Back to Search Begin New Search Save Search Auto-Notify
CompTIA Security+ Certification Training
This course meets Monday-Thursday from 5:30pm to 9:30 pm for 8 nights. This CompTIA Security+ Exam Preparation course includes a FREE Exam voucher. This Security+ training is recommended if your job responsibilities include securing network services, devices, or traffic in your organization. The primary focus of this course is to prepare for the CompTIA Security+ certification examination. In this training, you will build on your knowledge and...
October 29 - November 8, 2018
Organizer: Alpine Security
Location: O'Fallon, IL
Add Favorite
CAP (Certified Authorization Profession...
The CAP certification allows you to prove your cybersecurity expertise within the Risk Management Framework (RMF). Take your commitment to cybersecurity assessment and authorization to a new level with the CAP certification. This leading information security certification proves you’re an expert aligning information systems with the Risk Management Framework (RMF).
October 29 - November 1, 2018
Organizer: Alpine Security
Location: O'Fallon, IL
Add Favorite
Certified Ethical Hacker (CEHv10) Certi...
This is the world's most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. When you sign up for this course you have the option to also purchase the CEH Practical exam voucher.
October 22-26, 2018
Organizer: Alpine Security
Location: O'Fallon, IL
Add Favorite
EC-Council Certified Security Analyst (...
The course meets Monday- Thursday from 5:30 pm to 9:30 pm for 8 nights. The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker (CEH) course and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies. It is a highly interactive, comprehensive, standards-based and methodology intensive 5-da...
October 15-25, 2018
Organizer: Alpine Security
Location: O'Fallon, IL
Add Favorite
NASA SEWP at Imagine Nation - ELC 2018...
Deep Dive into NASA SEWP's Acquisition Tips, Tools and Innovations Get a Deep Dive into NASA SEWP - this session starts with a quick overview of the NASA Solutions for Enterprise-Wide Procurement (SEWP) contract vehicle and promptly moves to an interactive web-based demonstration with participant engagement activities. You will learn in-depth details on SEWP as an IT acquisition vehicle that provides simplified acquisitions using customer frie...
October 14, 2018
Organizer: ACT-IAC
Location: Philadelphia, PA
Add Favorite
Community SANS Training in New York - D...
Join us at Community SANS in New York to attend one of our most popular SANS classes. Benefit from small class settings with great instructors. An opportunity for networking and above all, content that delivers on the SANS promise that you will be able to use what you learn the first day you return to your office. New York, NYDEV522: Defending Web Applications Security Essentials September 17-22, 2018Certification: GIAC Certified Web Applica...
September 17-22, 2018
Organizer: SANS Institute - Community SANS
Location: New York, NY
Add Favorite
Writing Persuasive Federal Proposals -...
This one-of-a-kind course shows how to develop compliant and highly persuasive proposal sections in at least half the time that it would normally take. It covers detailed methods for outlining within the sections, developing section content, infusing proper structure and flow, and implementing correct writing processes and section planning techniques. But this course reaches beyond mere compliance. You will acquire techniques and tools that wi...
February 20-21, 2018
Organizer: OST Global Solutions, Inc.
Location: Rockville, MD
Add Favorite
F5 Gov TechTalk - Charleston
Traditional firewalls (Layer 3-4) are purpose built to prevent external access to internal network resources, but these traditional firewalls offer little to no application layer protection. Threat vectors exist today at all layers of the network. Slowloris and HTTP flood attacks are examples of layer 7 attacks which would be undetected by most network firewalls. The impact of these undetected layer 7 attacks is the disruption of your mission...
November 14, 2017
Organizer: F5 Government Team at Carahsoft Technology Corp
Location: North Charleston, SC
Add Favorite
SEWP at World Congress 2017
Learn about Solutions for Enterprise-Wide Procurement and how we can assist your federal IT acquisition with the latest IT product solutions. On Monday, July 24, 2017, from 11:15am - 12:30pm, SEWP will be hosting a Panel Presetation in Session A13 intitle "Use if GWACs" ~ Acquiring IT Services Panel discussions on the various tools used for IT acquisitions. After World Congress concludes, grab lunch on your own and then join SEWP for an aftern...
July 26, 2017
Organizer: NASA SEWP
Location: Chicago, IL
Add Favorite
SEWP DC Wide Training
Learn about Solutions for Enterprise-Wide Procurement and how we can assist your federal IT acquisition with the latest IT product solutions. On Thursday, June 22, 2017, from 8:00am - 3:00pm, SEWP will be hosting two training sessions. Please use link to register for SEWP morning session from 9:00am - 11:00am and afternoon session from 1:00pm - 3:00pm. NASA SEWP is a government-wide acquisition contract (GWAC) that provides the latest IT prod...
June 22, 2017
Organizer: NASA SEWP
Location: Washington, DC
Add Favorite
Back to Search Begin New Search