CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then moves i...
SANS Security Awareness: Managing Human...
Join us for the 11th annual SANS Security Awareness: Managing Human Risk Summit to learn, connect, and share with thousands of fellow security awareness, behavior and culture professionals from around the world. For this year’s event you have the choice of attending live online or in-person*. The 2024 Summit will feature: In-depth Summit Talks - The industry's top practitioners will share their latest research, technologies, and case stu...
July 29 - August 2, 2024
Organizer:
SANS Institute Location:
Norfolk, VA
Next-Gen Search Mastery for PubSec: Ela...
Do you struggle with accessing critical information within your organization's ever-growing data landscape? Traditional search methods are often ill-equipped to handle the increasing volume and complexity of data. Vector databases revolutionize search by enabling AI to understand data, leading to lightning-fast and relevant searches on complex datasets. Join Elastic on Tuesday, July 30, for insights on how you organization can:Develop a powerf...
Can Mobile Security & Privacy Coexist?
State and Local Governments face heightened cybersecurity risks due to their critical role and resource constraints. Join us Quokka experts on July 30th as they explore common security weaknesses found in mobile apps. Hear strategies that can strengthen your mobile security and mobile app development. Register now to:Identify common mobile app security weaknesses and how they can be leveraged to extract valuable dataNavigate the privacy concer...
Complying with the New Federal Cybersec...
Join Fend, Loop1, SolarWinds and Carahsoft for an informative webinar that unveils a robust approach to air-gapping networks, delivering superior protection and continuous monitoring of critical assets while maintaining stringent security standards. Navigating new cybersecurity mandates can be daunting. The Department of Defense and government agencies face immense challenges in complying with DHS BOD 23-01, OMB M-24-04 and DoD Manual 8530.01,...
Bridge Conditions & Economic Inequity m...
The $9.6 billion in grants provided for the Bridge Invest Program funded by the Infrastructure Investment and Jobs Act allows us to target high value opportunities for improving the quality of our bridges. The National Bridge Inventory database includes helpful information such as the Average Annual Daily Travel for each bridge, but it does not include the trip types, the origins/destinations of those trips, or user demographics/characteristic...
CTO Sessions: Best Practices for Data i...
High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. So, what is the best way to protect network traffic? Encrypt ev...
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.