Our latest articles
Search articles

Getting the best information security education - where should you start?
Where should you turn if you're looking to gain qualifications to enter the cyber security industry for the first time?

Self-paced v instructor led: What's right for you?
Should you opt for an instructor-led cyber security course or one that's self-guided?

What does the future hold for the cybersecurity workforce?
There is little question that the cybersecurity sector is inconstant flux. Security threats are constantly evolving, as are the skills needed to ke...

Online v classroom learning
Both online and classroom cyber security courses promise high-quality education and enhance your job prospects. But which route is best for you?

Cybersecurity is evolving—and so is the CISSP
The newest version of the CISSP certification exam launched on May 1, 2021. The exam has been refreshed to reflect the most pertinent issues that c...

Challenge Yourself with CyberLive
At GIAC, we believe that hands-on testing is the future of cybersecurity certification. With five certification exams featuring CyberLive , and thr...

Best Practices for GIAC Exam Prep
For most practitioners, there’s a lot riding on a certification attempt. Beyond the personal satisfaction of earning a new credential,

Prep for the CISSP or CCSP Certifications at Your Own Pace
Prepare with Confidence, at Your Own Pace… And Now for a Lower Price Looking to prepare for your (ISC)2 certification exam anytime, anywhere without

Register for an Upcoming Live (ISC)² Online Training
Get the Best of Both Worlds in (ISC)² Certification Exam Prep Achieving a globally respected (ISC)² certification can propel your cybersecurity car...

THERE'S TRAINING ... AND THERE'S OFFICIAL TRAINING: KNOW THE DIFFERENCES
THERE'S TRAINING ... AND THERE'S OFFICIAL TRAINING: KNOW THE DIFFERENCES

No need for a career break to switch to cyber security
Demand has never been higher within the cyber security industry, as companies are becoming increasingly aware of the threats posed by cyber attacks.