Back to Search Begin New Search Save Search Auto-Notify
Become a Technology Apostle - How to Su...
Emerging Technology in and of itself is not necessarily disruptive nor paradigm shifting technology. However, when emerging technology is combined with the right application, it almost always is paradigm shifting and usually disruptive. Disruptive technologies have a specific definition, whereby less capable and lower cost technology solutions eventually displace more capable and costly technology solutions from market dominance. Paradigm shif...
July 18, 2025
Organizer: NDIA - National Defense Industrial Association
Location: Webcast
Add Favorite
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
July 17-18, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
HEC-RAS
This course provides an introduction of HEC-RAS with applications to dam safety. The course provides a hands-on opportunity to use the program and resolve specific questions. The objective of this course is to review the basic principles of open channel hydraulics as they relate to the natural stream environment with application to dam safety. Bridges, culverts, and in-line structures will be discussed and both steady and unsteady flow modelin...
July 15-18, 2025
Organizer: Association of State Dam Safety Officials
Location: Virtual
Add Favorite
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
July 14-18, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
CGRC | Official ISC2 Training Week
CGRC | Official ISC2 Training Week 40 CPE’s Official ISC2 CGRC certification provides a comprehensive review of the knowledge required to effectively gain the expert knowledge, skills, and experience to manage risk and authorize and maintain information systems within various frameworks. Participants receive the following with registration: Official ISC2 CGRC Student Training Guide (eBook) 180-Day Access to Class Recordings Applied Scena...
July 14-18, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
16th Annual NDIA Great Lakes Chapter Meeting
Join us on Thursday, July 17th for the 16th Annual NDIA Great Lakes Chapter Meeting, This year’s event – hosted by MxD in Chicago, IL – will provide opportunities for engagement, networking, and knowledge sharing, as well as an opportunity to tour MxD’s 22,000 square foot research facility that is used to test and demonstrate new manufacturing and workforce training technologies, as well as need for cybersecurity in man...
July 17, 2025
Organizer: NDIA - National Defense Industrial Association
Location: Chicago, IL
Add Favorite
Mastering Business Development & Introd...
The Mastering the Art of Business DevelopmentŪ Workshop is an educational and professional development program which focuses on the thinking, process and discipline required for professional Business Development. This 2-day workshop fosters participants’ understanding of the core competencies required for success in the Business Development role. Business Development is primarily a relationship development and intelligence gathering proc...
July 16-17, 2025
Organizer: NDIA - National Defense Industrial Association
Location: Arlington, VA
Add Favorite
The Two-Edged Sword of AI in Cybersecurity
Artificial Intelligence (AI) is transforming cybersecurity for the better—empowering teams to detect threats faster, reduce false positives, and identify risky behavior before it becomes a breach. But there are risks associated with AI: first, that AI tools currently are new to organizations and under-regulated for their own cybersecurity, so require careful review; also, as defenders become more sophisticated with those AI tools, so do...
July 16, 2025
Organizer: Fedinsider
Location: Webcast
Add Favorite
TechNet Emergence
Join us July 15-16, at the Hyatt Regency in Reston, Virginia, as we focus on the following topics, which have been chosen for their alignment with national priorities and cross-sector innovation opportunities:Advanced Communications Technology and Immersive TechnologyTrusted Artificial Intelligence (AI) and AutonomyAdvanced Computing and Human-Machine InterfacesCybersecurity and Data ManagementHeavily supported by the U.S. Department of Defens...
July 15-16, 2025
Organizer: AFCEA International
Location: Reston, VA
Add Favorite
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
July 14-16, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Back to Search Begin New Search