Items Tagged with "Training"


0dc5fdbc98f80f9aaf2b43b8bc795ea8

What’s Another Certification Worth?

November 15, 2010 Added by:Global Knowledge

The answer is it depends, but with a bit of planning and a willingness to look outside your comfort zone, you can increase your earning potential. Data from our 2010 IT Salary and Skills Survey shows at least a 5% increase in salary for IT pros...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Get Your Free All Access RSA Conference Pass

November 04, 2010 Added by:Infosec Island Admin

Join us in San Francisco as President Bill Clinton, 42nd President of the United States and founder of the William J. Clinton Foundation, concludes RSA's 20th Anniversary conference as keynote speaker. Infosec Island is a Silver Sponsor and Media Partner for this event...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

Will A Security Conference Help Your Company?

November 04, 2010 Added by:Lee Munson

Why send your IT staff to a conference? Security conferences are a place where both white and black hat hackers come out to show what they have discovered over the past year. The one thing that a hacker cares about more than money in this world is respect from his peers...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

National Cyber Security Awareness Month Offer

October 07, 2010 Added by:Global Knowledge

Cyber security is an important subject year-round, but Global Knowledge is joining National Cyber Security Awareness Month to help draw attention to the growth of Internet-based crime and the need of all organizations to protect and defend their networks and cyberspace...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Reining In Enterprise Mobile Computing Risks

October 07, 2010 Added by:Rebecca Herold

As demonstrated over and over again over the past several years, mobile computing devices and storage media present a huge risk to business and personal information. It is vital that an effective mobile computing device and storage media security and privacy management program is in place...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Effective Cyber Security Career Development

September 28, 2010 Added by:Jon Stout

For technical expertise such as Cyber Security, no matter how hard the government tries, it has failed to recruit the required number of Cyber warriors. The government is just too slow and inefficient to respond to the rapidly changing needs of the marketplace...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Infosec Blogging Develops Professional Branding

September 19, 2010 Added by:Mike Meikle

Publishing my own articles and contributing to others is a key component of my self promotion or personal branding strategy. As most IT professionals have seen, having the same certifications as the rest of your colleagues does very little to provide the critical market differentiation...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Hacked? Check Out The Computer Forensics Show

September 15, 2010 Added by:Infosec Island Admin

The rate of fraud, abuse and criminal activity on IT systems by hackers, private contractors and even employees is increasing exponentially. For some companies, it is not a question if one of their computers will be used as evidence in a legal matter, it is a question of when...

Comments  (1)

E973b16363b3de77b360563237df7e32

Computer Forensics Evidence Collection

August 23, 2010 Added by:Bozidar Spirovski

Following up on A Computer Forensics Process Tutorial, here is a step-by-step tutorial on how to process a suspect computer to obtain dumps of RAM memory and Disk Drive using Helix Forensic CD...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

SOX Compliance Evolution to GRC Conference

August 17, 2010 Added by:Infosec Island Admin

The SOX Compliance conference series is targeted at senior level executives to maintain an intimate atmosphere for the delegates. Since this is not a vendor driven conference, the higher level focus allows the delegates to network with their industry peers and speakers...

Comments  (0)

E973b16363b3de77b360563237df7e32

A Computer Forensics Process Tutorial

August 16, 2010 Added by:Bozidar Spirovski

Computer forensics is currently a very popular term, and brings an aura of certain magical steps that forensics teams use. In reality, the computer forensics just job is a standard process. Here is a simple tutorial on what is involved in computer forensics...

Comments  (3)

6d117b57d55f63febe392e40a478011f

Cutting Edge Cyber Security Training

August 09, 2010 Added by:Anthony M. Freed

It seems like every day we hear about another company losing important customer information or data, like social security numbers, to hackers or security breaches. Companies like to be in the news, but not with headlines like this...

Comments  (0)

959779642e6e758563e80b5d83150a9f

The Recession and Your Professional Skill Set

August 06, 2010 Added by:Danny Lieberman

In order to really take something of value out of the recession you need to look outward and challenge a lot of your base assumptions – it doesn’t really matter if you are a self-employed security consultant or a salaried IT sales professional...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Get the Most Out of Security Awareness Training

August 05, 2010 Added by:Brent Huston

The whole idea is to turn your personnel into net cops. If you can do that, you can turn your own people into the best IDS system there is, and for a lot less money than you would spend on machines or hosted services…or for cleaning up a security incident...

Comments  (1)

E66d48d7b227e7845b73d43eb1a06fcb

Rare Opportunity: CISSP Classes with Shon Harris

July 31, 2010 Added by:Roman Zeltser

CISSP exam is considered one of the most difficult since you have to be ready to answer 250 questions within 6 hrs with only small breaks at your own discretion. It took me 4 months of hard work to get ready for exam...

Comments  (2)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Top 10 Skills in Demand in 2010

May 11, 2010 Added by:Global Knowledge

In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at the end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" The skills listed by respondents include the perennial favorites, such as security, network administration, and Windows administration.

Comments  (0)

Page « < 17 - 18 - 19 - 20 - 21 > »