Security Training


DoD Primed to Hire IT Security Professionals

October 23, 2010 Added by:Global Knowledge

Depending on the job role, Department of Defense Directive 8570 provides guidance and procedures for the training, certification, and management of all government employees who conduct Information Assurance functions in assigned duty positions...

Comments  (0)


Seminar to Feature ISECOM's OSSTMM v3

October 13, 2010 Added by:Anthony M. Freed

The OSSTMM is a peer-reviewed methodology for performing security tests and metrics divided into five channels: information and data controls, fraud and social engineering, computer and telecommunications networks, wireless devices, physical security access controls, and security processes...

Comments  (1)


National Cyber Security Awareness Month Offer

October 07, 2010 Added by:Global Knowledge

Cyber security is an important subject year-round, but Global Knowledge is joining National Cyber Security Awareness Month to help draw attention to the growth of Internet-based crime and the need of all organizations to protect and defend their networks and cyberspace...

Comments  (0)


Infosec Careers: Gartner-Heads vs Packet-Heads

October 05, 2010 Added by:Anton Chuvakin

How do you plot your course through that passion without losing your mind and then switching careers? And how do you stay on your path without diffusing your efforts, losing focus and becoming aware of everything and an expert in nothing? There are two paths...

Comments  (0)


Consumerization of IT and Enterprise Evolution

October 05, 2010 Added by:Phil Agcaoili

We have a problem with new disruptive technology and we need to treat all endpoint systems as hostile. New consumer technology that's brought into the workplace (a trend known as consumerization of IT), the consumer use of free or low-cost cloud services for the connected online life, and the enterprise shift towards the cloud for vertical business applications are rapidly affecting the way worker...

Comments  (0)


Effective Cyber Security Career Development

September 28, 2010 Added by:Jon Stout

For technical expertise such as Cyber Security, no matter how hard the government tries, it has failed to recruit the required number of Cyber warriors. The government is just too slow and inefficient to respond to the rapidly changing needs of the marketplace...

Comments  (0)


Infosec Blogging Develops Professional Branding

September 19, 2010 Added by:Mike Meikle

Publishing my own articles and contributing to others is a key component of my self promotion or personal branding strategy. As most IT professionals have seen, having the same certifications as the rest of your colleagues does very little to provide the critical market differentiation...

Comments  (2)


Hacked? Check Out The Computer Forensics Show

September 15, 2010 Added by:Infosec Island Admin

The rate of fraud, abuse and criminal activity on IT systems by hackers, private contractors and even employees is increasing exponentially. For some companies, it is not a question if one of their computers will be used as evidence in a legal matter, it is a question of when...

Comments  (1)


File Carving from a Partially Wiped Evidence Disk

September 13, 2010 Added by:Bozidar Spirovski

On the previous article on proper information disposal, a visitor suggested that Darik's Boot and Nuke can be used for emergency evidence destruction. While it is quite correct, DBAN takes time to finish. So, what evidence can be recovered from a disk on which someone interrupted the DBAN process?

Comments  (2)


Filling the Infosec Talent Gap in the United States

September 07, 2010 Added by:Carter Schoenberg

The NSA and DHS have a jointly funded what is essentially an ROTC program. The problem exists where the graduates are pretty much all farmed out to DoD and DHS. So what about CIP in the private sector? The power plants, state government, and first responder communication infrastructures?

Comments  (5)


Intelligence and Cyber Command Job Opportunities

August 31, 2010 Added by:Jon Stout

The Cyber Command reorganization and consolidation creates significant employment opportunities for Cyber Security professionals and has the potential to allow for more rapid facilitation of high level security clearances. Training and certification is now a mandatory requirement for employment...

Comments  (0)


Secure Information Disposal Procedures

August 30, 2010 Added by:Bozidar Spirovski

Your organization bought computers, used them and now it's time to discard them. Most old hardware is donated to schools or is simply auctioned off. All that data contains a lot of confidential information, and it is essential that such data is properly erased so it cannot be recovered...

Comments  (0)


Teaching Computer Forensics

August 24, 2010 Added by:Mark Bennett

In the government sector, cyber attacks on government agencies and contractors, originating from China, have proved difficult to suppress. Incident response and mitigation, class action lawsuits, and fines place remediation costs in the billions of dollars...

Comments  (0)


Computer Forensics Evidence Collection

August 23, 2010 Added by:Bozidar Spirovski

Following up on A Computer Forensics Process Tutorial, here is a step-by-step tutorial on how to process a suspect computer to obtain dumps of RAM memory and Disk Drive using Helix Forensic CD...

Comments  (1)


A Computer Forensics Process Tutorial

August 16, 2010 Added by:Bozidar Spirovski

Computer forensics is currently a very popular term, and brings an aura of certain magical steps that forensics teams use. In reality, the computer forensics just job is a standard process. Here is a simple tutorial on what is involved in computer forensics...

Comments  (3)


Cutting Edge Cyber Security Training

August 09, 2010 Added by:Anthony M. Freed

It seems like every day we hear about another company losing important customer information or data, like social security numbers, to hackers or security breaches. Companies like to be in the news, but not with headlines like this...

Comments  (0)

Page « < 37 - 38 - 39 - 40 - 41 > »