Zero Trust Implementation
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for Zero Trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed and time-consuming process....
Deploying Your Vision and Strategy
Develop and activate your vision and strategy to achieve organizational excellence This workshop is built upon the belief that the purpose of your vision and strategic plan is to achieve organizational excellence and define your future within the context of your local situation. We will discuss how to assess your vision and strategic plan and how to cascade it effectively and successfully throughout the organization. Learn a simple, but compel...
April 12, 2023
Organizer:
ICMA Location:
Virtual
Getting Started with Infrastructure as...
In this workshop, you will learn the fundamentals of infrastructure as code through guided exercises. You will be introduced to Pulumi, an infrastructure-as-code platform, where you can use familiar programming languages to provision modern cloud infrastructure. This workshop is designed to help new users become familiar with the core concepts needed to effectively deploy resources on AWS. We will guide you through the Pulumi platform with dia...
Ansible Automation Technical Workshops
Join us to learn the basics of foundational command-line activities and how to apply what you’ve learned to implement Ansible automation controller to your enterprise use cases. After finishing this lab, get ready to start using Red Hat Ansible Automation Platform for your automation requirements. September 8, October 13, November 17 Are you new to Ansible Automation? Join us to learn the basics of foundational command line activities an...
October 13 - December 14, 2022
Organizer:
Red Hat Location:
Virtual
Using Splunk Tools for Public Safety ...
At Splunk we turn your criminal investigation data into law enforcement action. The sheer amount and breadth of data common to a modern investigation can be overwhelming, especially if the analysis of that data is across different tools or is a manual exercise. Splunk provides a centralized platform to correlate data, perform advanced analytics to various data sources and apply built-in AI to quickly identify unusual behaviors or anomalies. In...
AWS D.C. Metropolitan Innovation Day
You're invited! We hope you'll be able to join us in the Carahsoft office on Monday, November 14th for this must attend, interactive event. Subject-matter experts will discuss aspects of Zero Trust, StateRAMP, AWS Marketplace, VMware Cloud on AWS, and more. Learn how the sophisticated, yet simple, AWS approach can help your agency thrive.
Cloud VM Deployment and Hardening
Securing a cloud environment can be challenging and time consuming, especially if you don’t know where to start. This Workshop will scrutinize a common cloud service: Virtual Machines, and focus on the secure implementation of that service. We’ll discuss Operating Systems (and why it matters from a cloud perspective), as well as security groups, remote access, system and network hardening as well as how mature organizations handle...
Ansible Automation Red Hat Enterprise L...
Who is this workshop best for? If you’re new to Ansible® Automation, but want a quicker version of the original RHEL workshop, this 90-minute workshop provides you with fewer exercises, focused on cloud provisioning, converting bash/shell commands to Ansible, all the way to utilizing RHEL System Roles. This workshop is intended for people who want to learn the basics of Ansible Automation, understand how they work and how they can be...
September 8, 2022
Organizer:
Red Hat Location:
Virtual
ML-Powered Next-Generation Firewall Ult...
Join us for the Virtual Ultimate Test Drive, where you'll get hands-on experience with Palo Alto Networks ML-Powered Next-Generation Firewall. In this free, two-hour virtual workshop, you will configure security policies that will ultimately restore visibility and control over the applications, users and content traversing your network. During this workshop you will: Configuring Inline ML-Powered malware and phishing prevention Leveraging Poli...
FortiGate Workshop
Today's networks are highly complex environments with borders that are constantly changing. In response, firewalls have become robust multi-functional devices that counter an array of threats to your network. Join Fortinet and Carahsoft for a complimentary workshop on how to install FortiGate and use it to protect a network. FortiGate enables security-driven networking and consolidates industry-leading security capabilities, such as SSL inspec...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.