Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
The GAO Green Book Training Seminar
A Practical Approach to The Green Book Compliance The Green Book sets the standards for an effective internal control system for federal agencies, and is a crucial safeguard over public resources. State, local, and quasi-governmental entities, as well as not-for-profit organizations, may adopt the new Green Book standards as a framework for an internal control system. This one-day CPE seminar provides an overview of the principles-based Green...
Project Management Excellence Training...
Join us for a unique, interactive course that "walks you through" the project management process and tradecraft needed to be an effective project manager. This introductory level training in project management helps to prepare the attendee with little-to-no formal project management training to run small, simple projects in the work environment: construction, technology and development. The emphasis is on introducing the terminology along with...
Designing Secure Buildings: Integrating...
Designing Secure Buildings: Integrating Security Technologies (DSB)– a three-day course designed to familiarize students with design principles used in preventing and detecting criminal activity and reducing the effects of terrorist attack on the safety of personnel and damage to facilities and critical infrastructure. Students will learn to use Crime Prevention through Environmental Design (CPTED) principles to control the exterior of t...
Inhabited Space: Creating Crime Free Zones
This 2-day course explores principles developed over the last twenty years in the “social behavior” arena. The same concepts that effect positive social engineering are duplicated in designing inhabited spaces to cause people to do what you want them to do. Students will learn to design “from the curb inward” and incorporate overlapping threat prevention principles. We also look at crime and terrorist activity and their...
Designing Secure Buildings: Integrating...
(DSB) Designing Secure Buildings: Integrating Security Technologies – This 3-day workshop is designed to familiarize students with twenty-one design principles used in preventing and detecting criminal activity and reducing the effects of acts of terrorism on the safety of personnel and damage to facilities and critical infrastructure. Specific modules include; Terrorism Ideologies, Security Basics, Philosophies and Design Strategies, Bl...
4th Annual World Green Energy Symposium
The 2013 World Green Energy Symposium (WGES) will be held March 26, 2013 at Hunter College, The City University of New York (CUNY). The programs are carefully developed with a focus on green/renewable energy technology and innovations as the vantage point in the new economy creating and maintaining jobs, contract and exporting opportunities, and new policies leading to economic vitality and a healthier planet. The WGES.US consistently attracts...
Predictive Analytics & Data Mining: Mod...
Learn how experts mine data by attending The Modeling Agency's vendor-neutral and application-oriented predictive analytics and data mining courses. Participants will learn about predictive modeling strategy, best practices, capabilities, limitations, risks, rewards, methods, tools, techniques, applications, practice, and how to get started. Courses may be attended independently, or as a series. Since The Modeling Agency is not a tools vendor,...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.