CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
VIP START - May 2024
VIP START is a 3-day, 27-hour veteran entrepreneurship training program that is offered at NO COST to Veterans nationwide. The program is designed specifically for service-disabled and Veteran-owned small businesses interested in entering or scaling in the federal marketplace. With a curriculum created and taught by industry and subject matter experts, VIP START mitigates company risk and ensures that they are procurement ready upon graduation.
From Risk to Resilience: Leveraging Eve...
Discover the key to operational resilience and gain insights into risk intelligence at our upcoming webinar. Learn how to safeguard your operations, accelerate response times, and protect your workforce against critical events. Severe weather, Terrorism, Civil Unrest, War, OSINT and Physical threats have a crippling effect on the business. Our session will provide a comprehensive overview of strategies to manage risks and maintain continuity,...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then moves i...
Threat Intel and Awareness Summit
This one-of-a-kind summit will provide value to security and compliance practitioners alike. Threat researchers and intelligence analysts from both CrowdStrike and Proofpoint will be covering the threat landscape and, how customers can best address their risk. Understanding the landscape will help customers go “beyond the checkbox” with security awareness and training. Join your Proofpoint and CrowdStrike counterparts for a Better...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
Tidewater Integrated Combat Symposium
We invite you to our training session at TWICS that will examine the evolution of threats to network security. These sophisticated and complex attacks are driving more organizations to consider innovative ways to mitigate cyber risk. During this session, we will discuss these emerging threats and describe how Trellix NDR uses AI and machine learning to detect hidden attacks, reduce response times, and improve process efficiencies. You will al...
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
TX Practitioners Workshop - Software ...
Join ServiceNow for a dedicated technical practitioners workshop focused on how to use ServiceNow’s Software & Hardware Asset Management (SAM & HAM) to enable agencies to optimize costs and utilization of their asset investments to reduce spend, mitigate asset risk, and automate the full asset lifecycle with workflow—on a single platform. Register now to hear directly from our asset management experts and expect to take aw...
Swing into Data: Insights at the Tee
Join Dell Technologies and Carahsoft at this exclusive event for organizations interested in data management, analytics, AI initiatives, and cutting-edge storage platforms, with opportunities to lead data governance and risk mitigation. Discover how we empower federal agencies to harness the full potential of their data, from raw data collection to actionable insights. Our solutions can dismantle data silos, streamline workflows, and superchar...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.