How to Protect Yourself From SIM Swapping Attacks

Two-factor authentication is rapidly becoming a “must-do” in this era of rampant cyber threats. I’ve discussed and encouraged two-factor authentication here and in Learning Tree’s cyber security introduction course. But it must be done correctly. Two-step and two-factor authentication Some organizations use hardware tokens that display numbers that change every thirty seconds or so. Apps […]
Read More ›

UNIX: Fifty Years and Counting

The UNIX Operating System has a long and influential history in computing and Brian Kernighan’s new book, UNIX: A History and a Memoir tells that story. I started teaching UNIX (and C programming) for Learning Tree back in 1984. A lot has changed since then including the advent of Linux, the move to PCs, and […]
Read More ›

The Perils of Re-Using Passwords

Passwords will be with us for quite a while and so will password breaches, I’m afraid. Last week I received a notice that a site I use experienced a password breach. The email explained that the passwords themselves were encrypted, but that I should change my password on that site and any others where I […]
Read More ›

Know Why You Want To Learn

Have you ever asked yourself, “What am I doing here?” while sitting in a class? I have and almost everyone I know has had that experience. When that happens, it is unlikely that you or I learned much. Learning and training professionals correctly advocate beginning a course or a class and even each chapter or […]
Read More ›

Introduction to Gantt Charts: A Tool For Everyone Part Two

In the first part of this Introduction, I talked about some of the basic use of a Gantt chart and some of the essential features. I will expand on both of those in this post. To help make that easier, I have edited the Gantt chart from last time. (It is a Public Domain image […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.