ happens… We all expect at least banks take care of secure password [...]


Worlds First CEH v7 Class Delivery

Certified Ethical Hacker Certification A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the [...]


Mobile App’s of ErdalOzkaya.com

Do you own an Apple iPhone, iPad? Or Google's Android Mobile O/S in your phone or tablet? Or a Microsoft Client O/S, Windows Phone? And do you also keep an eye in my blog? If you answer one of this question as yes, you can enjoy my blog where ever you are, in your mobile device, laptop or “smart phone’s:, [...]


ISO/IEC 27001:2005 Information Technology

Source : IsecT Ltd. ISO/IEC 27001 is the formal set of specifications against which organizations may seek independent certification of their Information Security Management System (ISMS). ISO/IEC 27001 specifies requirements for the establishment, implementation, monitoring and review, maintenance and improvement of a management system - an overall management and control framework - for managing an organization’s information security risks. It does not mandate specific information [...]


Posted By Category: ISO 20000/2700xTags: , Comments: 0