Alden Chavarria

Nessus vulnerability scanner

What is Nessus?

Nessus is a popular open-source vulnerability scanning tool often used in ethical hacking. It scans the network to find any vulnerabilities, misconfigurations, Denial of Service (Dos) vulnerabilities and more. These vulnerabilities can be exploited by hackers allowing them to gain access to your network. Nessus has a variety of features including: Vulnerability Scanning Asset Discovery […]

What is Nessus? Read More »

What is Amazon Web Services (AWS)?

Amazon web services (AWS) is Amazon’s cloud computing platform. Their services are available worldwide to and used by over 45% of the global market. AWS offers over 200 different services – including compute, storage, data processing and analytics, security, and much more! Cloud Computing & AWS You may be more familiar with cloud computing than

What is Amazon Web Services (AWS)? Read More »

AWS Cloud Practitioner Overview

AWS Certified Cloud Practitioner is a great starting point for anyone getting started with AWS. Cloud Practitioner is the fundamental course that provides an introduction and overview of the many AWS products and services. This course covers – The Basics of Cloud Computing, AWS Global Infrastructure, Storage Options, Security, Monitoring and Analytics, Migration Strategies and

AWS Cloud Practitioner Overview Read More »

New EC-Council Courses Added

Total Cyber Solutions is pleased to start offering EC-Council Courses as part of our curriculum. We are adding these courses due to high demand for a more varied Cybersecurity program. EC-Council courses are well renowned and come with approval from many governments (including the U.S Government, see DoD Directives 8140 and 8570) and technology companies

New EC-Council Courses Added Read More »

Two-Factor Authentication

Two-factor verification is a service that adds additional layers of security. Normally you enter a username and password in order to access a website or application. With two-factor you would be prompted to enter one additional authentication method. With multi-factor authentication, you would be prompted to enter more than two additional verification methods. There are

Two-Factor Authentication Read More »