DISTANCE LEARNING COR LEVEL III REFRESH...
COURSE #004 Distance Learning Individual Price $595COR Level III Refresher Course (Credits: 40 CLP) This course meets all the FAI requirements for the 5-day COR Refresher course granting 40 CLP credits toward COR re-certification for level II and level III personnel who have not been able to acquire he required 40 hours of training over the required two years. This course provides information on recent procurement changes, laws, and advanced c...
Finding Opportunites Early
Course Description The key to being successful in the Federal marketplace is to find and influence opportunities before the competition. We all know and want to do this, but how? Where and how do you find opportunities? The available commercial services listing opportunity are not the answer, you find out about an opportunity along with everyone else. The data is out there on the internet. This seminar will help you find opportunities before y...
Find Opportunites Early
Where do you find the business problems the government is trying to solve? The data is out there. Learn how and where to look for opportunites, potential teaming partners, and where not to spend your time and resources Become more efficient at researching and analyzing readily available data Be "smarter" than the competition
Government Customer Support Conference
Leaders of help desks, call centers, web service portals, and other touch points for Government’s internal end external customers will come together at the 11th Annual Government Customer Support Conference to redefine how our Government can deliver extraordinary service and achieve success during a time of great change. What to Expect Two full days of powerful insights, ideas and motivation in an intimate setting that facilitates making...
Getting ready for IPv6 - the first five steps
Even if your organization does not need to deploy IPv6 immediately, getting free training is step one! Impress your IT colleagues with the answers to questions like, "Why is DNS64 the IPv6 to IPv4 Babble Fish?" and "Why is /64 a typical subnet mask?" See five "how to" demonstrations: Setting up your DNS fast and securely with easy to use workflow wizards Running name servers over IPv6 Registering and delegating to IPv6 Setting up forward- and...
Knowledge Management
The Knowledge Management Conference and Exhibition has been the leading event for government knowledge management professionals for over a decade. The annual KM Conference and Exhibition brings together government and industry experts to discuss latest trends, technologies, best practices and more as it relates to knowledge management.
FREE Seminar: "Doing More with Less: Ac...
With budgets up in the air, continuing resolutions continuing, and a call to trim staff but maintain productivity, you need to keep the work moving with less time, less money, and less personnel. That's why Feith Systems is coming to DC to share the secrets of how to do more with less and still deliver results. Hyatt Regency Capitol Hill, Washington DC - Registration and Complimentary Breakfast begin at 830am. Join us on April 27th for a FREE...
FREE Seminar: "Achieve Your Workflow Go...
Join Feith Systems April 27th in DC for free for an exclusive Washington Workflow Workshop! One day only, see the latest applications in maximizing your Business Processes, best practices in streamlining your Workflow, creating lasting efficiency in Operational Control, and so much more. Hyatt Regency Capitol Hill, Washington DC - Registration and Complimentary Breakfast begin at 830am. Feith Workflow Workshop Presents a FREE Event Achieve Yo...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.