Security Training


IT Skills and Salary Report 2011 from Global Knowledge

March 30, 2011 Added by:Global Knowledge

While the global economic recession of recent years has largely been replaced by a lethargic recovery, workers continue to be impacted by job loss, reduction in salary, or job change. IT professionals have felt the impact of these economic tremors along with the rest of their colleagues...

Comments  (0)


IT Job Market Intel - Cutting Through the Fog

March 17, 2011 Added by:Mike Meikle

Once again, IT pros are going to have to develop significant business skills to set themselves apart from their mono-technical peers. While you may be able to capitalize on the Hot Skill Du Jour for a while, and we all have, it will continue to pay diminishing returns...

Comments  (0)


Does Your Company Have a Security Awareness Training Program?

March 10, 2011 Added by:Allan Pratt, MBA

Topics to discuss include good security practices such as making regular back-ups, encrypting sensitive data, turning off computers before leaving the office, carefully disposing of storage devices, and not installing illegal copies of software on company computers or devices...

Comments  (6)


RSA 2011 Conference Notes from Anton Chuvakin

March 05, 2011 Added by:Anton Chuvakin

Most “analyst takeaways” from were about cloud and mobility. I heard a fun opinion on IT consumerization: if you deal with the security of employee devices by banning them, you will make your organization unattractive to the best employees – thus increasing, not reducing, your business risk...

Comments  (0)


Using NLP to Go Beyond “SMART” Goals

March 04, 2011 Added by:Brad Bemis

SMART goals are supposed to be Specific, Measurable, Achievable, Realistic, and Time-based. That seems pretty reasonable, so what’s missing? Neuro-Linguistic Programming introduces the concept of using a ‘well-formed’ outcome process – a process that makes your SMART goals even smarter...

Comments  (1)


Security BSides, RSA: Things That Get Lost in the Shuffle

February 20, 2011 Added by:Rafal Los

Micro-focusing on the events and technology drivers that impact the state of software security is tough - especially when the hot topic of the day is cloud, cloud, cloud, "data exfiltration" - which we all know is code for WikiLeaks - and... oh, right, 'Cyber War'...

Comments  (2)


Competence-in-Depth: A Working Model

February 14, 2011 Added by:Brad Bemis

Information security is an incredibly diverse field. It is also a relatively new profession if you discount its long history in government and academia. As a developing professional discipline there are a number of challenges – we still have a lot of growing up and getting smart to do...

Comments  (0)


Making Security Suck Less

December 15, 2010 Added by:Pete Herzog

And so it begins. Some important changes to the current security model necessary to actually improve security have been now made available to the public in the form of OSSTMM 3. Maybe this isn't "the" answer but it's a new road to take us off this rugged path and bring us much farther with much less troubles. If you've read it you'll know that taking on this new model will require big changes in h...

Comments  (21)


Five Important Fraud Investigation Interview Tips

December 03, 2010 Added by:Thomas Fox

A successful investigation interview isn’t just a question and answer period. Asking good questions is just a small piece of a very big puzzle. To get the most out of your fraud investigation interviews, remember these 5 important steps...

Comments  (0)


LISA 2010: Sysadmins Discuss Virtual Mentorship

November 23, 2010 Added by:Jamie Adams

There are system administrators focused on different operating systems, cluster specialists, network administrators, database administrators, system virtualization managers, and even security administrators. Our field also seems to have as many specialists as the medical community...

Comments  (0)


US Government is Headhunting Cyber Warriors

November 20, 2010 Added by:Headlines

Even if there were a systemic change in the way of we prepare kids for technology careers, the US would still be a generation behind nations in Asia and Europe. The result could be the loss of our competitive edge in the marketplace, and result in the loss of our status a cyber superpower...

Comments  (0)


A Review of Real World Security Professional Certification

November 18, 2010 Added by:J. Oquendo

The RWSP is the one exam that separates the Pros from the Joes. Unlike conventional exams, there is no method for anyone to cram information for the sake of passing this exam. Unlike the OSCP, OSCE, CPT and CEPT exams, you will not only be put to the test, you will be frustrated...

Comments  (2)


What’s Another Certification Worth?

November 15, 2010 Added by:Global Knowledge

The answer is it depends, but with a bit of planning and a willingness to look outside your comfort zone, you can increase your earning potential. Data from our 2010 IT Salary and Skills Survey shows at least a 5% increase in salary for IT pros...

Comments  (0)


CFP for RSA Conference 2011 Metricon 5.5 Event

November 07, 2010 Added by:Anton Chuvakin

Mini-MetriCon 5.5 is a forum for quantifiable approaches and results to problems afflicting information security today, with a bias towards specific approaches that demonstrate the value of security metrics with respect to a security-related goal...

Comments  (0)


Will A Security Conference Help Your Company?

November 04, 2010 Added by:Lee Munson

Why send your IT staff to a conference? Security conferences are a place where both white and black hat hackers come out to show what they have discovered over the past year. The one thing that a hacker cares about more than money in this world is respect from his peers...

Comments  (0)


Methodologies: Cleaning the Mental Gutters

October 25, 2010 Added by:Bill Wildprett, CISSP, CISA

My challenge and task is to apply this modality of critical thinking to the domains of information security, along with that of the OSSTMM. Like more physical exercise will clean the arterial plaque from your personal system, it’s important to floss your brain and defrag your mind...

Comments  (1)

Page « < 36 - 37 - 38 - 39 - 40 > »