21 webcasts found
+ 23 past events found
Back to Search Begin New Search Save Search Auto-Notify
Understanding Incoterms 2010
International Commercial Terms, or Incoterms®, are commercial terms or rules that define the seller's and buyer's responsibilities for the delivery of goods under a sales contract. They are published by the International Chamber of Commerce (ICC). Incoterms® are widely used in commercial transactions but often ignored until they are needed. Usually they are incorrectly used and in some cases taken for granted until a shipment goes wro...
Add Favorite
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Add Favorite
Webinar: Putting Public Safety First –...
This webinar will provide an orientation to Oroville Dam and the State Water Control Project, the February 2017 incident and present the immediate recovery response. Five Learning Objectives of This Course: Introduction to Oroville Dam and the California State Water Project Summary of the February 2017 spillway incident Immediate recovery response Main Spillway recovery response Emergency Spillway recovery response
Add Favorite
Webinar: Concrete Repair and Maintenanc...
This course will provide an overview of the best methods and materials for concrete repair and maintenance. It will include a description of a systematic process to follow to achieve best results and will include information from recent industry wide research efforts to ensure long lasting durable repairs. Five Learning Objectives of This Course: Conducting a thorough condition assessment Most common types of concrete damage Selecting the corr...
Add Favorite
Content Discovery for Law Enforcement A...
In this webinar we will show state of the art capabilities in the areas of automatic face, text, object, and scene recognition, all in an integrated package. This combination of features streamlines the process of content discovery. These tools help analysts and investigators dig deeper and wider, while at the same time achieving much higher levels of productivity. Collecting and analyzing images and videos is the lifeblood of many law enforce...
Add Favorite
Webinar: The State of the Practice of D...
This course will survey dam breach analysis methods currently in use. Difference in methodology, analysis steps, assumptions and results will be described. Specifically, the course will cover hydrologic routing, 1D hydraulic routing, and 2D hydraulic routing. Features of popular software will be summarized, and future advances will be highlighted. What are the five takeaways/learning objectives attendees will receive from this course: What met...
Add Favorite
Transforming Federal Security for a Mob...
In today’s digital world, government’s networks face not only increased strain and complexity on bandwidth, but also cybersecurity risks. New policies such as CISA’s TIC 3.0 provide guidance on how to address these risks, including shifting the approach from securing a single network boundary to a distributed architecture. However, many agencies’ legacy security architectures remain focused on securing the data center,...
Add Favorite
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Add Favorite
Leverage Advanced Management and Securi...
With Adobe Document Cloud (DC), agencies across the nation are turning manual document processes into efficient digital ones. Adobe Acrobat DC and Adobe Sign empower agencies large and small to work with confidence, knowing that all PDFs and e-signature workflows are safe and sound through management features and security protocols -- all customizable to your organization's needs.Join our complimentary webinar to discover how your team can tak...
Add Favorite
Adobe Experience Makers DHS Workshop Series
Government agencies are rebuilding their digital experiences with citizens and employees in mind. Through innovative and reliable programs, Adobe has been assisting in these efforts by offering solutions that increase efficiency and deliver memorable experiences to citizens, all while protecting confidential data and information within the public sector.Join us for just one or all three of these on-demand webinars in this Department of Homelan...
Add Favorite
Back to Search Begin New Search