Wings, Warriors, and the Walter Reed So...
Happy Holidays! There is nothing better than eating a bowl of chili on a cool December evening…. except when it is ALL YOU CAN EAT chili, wings and Nachos AND the proceeds go the Army’s Walter Reed Society. Join dcTechSource.com in a fun filled evening of great wings, hot chili, cold beers, and blatant networking, all while raising money for the Walter Reed Society. You know about Walter Reed. Well the Society provides special ser...
December 16, 2009
Organizer:
dcTechSource Location:
Arlington, VA
Computer Forensics for the Security Pra...
Accidental/intentional destruction of data, hardware failure or cyber attacks can happen at any time and you may be called upon to respond, investigate, document, handle, and escalate the analysis to a formal investigation. In this two day hands-on workshop, you'll consider when investigations are appropriate or warranted, and learn how and when to recover lost or deleted information from the Recycler Bin (Info2 file), Disk Directory/Master-Fi...
Emerging Trends in Crime and Attackers...
The “enemy” in today’s society is able to conduct their intelligence collections and attacks from any cyber-café in the world – miles or oceans away from their target by just using the Internet. Criminal groups have been using online methods and the Internet to further their business operations and goals. Targets of their activities have included US businesses and US government entities. The Internet has opened numerous avenues for perpetrator...
Open Source Tools and Applications for...
The Open Source Tools and Applications for Vulnerability Assessments Workshop will provide you with the training, skills, and resources to use a collection of planning, analysis, and 3D Visualization applications enabling you to improve the analysis and results of a vulnerability assessment, assessment reports, and security program management.
Computer Forensics for Managers Workshop
Both federal agencies and private companies are vulnerable to cyber attacks. Oftentimes, the attackers are targeting sensitive information for theft, which can lead to the compromise of data ranging from organizational strategies and classified intelligence, to financial, employee and customer records. The executives in charge have a fiduciary and public responsibility to protect sensitive data AND to preserve records that may facilitate disco...
Introduction to Operations Security (OP...
This workshop provides you with an overview of the OPSEC Process to protect sensitive and critical activities. You will understand the OPSEC process and techniques to protect critical activities within your organization and focus on the application of the OPSEC process within a government organization or private industry.
Anti-Terrorism and Force Protection Cou...
This 2-day seminar and workshop is designed to provide students with an advanced overview of the Antiterrorism Countermeasures and Force Protection Techniques used by the Department of Defense (DoD) and the civilian federal government. Recognizing this effort, many state and local government officials and corporations are looking to these standards to help them protect their critical infrastructure assets
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.