Back to Search Begin New Search Save Search Auto-Notify
Eoffer GSA/VA Schedule Preparation Workshop
Attendees will be taught how to prepare a new GSA or VA Schedule or a major modification to each using Eoffer/Emod.Instructor,Bob Griffin, has 17 years of experience in preparing Schedules(more than +300) and 30 years experience in Federal Contracting.Register at www.keynote-connections.com
October 19-20, 2010
Organizer: Keynote Connections Inc.
Location: Chantilly, VA
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
October 13-14, 2010
Organizer: Government Training Inc.
Location: Washington, DC
Add Favorite
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
September 8, 2010
Organizer: En Pointe GOV, Inc. & Symantec
Location: Boston, MA
Add Favorite
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
August 16-19, 2010
Organizer: Government Training Inc.
Location: San Diego, CA
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
August 2-3, 2010
Organizer: Government Training Inc.
Location: Las Vegas, NV
Add Favorite
Government I.T. Made Simple--A Study of...
Government I.T. Made Simple...A Study of the Government Case for Security, Virtualization & Storage Agenda: Keynote VIP Guest Speaker: Warren T. Bamford, Special Agent in-Charge (SAC) FBI’s Boston Field Office. IT Security & its’ ‘Happening Now’ impact on the Public Sector to reduce victimization & build security awareness. McAfee: Dave Marcus, Director, Security Research and Communications McAfee Labs McAf...
June 16, 2010
Organizer: En Pointe GOV, Inc.
Location: Boston, MA
Add Favorite
2010 Integrated Medical, Public Health,...
The 2010 Integrated Training Summit will take place May 12-16, 2010 in Nashville, TN. About the Training Summit The 2010 Integrated Medical, Public Health, Preparedness and Response Training Summit is sponsored by the U.S. Department of Health and Human Services (HHS). This training summit brings together HHS partners including the National Disaster Medical System (NDMS), the Office of the Civilian Volunteer Medical Reserve Corps (OCVMRC), the...
May 12-16, 2010
Organizer: Chesapeake Health Education Program, Inc.
Location: Nashville, TN
Add Favorite
Back to Search Begin New Search