Back to Search Begin New Search Save Search Auto-Notify
How to Write a Successful Government Gr...
Navigating the Single Audit Act and grants management during these times is challenging enough for grant professionals. However, for many governments, simply putting together a strong application for funding can be the most challenging part, especially for those new to grants administration. With more public-sector entities vying for competitive funding, it's important to assemble a strong application that can help your agency stand out from t...
Add Favorite
Preconfigured Containers for Remote Dev...
Advances in cloud infrastructure and Kubernetes container orchestration have led to new tools for seamless communication and monitoring across academic institutions. Red Hat CodeReady Containers brings a preconfigured OpenShift cluster to your laptop or desktop for development and testing purposes in a remote IT environment. Join Red Hat on Thursday, October 1st, to learn how your school system can leverage the agility of containers in a light...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Cybersecurity, Ransomware, and the Clou...
Sharing data in the cloud offers a huge advantage for educators to easily offer faculty and students the ability to work and study wherever they are. It also helps the IT Operations team to simplify management and costs for infrastructure, data storage, and data protection. But you may have questions as you determine your cloud strategy. How secure is the cloud? Is all your data automatically protected in the cloud? What happens when ransomwar...
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
Using Alteryx to Accelerate Workday Stu...
Data conversion is vital to the successful deployment of Workday Student, yet it is often one of the biggest sources of project churn. Most higher education institutions have legacy data in a variety of unique sources and formats, and much of that data will need to be imported to Workday-specific templates that often require complex, non-traditional manipulation and formatting to be loaded into Workday. Attendees joined this session, hosted by...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Addressing Cloud Security Vulnerabiliti...
Please join Orca Security and Carahsoft for an informative session on cloud security vulnerabilities in the education sector hosted by Devin Crear, Sr. Cloud Security Representative, Orca Security, and Patrick Burke, Sales Engineer, Orca Security. Educational institutions continue to be the highest victimized sector even when compared to healthcare technology, financial services, and manufacturing. A recent study in the education sector found...
Add Favorite
Cloud Success for Higher Ed Institution...
You and your Higher Ed team are invited for a webinar: Cloud Success for Higher Ed Institutions with HashiCorp Vault. On October 18th, Higher Ed institution professionals and industry experts host a webinar to discuss how HashiCorp Vault can update your cloud operating model and deliver new value to your students and faculty. Register now for insights on: Accelerating transitions: Education institutions must accelerate transitions to the cloud...
Add Favorite
Carahsoft IACP Webinar 2023: Improving...
SaferWatch and Carahsoft are excited to invite you to join us subsequent to IACP 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. School violence and mental health issues have reached a crisis point in America. Statistically, over 50 children will be the victims of gun violence at school, excluding mass shooting events. In 2021, more than 1 in 5 students se...
Add Favorite
Back to Search Begin New Search