Tag Archives: Zach Young

Hey, So What’s New With You?

It’s easy these days to get too busy with life in general, or waiting in line for the new Star Wars movie, and forget to connect with old friends and colleagues. In that spirit, and because I don’t have a tent that could hold up to 16 days of queuing in Minnesota, I wanted to tell you what’s been happening with us!

We’ve been busy writing new content, filming and releasing new courses, and preparing for our 6-month-long ice fishing season (dontcha know).

Fishing ShackFun fact; we actually have entire cities that pop up on the ice each year, and they are so established that stores follow suit and mail is delivered on a daily basis. Have you seen Grumpy Old Men? That’s it. There’s even a Grumpy Old Men festival each year, with ice fishing and ice shack contests. Why? We tend not to ask that question when trying to stay warm & entertained during the arctic freeze. Hey look, Paul Bunyan!

Speaking of freezing (prepare to have your mind blown by this segue), personal security on your computer has always been a top priority for users. No one wants to deal with a slow computer, infected with various viruses and malware, so we do everything we can to protect ourselves from that unfortunate situation; though, attackers have larger and more valuable game in mind these days. As more and more embarrassing headlines continue to pop up, everyone from small business owners to fortune 500 companies are looking for the perfect way to protect their user’s confidential information.

Allow me to introduce our brand new “Security” library! Queue the music!

LearnNowOnline has just released a Security library, full of the training you’ll need to effectively protect your company and applications from the tech world’s evildoers. Among other things, this library includes 3 robust OWASP training courses:

OWASP: Forgery and Phishing

OWASP: Threats and Session Security

OWASP: Misconfiguration and Data Encryption

The Open Web Application Security Project (OWASP) is a global nonprofit organization devoted to improving security for web applications. The Top 10 Project, first created by OWASP in 2003,
is among its most popular and widely known tools. The Top 10 Project is a lineup of the 10 leading web application security risks affecting users and companies worldwide; illustrating each vulnerability, as well as recommending examples and approaches to avert them. LearnNowOnline’s OWASP courses will turn you into a Jedi master of security (too many Star Wars references?), covering the full Top 10 Project list.

Hot off the press, and also part of our new Security library, are 4 fantastic courses on Certified Ethical Hacking (CEH):

CEH: Intro to Ethical Hacking

CEH: Operating Systems and Hacking

CEH: Threats and System Hacking

CEH: Malware and Social Engineering

Looking for more?  Stay tuned as many more security courses are in the works and coming soon!

Well, that there’s about all the time I have for today. Time to sharpen up my crampons and ready the sled. See you on the lake? You betcha!

About the Author


zach2-300x225Zach Young
 manages the LearnNowOnline customer support department. In addition to making strange but surprisingly delicious smoothies, Zach divides his time between the LearnNowOnline recording studio, providing sales demos for new and existing clients, and ensuring that each customer is taken care of. In his spare time, Zach enjoys globetrotting with his wife, playing and recording music, and attempting to get the required 1.21 gigawatts for Doc Brown’s DeLorean.

 

The Good, the Bad, and the Hacked

Queue the sunset, the cheesy music, and the…  laptop?

White Hat Cowboy

So what is ethical hacking?  It sounds like an oxymoron, how can hacking anything be ethical?  As with most things in our wonderful world, they can be used for good or for bad.  It all depends on how they’re applied.

Just like an old Clint Eastwood western, the good guys wear white hats and the bad guys wear black hats.  Things aren’t much different in the modern age of hacking, though we’ve likely traded in the 10 gallon Stetson for something a little more sporty.  My apologies to any 10 gallon cowboy hat lovers out there.  Ethical hackers, or “White Hats”, use their knowledge for the good of the program or company; testing vulnerabilities and possible weaknesses, as well as suggesting ways to proactively correct them.  Non-ethical hackers, or “Black Hats”, can use the same skill set for personal gain, bringing down a competitor, or just causing general vandalism electronically.

We’ve all heard about millions of consumers having their personal data stolen when a large corporation is hacked, and this can be extremely costly for both the company and for the consumer.  Protecting that sensitive information is paramount, and many corporations are turning to ethical hackers to combat the onslaught of potential attacks.  Let’s face it, the more secure your system is, the more likely a customer is willing to do business with you.

Enter our brand new Certified Ethical Hacking course coming in late October!  IT expert and Systems Architect Rafiq Wayani was in our studio just 2 weeks ago to film this course.  Rafiq also hosted a live webinar during his visit, and archival footage of that event can be viewed on our webinars page.

www.learnnowonline.com/webinars

Check out our webinars, and our various security training courses, to ensure that your defenses are up to par with today’s Black Hats.  Giddy up!

About the Author


zach2-300x225Zach Young
 manages the LearnNowOnline customer support department. In addition to making strange but surprisingly delicious smoothies, Zach divides his time between the LearnNowOnline recording studio, providing sales demos for new and existing clients, and ensuring that each customer is taken care of. In his spare time, Zach enjoys globetrotting with his wife, playing and recording music, and attempting to get the required 1.21 gigawatts for Doc Brown’s DeLorean.