Back to Search Begin New Search Save Search Auto-Notify
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Add Favorite
Investigations on the Darknet: Case Stu...
Andrew Lewman, the Executive Vice President of DarkOwl, will explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for an intelligence community-based audience, Andrew will walk-through examples of different methodologies law enforcement can use to de-anonymize threat actors, the different tools and approa...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Cybersecurity, Ransomware, and the Clou...
Sharing data in the cloud offers a huge advantage for educators to easily offer faculty and students the ability to work and study wherever they are. It also helps the IT Operations team to simplify management and costs for infrastructure, data storage, and data protection. But you may have questions as you determine your cloud strategy. How secure is the cloud? Is all your data automatically protected in the cloud? What happens when ransomwar...
Add Favorite
Four Ways the Pandemic Has Forced Gover...
The urgency of the pandemic has forced state and local governments to react when it comes to budgeting– making short-term reporting on an annual basis the focus rather than proactively assembling long-term strategic budget plans. This reactive approach creates redundancies, cost inefficiencies, and fails to set governments up for any potential future crises; and is especially detrimental when budget transparency and community impact are...
Add Favorite
Top 10 Questions on the Single Audit an...
While the American Rescue Plan Act (ARPA) has been passed into law and relief is already being distributed to states, counties, cities, tribes, and territories, there are still many lingering questions. One of the top questions coming up - "Will my entity be subject to a single audit?" Most likely the answer is “yes". The last thing you want your government organization to experience is audit findings and the risk of owing money to the...
Add Favorite
Insights Along the Journey of IT Automa...
There is no one path or approach to IT modernization; your county, community and agency's priorities shape your strategy. Join county government colleagues on July 15th for insights on the efficiency and cost-saving benefits of IT automation and modernization. Red Hat experts will take the virtual stage and share several real-world examples illustrating how they have partnered with agencies like yours to help counties do more with less. Topic...
Add Favorite
Surveillance Off-Grid: Deploying Hybrid...
New surveillance technology and smart analytics allow technology to supplement and sometimes even replace physical security guards. Deploying this technology has the potential to make a facility much more secure, but security experts have a tendency to neglect the most vulnerable areas because of local power or connectivity issues. In a world where the power grid is increasingly unreliable, we'll explore new technology solutions that allow for...
Add Favorite
Analyzing Data: An Enterprise Resource...
The Congressional Research Service noted a decade ago that, “Intelligence is valuable only if it can be shared with consumers who need it, but, to the extent that it is more widely shared, risks of compromise are enhanced.” That report was prompted in part by 9/11. In the twenty years since, “need to know” has become “need to share” throughout the federal government as agencies have come to realize the value...
Add Favorite
Powerful Water Modeling on Virtually An...
Water system design and analysis can be costly, time consuming, and challenging for municipal agencies. The combination of CAD, GIS, simulation and analysis features needed to produce a useful model usually means bouncing between different technologies and platforms. Often, it's a marginal CAD-enabled platform that requires export to a GIS platform, or a limited bolt-on tool that is tied to a GIS platform, neither supporting the iterative need...
Add Favorite
Back to Search Begin New Search