Back to Search Begin New Search Save Search Auto-Notify
Building a Cloud Security Culture - Mer...
To innovate faster, you need the right tools to unlock the ability to adapt and scale quickly. Most importantly, you need the right security levels to get there. Throughout this course, we’ll talk about the benefits and capabilities of DevOps, as well as how to appropriately integrate security into DevOps to fuel innovation. We’ll complete the course by featuring the baked-in security controls available on AWS and highlight the key...
Add Favorite
Meeting the Mission at the Tactical Edg...
The mission doesn’t stop when today’s cloud environment isn’t accessible in the field. So, how do you ensure critical government agencies and industries always have access to the technology and information they need? Throughout this course, we’ll explore how to bring cloud services to the edge and ensure it’s secure, compliant, and effective. With the AWS suite of edge technologies, you have the flexibility and ad...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
Add Favorite
Back to Search Begin New Search