Welcome to cissp CISSP training Certified Information Systems Security Professional
Nickname Password Security Code Security Code Type Security Code  

CompTIA Security+ Tutorial CBT quiz cram

Become a Cyber Warrior get the CEH V8 now

Rated #1 Training

Best hacking and penetration testing  magazine in the world


Where do you find the best price for books?

The ISC2 webstore
Other (Please leave a comment with name of site)


Votes 2103

Who's Online

There are currently, 85 guest(s) and 4 member(s) that are online.

You are Anonymous user. You can register for free by clicking here
The CCCure Family of Portals is strictly supported by our Sponsors below and Donations.

Acunetix Web Vulnerability Scanner Best security training in the world -- Forging IT security Experts

FITSP the Federal Government  Certification


Best Web Vulnerability Scanner Rated #1
Click HERE for more Information
SecureNinja Dojo
SecureNinja Classes
to get more details

Calendar of Upcoming Classes and Events

Acunetix Online Vulnerability Scanner
Posted by boss on Wednesday, 26 February 2014 @ 11:07:42 CET (490 reads)
Topic Acunetix

cdupuis writes "

Acunetix Online Vulnerability Scanner

The need to secure your website and perimeter servers is evident - each year thousands of hacks take place that wreak havoc to businesses. Yet not all businesses can afford to operate the required scanning tools to check that your systems are secure. Acunetix Online Vulnerability Scanner acts as a virtual security officer for your company, scanning your websites, including integrated web applications, web servers and any additional perimeter servers for vulnerabilities. And allowing you to fix them before hackers exploit the weak points in your IT infrastructure!

Leverages Acunetix leading web application scanner

Building on Acunetix’ advanced web scanning technology, Acunetix OVS scans your website for vulnerabilities - without requiring to you to license, install and operate Acunetix Web Vulnerability scanner. Acunetix OVS will deep scan your website - with its legendary crawling capability - including full HTML 5 support, and its unmatched SQL injection and Cross Site Scripting finding capabilities.

Unlike other online security scanners, Acunetix is able to find a much greater number of vulnerabilities because its intelligent analysis engine - it can even detect DOM Cross-Site Scripting and Blind SQL Injection vulnerabilities. And with a minimum of false positives. Remember that in the world of web scanning its not the number of different vulnerabilities that it can find, its the depth with which it can check for vulnerabilities. Each scanner can find one or more SQL injection vulnerabilities, but few can find ALMOST ALL. Few scanners are able to find all pages and analyze all content, leaving large parts of your website unchecked. Acunetix will crawl the largest number of pages and analyze all content.

Utilizes OpenVAS for cutting edge network security scanning

And Acunetix OVS does not stop at web vulnerabilities. Recognizing the need to scan at network level and wanting to offer best of breed technology only, Acunetix has partnered with OpenVAS - the leading network security scanner. OpenVAS has been in development for more then 10 years and is backed by renowned security developers Greenbone. OpenVAS draws on a vulnerability database of thousands of network level vulnerabilities. Importantly, OpenVAS vulnerability databases are always up to date, boasting an average response rate of less than 24 hours for updating and deploying vulnerability signatures to scanners.

Start your scan today

Getting Acunetix on your side is easy - sign up minutes, install the site verification code and your scan will commence. Scanning can take several hours, depending on the amount of pages and the complexity of the content. After completion scan reports are emailed to you - and Acunetix Security Consultants are on standby to explain the results and help you action remediation. Sign up here

Complete Vulnerability Management in one Holistic Dashboard Online Vulnerability Scanner - All Scans
Dashboard (Click to Enlarge) All Scans (Click to Enlarge)

(Read More... | Score: 0)

CompTIA Security+ CBT Tutorial @ only $47.77 a month
Posted by boss on Monday, 25 November 2013 @ 15:37:02 CET (841 reads)
Topic Training News

cdupuis writes "

Security+ Tutorial cover CompTIA CBK objectives

Good day to all,

CCCure has just launched a new computer based tutorial for Security+,  we have an introductory special for thanksgiving at only $47.77 per month.  This is a limited introductory offer and then it will be sold at the regular price of $67.77 a month.

You can subscribe at:   http://cccure.me/index.php

This CBT is NOT for people who are ONLY interested in passing the exam without gaining true knowledge. 

This CBT is an holistic coverage of 100% of all of the Security+ 301 objectives from CompTIA.  It will give you a very strong foundation on which you can build and advance further into your career.   We do not believe in producing people with only letters after their name, we believe in producing security professionals who can Talk The Talk and Walk The Walk.

This is the exact same content that you would get if you attend one of my 5 days bootcamp.  The difference is you do it on your own time and you get email support from your instructor Clement Dupuis as you make it through your learning package. 

The portal we use to deliver the content has downloads, forums, videos, tips and tricks, and a whole lot more. 

Our forums discusses in detail the new performance based questions and what you can expect on the exam.  There will be no surprise when you get to the real exam.  We will walk you through those scenarios step by step.   We will make sure you have the knowledge and skills to decipher those scenario based questions and pass the exam while ensuring you become a knowledgeable and contributing member of any team.

This package has proven itself over the past year with a documented passing rate above 96% in the dozens of classes where it was used.   It has been used by hundreds of students who have passed their exam on the first try.   This is field tested and our students always had raving reviews about it's content.

You can subscribe at:   http://cccure.me/index.php

If you have any questions please send an email to: clement dot dupuis at cccure dot com

Best regards



(Read More... | Score: 0)

Get the CISSP STUDY GUIDE from Eric Conrad for only $1
Posted by boss on Saturday, 02 November 2013 @ 07:03:42 CET (1741 reads)

Anonymous writes "


Sorry if you missed it.  It was really one of a kind.  I was able to get six great books for $6.

Hopefully it will come back again in the future.

Best regards



Eric Conrad sent me an email about an AMAZING deal going on from his publisher.  When I say Amazing I do mean Amazing.

There is no trick or catch.   You can really get the 2nd Edition of the CISSP STUDY GUIDE from Eric Conrad for only $1.  The best it is directly from the publisher website and not some illegal copies.  This is the latest copy of the book. 

Make sure you use the promo code listed below to get the rebate.

Best regards


Here is the announcement from Eric:

FYI: Elsevier is having a crazy ebook sale, and the 2nd edition of the CISSP Study Guide is available for $1.00.

A PDF version is available, with no DRM.

I just bought a copy for myself :) I paid $1.09 (including tax). 

Visit the link below to buy it:

http://store.elsevier.com/coArticle.jsp?pageid=17600012&utm_source=socialmedia&utm_medium=Syngress&utm_campaign=DRMfree$1#Computer Security

If the long link above does not work, it may be that your email client is cutting it in two portions, you can use the short version below if you have any difficulties:


Or you can also use this link:


IMPORTANT:  Use promo code: ONESALE and be sure to choose "DRM Free Included Formats" to get the PDF version.

NEW VERSION OF THE 11th Hour book is also released:

Also, hot off the presses: the 2nd edition of the 11th Hour Guide is now in stock at Amazon: 


Hope to see you at a future event, and the first adult beverage is on me.

Have a great weekend!


(Read More... | Score: 0)

NIST Cybersecurity Framework Preliminary Version
Posted by boss on Tuesday, 22 October 2013 @ 14:43:32 CEST (1284 reads)
Topic NIST

cdupuis writes "

The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) today released its Preliminary Cybersecurity Framework (PDF) to help critical infrastructure owners and operators reduce cybersecurity risks in industries such as power generation, transportation and telecommunications. In the coming days, NIST will open a 45-day public comment period on the Preliminary Framework and plans to release the official framework in February 2014, as called for in Executive Order 13636—Improving Critical Infrastructure Cybersecurity.

In February 2013, President Obama directed NIST to work with stakeholders to develop a voluntary framework for reducing cyber risks, recognizing that U.S. national and economic security depends on the reliable functioning of critical infrastructure. Through a request for information and a series of workshops held throughout 2013, NIST engaged with more than 3,000 individuals and organizations on standards, best practices and guidelines that can provide businesses, their suppliers, their customers and government agencies with a shared set of expected protections for critical information and IT infrastructure.

"Thanks to a tremendous amount of industry input, the voluntary framework provides a flexible, dynamic approach to matching business needs with improving cybersecurity," said Under Secretary of Commerce for Standards and Technology and NIST Director Patrick Gallagher. "We encourage organizations to begin reviewing and testing the Preliminary Framework to better inform the version we plan to release in February."

The Preliminary Framework outlines a set of steps that can be customized to various sectors and adapted by both large and small organizations while providing a consistent approach to cybersecurity. It offers a common language and mechanism for organizations to determine and describe their current cybersecurity posture, as well as their target state for cybersecurity. The framework will help them to identify and prioritize opportunities for improvement within the context of risk management and to assess progress toward their goals.

The framework will foster communications among internal and external stakeholders and help organizations hold each other accountable for strong cyber protections while allowing flexibility for specific approaches tailored to each business' market and regulatory environment. Its integrated approach focuses on outcomes, rather than any particular technology, to encourage innovation.

"We want to turn today's best practices into common practices, and better equip organizations to understand that good cybersecurity risk management is good business," explained Gallagher. "The framework will be a living document that allows for continuous improvement as technologies and threats evolve. Industry now has the opportunity to create a more secure world by taking ownership of the framework and including cyber risks in overall risk management strategies."

While this framework is developed explicitly to respond to the February 2013 Executive Order and the importance of reducing risks to the critical infrastructure, it can be applied by other organizations to improve their readiness to deal with increasing cybersecurity risks in all industries.

NIST will hold a workshop to discuss the Preliminary Framework—including implementation and further governance—Nov. 14 and 15, 2013, at North Carolina State University. Visit http://www.nist.gov/itl/csd/5th-cybersecurity-framework-workshop-november-14-15-2013.cfm for more information and to register. The Preliminary Framework can be found at http://www.nist.gov/itl/cyberframework.cfm and an announcement of the opening of the official comment period will run in the Federal Register.

As a non-regulatory agency of the U.S. Department of Commerce, NIST promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life. To learn more about NIST, visit www.nist.gov.


(Read More... | Score: 0)

Unlimited Retina vulnerability scanner for only $1,200
Posted by boss on Wednesday, 09 October 2013 @ 16:01:19 CEST (801 reads)
Topic Nmap Port Scanner

Anonymous writes "


Retina has been used by Government Departments as well as commercial companies throughout the world for years. It is well known for its accuracy and low amount of false positive. You now have a unique chance to acquire your own copy at an amazing price. This is a no brainer, you will get your full return on investment at first usage.





Retina Unlimited IPs for only $1200
Unlimited Retina network and web vulnerability scanning – only $1,200
It’s been 15 years since Retina Network Security Scanner first revolutionized vulnerability management with real-time security auditing and testing. To celebrate this milestone, we’re now offering the full-featured, unlimited-IP version for only $1,200 per year.

> Learn more and buy online now

Retina Network Security Scanner is the fastest, most mature vulnerability assessment solution available.
  • Discover all network (local & remote), web, database and virtual assets in your environment
  • Identify system, application, database, OS and web application vulnerabilities
  • Reveal at-risk personally identifiable information and other sensitive data
  • Prioritize remediation based on exploitability, BeyondTrust research, CVSS and other factors
  • Confirm exploitability with one click to the Metasploit Framework
  • Report progress and results to management, compliance and other roles
  • Share data with SIEM and GRC solutions
At only $1,200, Retina Network Security Scanner delivers immediate ROI from increased team efficiency and quantifiable risk reduction. Download Retina Scanner today, and join the 10,000+ organizations already finding and fixing vulnerabilities the BeyondTrust way.

Learn more and buy

- The BeyondTrust Team

| 550 West C Street, Suite 1650 San Diego, CA 92101
| 1.866.339.3732 | Privacy Policy


(Read More... | Score: 0)

Holistic CISSP Exam Overview and Preparation updated to support Apple / MAC user
Posted by boss on Sunday, 06 October 2013 @ 17:23:37 CEST (870 reads)
Topic ISC2 Org

Anonymous writes "

This article has been moved to our new portal at:



(Read More... | Score: 0)

NIST new publication on Malware and Patch Management
Posted by boss on Monday, 26 August 2013 @ 05:27:59 CEST (846 reads)

Anonymous writes "

NIST's Computer Security Division announce the release of 3 Special Publications (SP) - SP 800-83 Revision 1, Guide to Malware Incident Prevention and Handling for Desktops and Laptops, SP 800-40 Revision 3, Guide to Enterprise Patch Management Technologies, and SP 800-165, 2012 Computer Security Division Annual Report.

To view the full announcement of these 3 publications, visit the CSRRC News/Announcement page:

All 3 of these Special Publications can be found on the CSRC Special Publications page:


1. NIST Special Publication 800-83 (SP) Revision 1, Guide to Malware Incident Prevention and Handling for Desktops and Laptops
URL to SP 800-83 Rev. 1 (PDF):

2. NIST Special Publication (SP) 800-40 Revision 3, Guide to Enterprise Patch Management Technologies
URL to SP 800-40 Rev. 3 (PDF)

3. NIST Special Publication 800-165, 2012 Computer Security Division Annual Report
URL to SP 800-165 (PDF):

(note: If you are viewing the annual report, the page after the cover page, you will notice that the pages appear 2 report pages on one PDF page -- if you prefer to view 1 report page at a time, in the Adobe Reader (or browser) go to the View drop down menu – choose Page Display – then choose Display or Show 1 page at a time.)


(Read More... | Score: 0)

New ISC2 Chapter being formed in New Delhi, India
Posted by boss on Monday, 26 August 2013 @ 05:19:28 CEST (974 reads)
Topic ISC2 Org

Anonymous writes "

We are trying to open an ISC2 Chapter in NCR / Delhi.

Interested persons are requested to contact us at esecurityprofessional@gmail.com.

Our number is +919310374968.


(Read More... | Score: 0)

Wounded Warrior Cyber Combat Academy Upcoming Seminar
Posted by boss on Wednesday, 31 July 2013 @ 22:27:19 CEST (1110 reads)

cdupuis writes "


The Wounded Warrior Cyber Combat Academy (W2CAA) is a project that is very dear to me as a veteran and one that I strongly support in any way that I can.  I invite you to read an important update below about this exciting project and also would like to seek your help in spreading the word about this amazing initiative and please do get involved as well.  It is a very noble cause.

See the latest update about the project below:

Dear W2CCA Supporter,

Things are going well with our program.  Here's a couple of updates:

1.  Upcoming Seminar at Walter Reed

NSA Bethesda Fleet & Family Support Center is helping put on a 2 hour seminar entitled "Cyber Security in the 21st Century." 

We have a number of high profile speakers that are going to be talking to the Wounded Warrior population about how the new battlefront is cyber and this represents a great career opportunity to transitioning service members. 

SEMINAR DATE:    Aug 15, 2013   
TIME:                    10:30am -  12:30pm
LOCATION:            NICoE Bldg. NSA Bethesda
                              Building 51, First Floor Main Auditorium

- Transitioning Service Members
- Wounded Warriors and their family members
- Installation CIV/CTR’s welcome

Colonel Michelle Fraley   -  Commanding Officer WTB
Mr. William Lay             -  Department of State
Dr. Ron Ross                -  NIST
Anne Bloesl                  -  FFSC

If you know any Wounded Warriors would you please forward the attached flyer to them or send them the link immediately.   The 2 hour seminar is free of charge.

See details at the URL below:



2.  Fundraising

We have 30+ candidates on the waitlist for Cyber Team 2 (The second group that will be trained under this project). 

We are in the process of soliciting donations to help finance the next Cyber Team. 

If you know of anyone that wants to donate to this worthwhile cause please point them to the following site:  http://www.w2cca.org

There is a donate option on the menu on the left and all donations are tax deductible…


3.  Media Attention 

A number of our volunteers are working a trying to get some media exposure for our program.  More to come on this!


Jim Wiggins
Executive Director
FITSI - Federal IT Security Institute3213 Duke St #190
Alexandria, VA  22314
Phone:  703-828-1196  x701
Cell:  571-277-4661


(Read More... | Score: 0)

NIST Released an update to the Digital Signature Standard
Posted by boss on Wednesday, 24 July 2013 @ 10:02:59 CEST (1347 reads)
Topic NIST

cdupuis writes "

The National Institute of Standards and Technology (NIST) has released a revision to the digital standard used to ensure the integrity of electronic documents, as well as the identity of the signer.

The new document, Federal Information Processing Standard (FIPS) 186-4, concerns what is commonly known as the digital signature standard. First published in 1994 and revised several times since then, the standard provides a means of guaranteeing authenticity in the digital world. It uses complex math operations to encrypt and unscramble “signatures” that are all but impossible to forge. Updates to the standard are still necessary as technology changes.

According to NIST computer scientist Elaine Barker, FIPS 186-4 contains no major revisions, but rather focuses on keeping the standard consistent with other NIST cryptographic guidelines. Other than clarifying a number of terms and correcting typographical errors, most of the changes aim to align the standard with other publications, such as NIST Special Publication 131A, so that all NIST documents offer consistent guidance regarding the use of random number generators.

Another change concerns the use of prime number generators, which requires random initial values for searching for prime numbers. FIPS 186-3 specifically allowed saving these “seeds” only for use as evidence that the generated values were determined in an arbitrary manner; FIPS 186-4 permits saving them for additional purposes, such as the regeneration of the values.

FIPS 186-4 is available at http://csrc.nist.gov/publications/PubsFIPS.html


(Read More... | Score: 0)

Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly
Posted by boss on Monday, 15 July 2013 @ 23:01:33 CEST (853 reads)
Topic NIST

cdupuis writes "

The National Institute of Standards and Technology (NIST) has issued a new publication that broadens agency security options for Personal Identity Verification (PIV) cards. Biometric Data Specifications for Personal Identity Verification (Special Publication 800-76-2) adds iris images as biometric identifiers and on-card fingerprint comparison as options for the cards.

iris images
These iris images meet the biometric standard. The camera image on the left is run through commercial software to produce the image (right) that can be placed on the PIV card and for other uses such as an e-passport. Credit: NIST
View hi-resolution image

A PIV card is a government-issued smart card used by federal employees and contractors to access government facilities and computer networks. The PIV card carries a photo, fingerprint information, personal identification number (PIN) and a cryptographic credential–random computer-generated data that are recognized only by the PIV card–all of which serve to bind the card to the card holder.

To assist agencies seeking stronger security and greater operational flexibility, NIST made several modifications to the previous version of Biometric Data Specification for Personal Identity Verification. Major additions include:

  • On-card comparison of fingerprints for improved privacy. The specifications describe how to place one or two compact fingerprint templates and a recognition algorithm on the card. When the user wants to sign a document digitally or open a secure file, for example, she can place her finger on a reader attached to the keyboard to verify her identity. Currently, employees have to type in a PIN for matching, which is subject to error and misuse.
  • Iris recognition capability for increased security. Standardized compact images of one or both irises (the images are no more than 3 kilobytes each) can be loaded on the PIV card for compact on-card storage and fast reading times. The document provides performance specifications for iris biometrics to assure high accuracy and provides specifications for iris cameras to guide implementers on camera selection. These standards-based elements support interoperability within and across agencies using iris recognition technology.

Agencies may choose to add iris images as an alternate biometric over fingerprints, because, for some users, fingerprint collection can be difficult. At times, the fingerprints are too dry to yield a good image, and lotions, wounds or illness also can make for poor images. Agencies now have the option of using two biometric sources to avoid such circumstances.

Several recent NIST research projects have led to improved technologies for identity management that are included in the updated specification.

"NIST research supports the users of these biometric technologies through its ongoing quantitative research activities," explains Biometric Testing Project Leader Patrick Grother. After applying standard compression algorithms to a large number of iris images and then using these compact images with state-of-the-art recognition algorithms, NIST researchers determined that an iris image compressed to 3KB provides enough detail to accurately recognize an individual's iris.

"This collaboration with industry and the standards community led to the ISO/IEC 19794-6 iris standard published in late 2011. The iris standard can support PIV authentication and other uses, such as e-passports," says Grother. "More importantly, the iris standard ensures that the iris data is interoperable, that is, it can be exchanged easily between cameras and readers from different makers and across the world."

In another project NIST scientists evaluated how quickly irises age. Using two data sets with hundreds of thousands of iris images collected from frequent travelers in airports, they found no significant deterioration in recognition over nearly a decade. This result guides re-enrollment schedules. Particularly, the NIST measurement suggests that irises would meet the PIV requirement that biometric data should be viable over a 12-year period.

NIST is also collaborating with the Department of Homeland Security on a camera certification process to define a repeatable optical laboratory test of a camera's peak imaging capability. This approach follows that used in developing the Federal Bureau of Investigation's "Appendix F" specification for certifying fingerprint scanners.

Biometric Data Specifications for Personal Identity Verification

(NIST SP 800-76-2 can be obtained at www.nist.gov/manuscript-publication-search.cfm?pub_id=914224.


(Read More... | Score: 0)

BackTrack - Testing Wireless Network Security
Posted by boss on Sunday, 14 July 2013 @ 12:47:02 CEST (1224 reads)
Topic WIFI

cdupuis writes "

Good day to all,

My good friend Kevin Cardwell has just published a new book about Wireless Security Testing.

It is a nice book that will teach your how to use BackTrack (can be very easily adapted to Kali as well).

See the details of the book at the link below:


BackTrack - Testing Wireless Network Security

The book is published throug PACKT which means you don't need a loan or mortgage to buy it.  They are selling books with great content at fair price.




(Read More... | Score: 0)

Building the Next Generation of Cyber Defenders
Posted by boss on Thursday, 11 July 2013 @ 21:10:26 CEST (861 reads)

cdupuis writes "

If there is one person that I am very furtunate to be friend with, it is Jim Wiggins.   Jim is a true believer in helping others,  a true believer in education and skills.  See his presentation below on Building the Next Generation of Cyber Defenders. 

You can view it at:  http://blogs.dlt.com/building-generation-cyber-defenders/  

Above all I am amazed at the amount of work and dedication Jim  has shown to his new Wounded Warrior Cyber Combat Academy effort.   Helping our injured warriors in learning how to continue defending our country by learning cyber security skills where some of them may have physical limitation but their brain is alive, bright, and they have the right mindset to defend our country infrastructure.


Jim Wiggins is the Executive Director of the Federal IT Security Institute (FITSI). FITSI is a non-profit organization that provides a role-based IT security certification program targeted at the federal workforce.

Jim was a keynote speaker at our recent GovDefenders Cybersecurity Virtual Event. GovDefenders was a digital conference focused on the public sector where professionals from leading IT companies, including NetApp, Symantec, ForeScout, Red Hat, Quest Software, SolarWinds, and DLT Solutions,  discussed trends, best practices, and the future of public sector cybersecurity.

His presentation was, “Building the Next Generation of Cyber Defenders.” In it, he discussed an advanced training and assessment program – the Wounded Warrior Cyber Combat Academy - currently in development by FITSI to arm our wounded warriors with technical skills that supplement their existing dedication, patience, and devotion to duty. During his presentation, Jim talked about changes in IT security, why cybersecurity training is so difficult, and the tracks they’ve developed to train cyber defenders.

Jim possesses over 16 years direct experience in the design, operation, management, and auditing of information technology systems, with the past 12 years focused on information systems security. He has an extensive background in technical education and specializes in security certification courses targeted at federal and government contracting clients. In 2011, the Federal Information Systems Security Educators’ Association (FISSEA) named him “Educator of the Year.”

If you’re interested in how to implement cybersecurity training in your agency or curious how other organizations are developing cyber defenders, this is the perfect presentation for you!



(Read More... | Score: 5)

Energy sector is the US bigger target for cyber-attacks
Posted by boss on Monday, 01 July 2013 @ 22:10:25 CEST (955 reads)

cdupuis writes "

As seen on the great http://www.stefanomele.it web site:

The energy sector is reporting an enormous increase in the number of attempted cyber attacks in 2013, according to the DHS ICS-CERT Monitor Report of June 2013.

There were 111 cyber-incidents - 53% of all incidents - reported by the energy sector during only the first half of fiscal year 2013 (October 1, 2012 – May 2013), compared to about 81 cyber-incidents reported in the preceding 12 months.

Read the DHS ICS-CERT Monitor Report of June 2013 here:


(Read More... | Score: 0)

Part 2 of the CCCure CISSP Scenario Based Questions is completed
Posted by boss on Tuesday, 25 June 2013 @ 14:34:27 CEST (1211 reads)

cdupuis writes "

Good day to all,

Today I have released part 2 of 2 of the CCCure CISSP Scenario Based Questions.  This second set covers five domains of the CBK.

Visit the links below to get all of the details and get your own copy.

You can get a copy of Part 2 of 2 covering domains 6 to 10 for only $29.99 at:

You can get a copy of Part 1 of 2 covering domains  1 to 5 for only $29.99 at:


You can buy Part 1 and Part 2 as a combo package covering all 10 domains for only $49.99 at:



(Read More... | Score: 0)

Recommended Training

Become a Cyber Warrior get the CEH V8 now

Login here



Security Code:
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

CCCure Partners


Logical IT

Best Security Training in Brazil

São Paulo
Rio de Janeiro
Belo Horizonte



SecureNinja Dojo


CISSP Montreal
CISSP Ottawa
CISSP Toronto
CISSP Quebec City
CISSP Vancouver
CISSP Winnipeg


CISSP Abu Dhabi
CISSP Kuwait

The OISSG serving the Middle East security needs


CISSP Dublin, Ireland
CISSP London, UK
CISSP Edinburgh, Scotland

Best security training you can get in Ireland


Kudelski Security
Cyber Academy

Preparation Program

Lausanne, Switzerland

Geneva, Switzerland

Kudelski Security


Lagos, Nigeria
CISSP and Security Training
Digital Encode

The best security training in Lagos and Nigeria

Most Active Members

· 1: side_winder
Total points: 15456
· 2: webplu9
Total points: 15228
· 3: Lopezco
Total points: 8514
· 4: cdupuis
Total points: 8214
· 5: cissp_newbie
Total points: 7593
· 6: mikeyoung_fla
Total points: 5536
· 7: Vladimir
Total points: 4613
· 8: damoose
Total points: 3526
· 9: MMM
Total points: 2969
· 10: educk
Total points: 2619

Today's Big Story

There isn't a Biggest Story for Today, yet.

All logos and trademarks in this site are property of their respective owner.
The comments are property of their posters, all the rest © 2007 by CCCure.Org, and the site maintainers Clement Dupuis and Nathalie Lambert. Reuse is strictly prohibited without written permission of CCCure.Org or it's maintainers.

This web site is not associated directly or indirectly with ISC2, the SANS Institute, ISACA, or other certification authority. The GCFW, CISSP, SSCP, ISSEP, ISSMP, CISA, and CISM are all the property of their respecful owners. The content of this site is provided to you freely due to the generosity of our sponsors.

  • Career
  • Magazines
  • Conferences
  • Study Books
  • Certifications
  • Training
  • Tutorials
  • Quizzes
  • Forums

  • Page Generation: 0.72 Seconds