Back to Search Begin New Search Save Search Auto-Notify
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Add Favorite
Enhance Visual Insight from Your Aerial...
When it comes to gathering visual data, drones can assist while reducing risk, saving time, and decreasing costs. These aerial systems come in all shapes and sizes and can utilize a variety of sensors depending on the task at hand.So, how do you pick the right one for the job? Start with your desired data and work backward from there. The data you need will determine the requirements of your vehicle. Register today for our complimentary webina...
Add Favorite
Splunk ESI Contract & Air Force
Air Force has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to Air ForceHow to leverage the contractDon't miss...
Add Favorite
RMF Compliance with Splunk: Continuous...
The Risk Management Framework (RMF) was introduced to help federal agencies better manage the many risks correlated with operating an information system. Splunk offers a flexible, cost efficient, and integrated solution to allow agencies to meet their RMF compliance requirements. Join Splunk and Kinney Group for an introduction to Splunk and how you can meet RMF requirements within the United States Air Force. During this webinar, attendees wi...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Developing Next Level Airmen with Red H...
Red Hat Learning Subscription Premium provides a flexible learning experience and self-paced training options with access to recorded video classes, eBooks or live virtual classes. Join U.S. Air Force colleagues and learn how a Red Hat Learning Subscription can keep the U.S. Air Force up to speed on new technologies and updates while meeting the evolving skill demands of today's digital landscape with: A demonstration of the offerings and lear...
Add Favorite
Analyzing Data: An Enterprise Resource...
The Congressional Research Service noted a decade ago that, “Intelligence is valuable only if it can be shared with consumers who need it, but, to the extent that it is more widely shared, risks of compromise are enhanced.” That report was prompted in part by 9/11. In the twenty years since, “need to know” has become “need to share” throughout the federal government as agencies have come to realize the value...
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
Add Favorite
Back to Search Begin New Search