Remove Cybersecurity Remove IT Remove Knowledge Base Remove Systems administration
article thumbnail

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

The Last Watchdog

Related: The ‘gamification’ of cybersecurity training. Stanger: We typically go in and talk to companies about guiding them down a whole cybersecurity pathway. Or in another instance a company might have an IT staffer who is in a position to undergo training to take the CompTIA Cybersecurity Analyst (CySA+) exam.

IT 133
article thumbnail

How to Perform a Vulnerability Scan in 10 Steps

eSecurity Planet

Determine which assets, systems, and networks should be tested for vulnerabilities. Define the boundaries and components of the system that will be evaluated. These settings specify which systems or networks to scan, which vulnerabilities to look for, and any special criteria or exclusions to use.