Data Engineering with Databricks
Databricks is coming back to Reston, VA from July 1-2 for an introductory, hands-on course on Databricks Data Engineering. Register now for firsthand training on the components of the Databricks Data Intelligence Platform. Attendees will leverage structured query language (SQL) and Python to define and schedule pipelines that incrementally process new data from a variety of data sources which power analytic applications and dashboards in the P...
GFOA's 119th Annual Conference
Registration and housing are now open for GFOA’s 119th Annual Conference! Join us June 29–July 2, 2025, at the Walter E. Washington Convention Center in Washington, DC. Participate in over 70 CPE-accredited sessions tackling today’s top issues in government finance, inspiring keynotes, interactive discussions, leadership workshops, and plenty of networking opportunities.
Streamline Your Compliance Journey and...
Compliance is a cornerstone of any modern cybersecurity strategy, especially as agencies and organizations work toward implementing Zero Trust principles. Splunk's Compliance Essentials App simplifies the compliance process by providing tools to assess, monitor, and report on your environment's adherence to regulatory standards like NIST 800-53, RMF, and other frameworks. Join us for this informative webinar, where we’ll demonstrate how...
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
Computers for Learning
This training will examine how federal agencies can help schools and educational non-profits serving some portion of the pre-kindergarten through grade 12 population by directly donating their excess computer equipment. This training will teach you (the federal agency) what your responsibilities are and how to navigate PPMS and the GSA-hosted Computers for Learning (CFL) website. Topics include CFL allocations, CFL requisitions, CFL manual tra...
Mobile Security: The Human Layer is the...
Phishing today isn’t just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific tactics—like smishing and quishing—are designed to exploit human trust, not technical flaws. And they’re working. Protecting users from falling for such schemes is difficult. Threat researchers have seen malicious smishing c...
June 27, 2025
Organizer:
FedInsider Location:
Webcast
Mobile Security Series: Securing the Hu...
Phishing today isn’t just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific tactics—like smishing and quishing—are designed to exploit human trust, not technical flaws. And they’re working. Protecting users from falling for such schemes is difficult. Threat researchers have seen malicious smishing c...
June 27, 2025
Organizer:
FedInsider Location:
Webcast
Basic Soil Mechanics Related to Earth Dams
The objective of this course will be to provide a comprehensive presentation of the significant principles and concepts of soil mechanics to the participants. The material will be presented with emphasis on the basic soil mechanics principles prerequisite to further study for the design or rehabilitation of earth embankment dams. This is a basic-level course intended as an introduction for those with minimal to moderate knowledge or experience...
SSCP | Official ISC2 Training Week
SSCP | Official ISC2 Training Week 40 CPE’s Official ISC2 SSCP certification provides a comprehensive review of the knowledge required to effectively gain advanced technical skills and knowledge to implement, monitor, and administer IT infrastructure using information security policies and procedures. Participants receive the following with registration: Official ISC2 SSCP Student Training Guide (eBook) 180-Day Access to Class Recordings...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.