The GreyCampus Blog

A dedicated blog for professional certifications across world. GreyCampus provides abundant resources on professional certification like PMP, Six Sigma, ITIL and more.

Explore By Category

1523624198 cehv10

The new CEH v10 (Certified Ethical Hacker)

April 13, 2018

Are you interested in kickstarting a career in Ethical Hacking? Our all-new CEH v10 course will be introduced soon, which is a golden opportunity for those interested in Ethical Hacking. This blog takes you through the latest updates in the CEH v10, and the tools and techniques which are made available to you.

Read more

Essentials of an Information Security policy

April 11, 2018

A thorough and practical Information Security Policy is essential to a business, its importance is only growing with the growing size of a business and the impending security threats. A well-placed policy could cover various ends of the business, keeping information/data and other important documents safe from a breach. It also allows the assigning of various roles and responsibilities and access restrictions to employees. It clearly states what has to be done in particular situations, and the best possible way to make effective changes to the policy in place.

Read more
1521026322 cyber1

How to kickstart your career in cybersecurity?

March 14, 2018

Cybersecurity is a broad field with various career opportunities. And Cybersecurity being an in-demand industry many people are drawn towards it but are confused on how to break into the cybersecurity market. This article is for those cybersecurity aspirants who are unsure where to begin with.

Read more
1519827372 top10cybersecurity

Top 10 CyberSecurity Companies to watch in 2018

February 28, 2018

In this article, you get to learn the brief history of each company, understand the innovations contributed to the cybersecurity industry and also explore the career opportunities they have in for the security aspirants.

Read more
1519385539 blockchain

How will Blockchain technology revolutionize cybersecurity?

February 22, 2018

Has the blockchain technology disrupted IT? Does blockchain tech has a inherit connection with cybersecurity? What is the scope of blockchain in cybersecurity? This article covers the reasons why blockchain has become more popular and also how it impacts cybersecurity.

Read more
1517988560 spectre meltdown

SPECTRE and MELTDOWN: How do I know if my PC is at risk?

February 05, 2018

How will you know if your PC is at Risk? What is the problem INTEL is facing today? Spectre and Meltdown what are these vulnerabilities and how are they different? Is it a big deal and are our systems open to hacking attacks? Get answers to all these questions in this article

Read more
1517213022 deadliest attacks

Webinar: 5 Deadliest attacks an Ethical Hacker is capable-of

January 29, 2018

The 5 attacks from the curriculum of the Certified Ethical Hacking training by EC Council will be covered with their demonstrations using iLabs. But before getting to this, our presenter will cover what exactly is the job role of an Ethical Hacker in a company, his obligations and limitations

Read more
1516850963 cybersecurity whats next

Cybersecurity: What’s next in 2018?

January 22, 2018

The year 2018 bring more connectivity, data and digital initiatives along with cybersecurity threats. Is it possible what the coming year has in for us? In this article the author presents the predictions and trends of 2018 along with the top cybersecurity resolutions for 2018.

Read more
1514893966 gettyimages 504662110

Amazing Mobile Hacking Tools and Techniques

December 29, 2017

The millennials or the Y-Generation are heavy mobile addicts. 90% of the population carry sensitive data related to their personal or professional life. So, what would happen if your mobile is hacked? Or your Operating System is compromised.

Read more