10 past events found
Back to Search Begin New Search Save Search Auto-Notify
Splunk Workshop: Introduction to Machine Data
Machine-generated data is one of the fastest growing and complex areas of big data. It's also one of the most valuable, containing a definitive record of all user transactions, customer behavior, machine behavior, security threats, fraudulent activity, and more. Splunk turns machine data into valuable insights no matter what business you're in.Join Splunk and True Zero Technologies to learn how to collect and analyze machine data to gain criti...
February 13, 2020
Organizer: Splunk Government Team at Carahsoft
Location: North Charleston, SC
Add Favorite
Project Management Excellence Training...
Join us for a unique, interactive course that "walks you through" the project management process and tradecraft needed to be an effective project manager. This introductory level training in project management helps to prepare the attendee with little-to-no formal project management training to run small, simple projects in the work environment: construction, technology and development. The emphasis is on introducing the terminology along with...
April 1-5, 2019
Organizer: Corporate Compliance Seminars
Location: Charleston, SC
Add Favorite
F5 Gov TechTalk - Charleston
Traditional firewalls (Layer 3-4) are purpose built to prevent external access to internal network resources, but these traditional firewalls offer little to no application layer protection. Threat vectors exist today at all layers of the network. Slowloris and HTTP flood attacks are examples of layer 7 attacks which would be undetected by most network firewalls. The impact of these undetected layer 7 attacks is the disruption of your mission...
November 14, 2017
Organizer: F5 Government Team at Carahsoft Technology Corp
Location: North Charleston, SC
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
September 24, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 9, 2015
Organizer: FEDINSIDER
Location: Charleston, SC
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
May 28, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
Cyber Insider Threat Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
March 26, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
International Letters of Credit Seminar...
Seminar Information: Learn to fully comply with Letters of Credit requirements. Get involved in the set-up process, learn the basic terminology and significance of various documents, and learn how to prevent and handle discrepancies. Learn how to insure that you receive payment for your shipments, how to get paid faster and how to lower bank fees. Registration includes a copy of "Export & Import Letters of Credit" reference book. Classes E...
July 23, 2014
Organizer: Global Training Center
Location: Charleston, SC
Add Favorite
What You Need to Know About Public Reco...
Uncertain how West Virginia public records, open meetings laws and government ethics laws apply to you? Find out what West Virginia law has to say about balancing the public's right to information with the individual's right to privacy. If you're involved with a public entity or if you represent the media, you need to know the ins and outs of federal and state public records including best practices for record retention and open meetings laws....
August 29, 2013
Organizer: Lorman Education Services
Location: South Charleston, WV
Add Favorite
Current Issues in Storm Water Regulation
Save money by avoiding costly mistakes in storm water management. From recent litigation to changing permitting standards, failing to stay on top of current issues related to storm water regulation is risky. In this seminar, you will get answers to all your questions, such as: What new case and policy decisions impact my practices? What are the latest trends in the water quality arena? Here is your chance to learn - in just one day - the facts...
February 21, 2013
Organizer: Lorman Education Services
Location: South Charleston, WV
Add Favorite
Back to Search Begin New Search