Connecting App Service to Data and Othe...
Part four of our four-part course, Deploy and scale enterprise web apps with Azure Once you have your app running in Microsoft Azure, you’ll want to take full advantage of Azure Key Vault to create date encryption keys and control access to tokens, passwords, certificates, API keys, and other secrets. Strengthen and streamline your data encryption by sharpening your knowledge of: Creating an Azure Database for MySQL server. Connec...
A Clear View Into Great Governance: Tra...
Local government organizations are facing more laborious challenges than ever before to conduct business efficiently while serving their communities, all of which is heightened by the constraints of a global pandemic. How can municipalities and organizations keep the pace of good governance, while keeping simplicity, efficiency and transparency in the forefront? Join Governing and iCompass, a Diligent brand, for a webinar on Tuesday, June 8 at...
Secure and Expand Agency Communications...
Join Wickr and Carahsoft for a panel discussion as we deep dive into how the expansion of communication in the new virtual era has exposed large attack surfaces for government agencies. We'll discuss what securing agency communications looks like and why security and encryption need to be at the forefront, lessons learned from the SolarWinds breach, and best practices around Zero Trust and mitigating risk. During this live webinar, you will le...
Introduction to Governance and Complian...
Course Details Join this training to get an overview of the services that you can use to help meet compliance and governance controls in the Amazon Web Services (AWS) Cloud. You’ll discover the fundamental cloud security concepts, including access control, data encryption methods, incident response, and security for network access to AWS resources. Topics Covered: In this course, you will learn to: Identify and describe the security ben...
Modernize PC Management with Unified En...
Microsoft made a strategic investment in mobilizing the Windows operating system (OS) by building it to function like a mobile OS, like those made by Apple and Google. To make the most of these new capabilities, Microsoft requires customers to move to a new cloud-based management framework for their devices. This approach is called modern management. Modern management introduced numerous features and new technologies into the OS that are avail...
DHS Workshop: Red Hat OpenShift Foundations
Stringent IT security and compliance requirements across the United States government can cause challenges as civilian agencies seek to adapt with evolving citizen demands and expectations. Red Hat OpenShift version 4.6 includes numerous enhancements to support government agencies as they look to embrace cloud, containers and DevSecOps practices. Join Red Hat's Senior Solutions Architect, Russell Pavlicek, for this hands-on workshop to learn h...
Understanding Encryption Export Control...
Exporters are often surprised to learn that their products with common, standards-based, or even open source encryption components are subject to export controls; learn how to understand and apply EAR controls on encryption, and the critical steps of classification and license determination. In everyday business and leisure, the use of encryption is nearly ubiquitous. From smartphones to smart refrigerators, enterprise software to network swit...
OpenShift v4: Enterprise Kubernetes Renewed
Red Hat OpenShift v4 includes numerous enhancements to support government agencies as they look to embrace cloud, containers and DevSecOps practices. Agencies run some of the most mission critical workloads in the world and their unique requirements help set the standard for OpenShift’s security and compliance. Join Red Hat experts and learn how to leverage the power of Red Hat OpenShift version 4 to build, deploy, scale and automate app...
OpenShift v4: Enterprise Kubernetes Renewed
As government agencies increasingly embrace cloud, containers and DevOps practices, they are looking for more efficient and effective technologies to assist them in building mission-critical solutions, while delivering stakeholder value. Join Red Hat experts for an informative webinar to discover how Red Hat OpenShift, a leading hybrid cloud, enterprise-Kubernetes application platform, can power your agency to: Simplify lifecycle management a...
Software / Encryption Export Controls W...
ECTI Presents: TWO Webinars BUNDLED for a discounted price (NEARLY 25% OFF) 1. All About Software Export Controls – February 3, 2021 at 1:00 pm 2. Understanding Encryption Export Controls – March 16, 2021 at 1:00 pm POWER PACK DETAILS: Software & Encryption Export Controls You won’t want to miss these two webinars IF: You sell, deploy, or develop software outside the US – or just need a better understanding of HOW t...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.