2019 in Review

Admin • December 20, 2019

What a Year!

2019 has been a wild ride for NC-Expert! We started the year by becoming a CompTIA ( comptia.org ) partner in our own right. Until 2019, we had offered authorized classes through our partners but, in early 2019, we became a direct partner and can now offer these classes using our in-house team of instructors. We were thrilled to be granted this partnership.

Once again, we renewed our sponsorship of the WLA the Wireless LAN Association an association for professional wireless engineers. We support its mission of providing an invaluable service in the Wireless Network industry. The WLA’s main goal is to create a set of peer-reviewed standards, backed by some of the biggest names in the industry. In addition, it aims to create, and open, a dialog between the regulators-and-manufacturers of wireless networking equipment and the “boots on the ground” – the engineers who are responsible for making everything work in harmony. In fact, because we believe so strongly in the WLA’s mission that our CEO, Rie Vainstein, accepted an invitation to become CEO of this voluntary organization!

In 2019, we were pleased to present our fledgling Kali Linux Bootcamp and Deep Dive at the WLPC Conference in Phoenix, Arizona, and again (by popular demand) in Prague, Czech Republic! We have been overwhelmed by the positive responses received and look forward to offering this course to the general public as we progress into the New Year.

We continue to work with our partner CWNP ( cwnp.com ). Through our Instructor Team Lead, Phil Morgan, we were able to help CWNP create its new CWSP course which, since its release in September, we have been pleased to regularly present to our students.

We have spent a good portion of our year working diligently with our partner, Cisco ( cisco.com ), to author a portion of its brand-new portfolio. We are extremely excited to see the release date coming closer and look forward to teaching many more students and helping them progress in their chosen careers!

Cisco has plans to renew its entire portfolio in February and has been working with partners, including ourselves, to complete the task within the next month – an exciting time, with many new possibilities for our clients!

We are looking forward to an exciting New Year and expect to create new innovations to help our students achieve their knowledge goals.

===
If you would like to learn more about how NC-Expert can help train you, or your IT team, toward a better future,  contact us TODAY  !

The post 2019 in Review appeared first on NC Expert.

NC-Expert Blog

By Rie Vainstein March 31, 2025
A Digital Shield for Your Online Adventures As tech professionals, we often spend a good chunk of our lives navigating the digital realm. Whether you’re troubleshooting a network, coding a new app, or just binge-watching the latest series, one thing is clear: your connection to the internet is a double-edged sword. It’s both incredibly convenient and, if not properly secured, a potential vulnerability. Enter the VPN (Virtual Private Network) our trusty, digital bodyguard. If you’re not already using one, or if you’re not entirely sure why you should, let’s walk through some of the reasons why a VPN is essential for anyone working in IT and, frankly, for anyone who uses the internet. What Is a VPN? In simple terms, a VPN creates a secure, encrypted tunnel between your device and the internet. It allows your data to travel securely, masking your IP address, and ensuring that no one (be it hackers or nosy advertisers) can track or intercept your online activity. Think of it as your personal “cloak of invisibility” in the digital world! 
By Phil Morgan March 13, 2025
Troubleshooting Wireless Networks with Ekahau: A Professional Engineer’s Guide Wireless networks have become the backbone of modern business infrastructure. From office environments to large-scale enterprises, ensuring a seamless wireless experience is essential for productivity. However, despite advancements in Wi-Fi technology, network performance issues often arise, ranging from signal interference and dead zones to capacity overloads and channel mismanagement. To tackle these issues efficiently, professional engineers rely on powerful tools. One such tool, Ekahau AI Pro, has become a gold standard in the wireless industry for troubleshooting and optimizing Wi-Fi networks. This blog delves into troubleshooting wireless networks using Ekahau tools, providing practical examples and technical insights to guide professional engineers in improving network performance.
By Rie Vainstein March 3, 2025
Futureproofing Our Security In our increasingly connected world, the security of digital information has never been more critical. From banking transactions to private communications, our data is constantly transmitted and stored across the internet. The current systems that protect this data rely on cryptography, a branch of mathematics that helps keep information secure by encoding it in ways that are difficult to decode without the proper key. However, with the rise of quantum computers, traditional cryptography is facing new and significant threats. This is where Post-Quantum Cryptography comes into play. What is Post-Quantum Cryptography? Post-Quantum Cryptography (PQC) [1] refers to cryptographic algorithms that are specifically designed to be secure against the power of quantum computers. Quantum computers, once they become practical, will be capable of solving complex mathematical problems much faster than classical computers. This will render many of the encryption methods we rely on today [such as RSA (Rivest, Shamir, and Adleman – initials of the inventors) and ECC (Elliptic Curve Cryptography)] vulnerable to attack. Quantum computers operate on quantum bits, or “qubits”, which can exist in multiple states simultaneously, unlike classical bits that are either a zer (0) or one (1). This allows quantum computers to perform certain calculations exponentially faster than classical computers. For example, in a matter of seconds, a quantum computer could potentially break an RSA key, which is considered secure by today’s standards. As quantum computing technology advances, the need for PQC becomes even more urgent.