Items Tagged with "Training"


What’s Another Certification Worth?

November 15, 2010 Added by:Global Knowledge

The answer is it depends, but with a bit of planning and a willingness to look outside your comfort zone, you can increase your earning potential. Data from our 2010 IT Salary and Skills Survey shows at least a 5% increase in salary for IT pros...

Comments  (0)


Get Your Free All Access RSA Conference Pass

November 04, 2010 Added by:Infosec Island Admin

Join us in San Francisco as President Bill Clinton, 42nd President of the United States and founder of the William J. Clinton Foundation, concludes RSA's 20th Anniversary conference as keynote speaker. Infosec Island is a Silver Sponsor and Media Partner for this event...

Comments  (0)


Will A Security Conference Help Your Company?

November 04, 2010 Added by:Lee Munson

Why send your IT staff to a conference? Security conferences are a place where both white and black hat hackers come out to show what they have discovered over the past year. The one thing that a hacker cares about more than money in this world is respect from his peers...

Comments  (0)


National Cyber Security Awareness Month Offer

October 07, 2010 Added by:Global Knowledge

Cyber security is an important subject year-round, but Global Knowledge is joining National Cyber Security Awareness Month to help draw attention to the growth of Internet-based crime and the need of all organizations to protect and defend their networks and cyberspace...

Comments  (0)


Reining In Enterprise Mobile Computing Risks

October 07, 2010 Added by:Rebecca Herold

As demonstrated over and over again over the past several years, mobile computing devices and storage media present a huge risk to business and personal information. It is vital that an effective mobile computing device and storage media security and privacy management program is in place...

Comments  (0)


Effective Cyber Security Career Development

September 28, 2010 Added by:Jon Stout

For technical expertise such as Cyber Security, no matter how hard the government tries, it has failed to recruit the required number of Cyber warriors. The government is just too slow and inefficient to respond to the rapidly changing needs of the marketplace...

Comments  (0)


Infosec Blogging Develops Professional Branding

September 19, 2010 Added by:Mike Meikle

Publishing my own articles and contributing to others is a key component of my self promotion or personal branding strategy. As most IT professionals have seen, having the same certifications as the rest of your colleagues does very little to provide the critical market differentiation...

Comments  (2)


Hacked? Check Out The Computer Forensics Show

September 15, 2010 Added by:Infosec Island Admin

The rate of fraud, abuse and criminal activity on IT systems by hackers, private contractors and even employees is increasing exponentially. For some companies, it is not a question if one of their computers will be used as evidence in a legal matter, it is a question of when...

Comments  (1)


Computer Forensics Evidence Collection

August 23, 2010 Added by:Bozidar Spirovski

Following up on A Computer Forensics Process Tutorial, here is a step-by-step tutorial on how to process a suspect computer to obtain dumps of RAM memory and Disk Drive using Helix Forensic CD...

Comments  (1)


SOX Compliance Evolution to GRC Conference

August 17, 2010 Added by:Infosec Island Admin

The SOX Compliance conference series is targeted at senior level executives to maintain an intimate atmosphere for the delegates. Since this is not a vendor driven conference, the higher level focus allows the delegates to network with their industry peers and speakers...

Comments  (0)


A Computer Forensics Process Tutorial

August 16, 2010 Added by:Bozidar Spirovski

Computer forensics is currently a very popular term, and brings an aura of certain magical steps that forensics teams use. In reality, the computer forensics just job is a standard process. Here is a simple tutorial on what is involved in computer forensics...

Comments  (3)


Cutting Edge Cyber Security Training

August 09, 2010 Added by:Anthony M. Freed

It seems like every day we hear about another company losing important customer information or data, like social security numbers, to hackers or security breaches. Companies like to be in the news, but not with headlines like this...

Comments  (0)


The Recession and Your Professional Skill Set

August 06, 2010 Added by:Danny Lieberman

In order to really take something of value out of the recession you need to look outward and challenge a lot of your base assumptions – it doesn’t really matter if you are a self-employed security consultant or a salaried IT sales professional...

Comments  (1)


Get the Most Out of Security Awareness Training

August 05, 2010 Added by:Brent Huston

The whole idea is to turn your personnel into net cops. If you can do that, you can turn your own people into the best IDS system there is, and for a lot less money than you would spend on machines or hosted services…or for cleaning up a security incident...

Comments  (1)


Rare Opportunity: CISSP Classes with Shon Harris

July 31, 2010 Added by:Roman Zeltser

CISSP exam is considered one of the most difficult since you have to be ready to answer 250 questions within 6 hrs with only small breaks at your own discretion. It took me 4 months of hard work to get ready for exam...

Comments  (2)


Top 10 Skills in Demand in 2010

May 11, 2010 Added by:Global Knowledge

In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at the end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" The skills listed by respondents include the perennial favorites, such as security, network administration, and Windows administration.

Comments  (0)

Page « < 17 - 18 - 19 - 20 - 21 > »