18 webcasts found
+ 419 past events found
Back to Search Begin New Search Save Search Auto-Notify
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Add Favorite
Webinar: Putting Public Safety First –...
This webinar will provide an orientation to Oroville Dam and the State Water Control Project, the February 2017 incident and present the immediate recovery response. Five Learning Objectives of This Course: Introduction to Oroville Dam and the California State Water Project Summary of the February 2017 spillway incident Immediate recovery response Main Spillway recovery response Emergency Spillway recovery response
Add Favorite
Webinar: Concrete Repair and Maintenanc...
This course will provide an overview of the best methods and materials for concrete repair and maintenance. It will include a description of a systematic process to follow to achieve best results and will include information from recent industry wide research efforts to ensure long lasting durable repairs. Five Learning Objectives of This Course: Conducting a thorough condition assessment Most common types of concrete damage Selecting the corr...
Add Favorite
Reducing Teleworking Risks with a Softw...
Secure access is not a new challenge for IT operations, but with the accelerated shift to working from home, the need to rapidly scale secure remote access has skyrocketed. The most promising security approaches in place today, like the Cloud Security Alliance's Software Defined Perimeter (SDP) approach, had their start from government approaches. In SDP environments, government data is being accessed more by unmanaged, risky, and potentially...
Add Favorite
Webinar: The State of the Practice of D...
This course will survey dam breach analysis methods currently in use. Difference in methodology, analysis steps, assumptions and results will be described. Specifically, the course will cover hydrologic routing, 1D hydraulic routing, and 2D hydraulic routing. Features of popular software will be summarized, and future advances will be highlighted. What are the five takeaways/learning objectives attendees will receive from this course: What met...
Add Favorite
Faster, Smarter, Stronger: Implementing...
As government organizations modernize and innovate, the old adage stands true – time is money. Artificial intelligence (AI) and machine learning (ML) can help agencies be more efficient and speed time to mission. Throughout this course, we will explore how to leverage AI/ML to automate processes for better insights and efficiencies; gain visibility into networks to detect anomalies and prevent cyber threats; and integrate ML into systems...
Add Favorite
Cloud 101: Enabling and Securing Govern...
Mastering the cloud is essential to digitally transform your agency. Throughout this course, we will explore the ins and outs of cloud computing – how to leverage it to advance digital transformation and how to secure your cloud infrastructure for mission critical workloads. We’ll also uncover best practices for migrating to the cloud, how to build an infrastructure that supports both remote and onsite work, and how to acquire clou...
Add Favorite
Internet of Military Things: A Deep Div...
The concept of the Internet of Military Things (IoMT) brings clear, actionable data to the forefront, filtering away the noise to get to what really matters. In this course, we will explore the ins and outs of integrating sensors effectively across military base ecosystems. We’ll identify common challenges, draw insights from installations, and learn how to leverage devices at the edge. Do you know how the Department of Defense can integ...
Add Favorite
Building a Cloud Security Culture - Mer...
To innovate faster, you need the right tools to unlock the ability to adapt and scale quickly. Most importantly, you need the right security levels to get there. Throughout this course, we’ll talk about the benefits and capabilities of DevOps, as well as how to appropriately integrate security into DevOps to fuel innovation. We’ll complete the course by featuring the baked-in security controls available on AWS and highlight the key...
Add Favorite
Meeting the Mission at the Tactical Edg...
The mission doesn’t stop when today’s cloud environment isn’t accessible in the field. So, how do you ensure critical government agencies and industries always have access to the technology and information they need? Throughout this course, we’ll explore how to bring cloud services to the edge and ensure it’s secure, compliant, and effective. With the AWS suite of edge technologies, you have the flexibility and ad...
Add Favorite
Back to Search Begin New Search