Posts By :

Farrah Bultman

N2K weighs in on the Iowa Democratic Caucus debacle

What Caused The Iowa Caucus Catastrophe?

What Caused The Iowa Caucus Catastrophe? 3601 2088 N2K

Secure development, user testing, and training could have prevented this from happening.  It’s being called one of the biggest technology…

read more
AWS Certifications FAQs

Frequently Asked Questions About AWS Certifications

Frequently Asked Questions About AWS Certifications 864 486 N2K

Amazon Web Services is the defacto market leader in cloud-computing in the private sector. A recent Gartner report listed AWS…

read more
Questions That Need Answers: How to Get PCI DSS Violations

Questions That Need Answers: PCI DSS Violations

Questions That Need Answers: PCI DSS Violations 1280 720 N2K

QTNA: How to Get PCI DSS Violations In N2K’s Questions That Need Answers (QTNA) video series, we tackle some of…

read more
Capture the Flag (CTF): A Gamification of Cybersecurity Training

Capture the Flag (CTF): A Gamification of Cybersecurity Learning

Capture the Flag (CTF): A Gamification of Cybersecurity Learning 864 486 N2K

What is Capture The Flag? Capture the Flag (CTF) is gamification of cybersecurity training. Let’s look at what this means.…

read more
How to Prepare for OCP Java SE 11 Developer Certification

How to Prepare for the Oracle Certified Professional (OCP) Java SE 11 Developer Certification

How to Prepare for the Oracle Certified Professional (OCP) Java SE 11 Developer Certification 864 486 N2K

Java’s modularity, portability, robust features, security, and simplicity make it a top choice for developers worldwide. Java has steadfastly remained…

read more
How to Become a CCSP

How to Become a Certified Cloud Security Professional (CCSP)

How to Become a Certified Cloud Security Professional (CCSP) 864 486 N2K

Do you want to demonstrate that you are serious about doing what it takes to secure your position as a…

read more
Changes to CCNA

Big CCNA Changes are Coming: What This Means for You

Big CCNA Changes are Coming: What This Means for You 698 364 N2K

When technology changes significantly, tools are upgraded, and the associated certifications needed to demonstrate proficiency in the new tasks are…

read more
FAQs about CEH Exam

Frequently Asked Questions about Certified Ethical Hacker (CEH) Certification

Frequently Asked Questions about Certified Ethical Hacker (CEH) Certification 864 486 N2K

So, you think you’re ready to dig deeper into your cybersecurity profession? An ethical hacker describes a broad category of…

read more
CISA vs. CISSP

CISA vs. CISSP: What’s the Difference?

CISA vs. CISSP: What’s the Difference? 864 486 N2K

Two certifications that candidates often have questions about are the Certified Information Security Auditor (CISA) from ISACA, previously known as…

read more
What does a CISM do?

What Does a Certified Information Security Manager (CISM) Do?

What Does a Certified Information Security Manager (CISM) Do? 864 486 N2K

Candidates interested in careers as information security professionals need to know what to expect if they choose to become a…

read more