Security Training

0dc5fdbc98f80f9aaf2b43b8bc795ea8

DoD Primed to Hire IT Security Professionals

October 23, 2010 Added by:Global Knowledge

Depending on the job role, Department of Defense Directive 8570 provides guidance and procedures for the training, certification, and management of all government employees who conduct Information Assurance functions in assigned duty positions...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Seminar to Feature ISECOM's OSSTMM v3

October 13, 2010 Added by:Anthony M. Freed

The OSSTMM is a peer-reviewed methodology for performing security tests and metrics divided into five channels: information and data controls, fraud and social engineering, computer and telecommunications networks, wireless devices, physical security access controls, and security processes...

Comments  (1)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

National Cyber Security Awareness Month Offer

October 07, 2010 Added by:Global Knowledge

Cyber security is an important subject year-round, but Global Knowledge is joining National Cyber Security Awareness Month to help draw attention to the growth of Internet-based crime and the need of all organizations to protect and defend their networks and cyberspace...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Infosec Careers: Gartner-Heads vs Packet-Heads

October 05, 2010 Added by:Anton Chuvakin

How do you plot your course through that passion without losing your mind and then switching careers? And how do you stay on your path without diffusing your efforts, losing focus and becoming aware of everything and an expert in nothing? There are two paths...

Comments  (0)

8845ac2b3647d7e9dbad5e7dd7474281

Consumerization of IT and Enterprise Evolution

October 05, 2010 Added by:Phil Agcaoili

We have a problem with new disruptive technology and we need to treat all endpoint systems as hostile. New consumer technology that's brought into the workplace (a trend known as consumerization of IT), the consumer use of free or low-cost cloud services for the connected online life, and the enterprise shift towards the cloud for vertical business applications are rapidly affecting the way worker...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Effective Cyber Security Career Development

September 28, 2010 Added by:Jon Stout

For technical expertise such as Cyber Security, no matter how hard the government tries, it has failed to recruit the required number of Cyber warriors. The government is just too slow and inefficient to respond to the rapidly changing needs of the marketplace...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Infosec Blogging Develops Professional Branding

September 19, 2010 Added by:Mike Meikle

Publishing my own articles and contributing to others is a key component of my self promotion or personal branding strategy. As most IT professionals have seen, having the same certifications as the rest of your colleagues does very little to provide the critical market differentiation...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Hacked? Check Out The Computer Forensics Show

September 15, 2010 Added by:Infosec Island Admin

The rate of fraud, abuse and criminal activity on IT systems by hackers, private contractors and even employees is increasing exponentially. For some companies, it is not a question if one of their computers will be used as evidence in a legal matter, it is a question of when...

Comments  (1)

E973b16363b3de77b360563237df7e32

File Carving from a Partially Wiped Evidence Disk

September 13, 2010 Added by:Bozidar Spirovski

On the previous article on proper information disposal, a visitor suggested that Darik's Boot and Nuke can be used for emergency evidence destruction. While it is quite correct, DBAN takes time to finish. So, what evidence can be recovered from a disk on which someone interrupted the DBAN process?

Comments  (2)

7ce032c184c593a533f07004162c53bb

Filling the Infosec Talent Gap in the United States

September 07, 2010 Added by:Carter Schoenberg

The NSA and DHS have a jointly funded what is essentially an ROTC program. The problem exists where the graduates are pretty much all farmed out to DoD and DHS. So what about CIP in the private sector? The power plants, state government, and first responder communication infrastructures?

Comments  (5)

98180f2c2934cab169b73cb01b6d7587

Intelligence and Cyber Command Job Opportunities

August 31, 2010 Added by:Jon Stout

The Cyber Command reorganization and consolidation creates significant employment opportunities for Cyber Security professionals and has the potential to allow for more rapid facilitation of high level security clearances. Training and certification is now a mandatory requirement for employment...

Comments  (0)

E973b16363b3de77b360563237df7e32

Secure Information Disposal Procedures

August 30, 2010 Added by:Bozidar Spirovski

Your organization bought computers, used them and now it's time to discard them. Most old hardware is donated to schools or is simply auctioned off. All that data contains a lot of confidential information, and it is essential that such data is properly erased so it cannot be recovered...

Comments  (0)

09e5dbdf8a3bd6dccce5621459b11e26

Teaching Computer Forensics

August 24, 2010 Added by:Mark Bennett

In the government sector, cyber attacks on government agencies and contractors, originating from China, have proved difficult to suppress. Incident response and mitigation, class action lawsuits, and fines place remediation costs in the billions of dollars...

Comments  (0)

E973b16363b3de77b360563237df7e32

Computer Forensics Evidence Collection

August 23, 2010 Added by:Bozidar Spirovski

Following up on A Computer Forensics Process Tutorial, here is a step-by-step tutorial on how to process a suspect computer to obtain dumps of RAM memory and Disk Drive using Helix Forensic CD...

Comments  (1)

E973b16363b3de77b360563237df7e32

A Computer Forensics Process Tutorial

August 16, 2010 Added by:Bozidar Spirovski

Computer forensics is currently a very popular term, and brings an aura of certain magical steps that forensics teams use. In reality, the computer forensics just job is a standard process. Here is a simple tutorial on what is involved in computer forensics...

Comments  (3)

6d117b57d55f63febe392e40a478011f

Cutting Edge Cyber Security Training

August 09, 2010 Added by:Anthony M. Freed

It seems like every day we hear about another company losing important customer information or data, like social security numbers, to hackers or security breaches. Companies like to be in the news, but not with headlines like this...

Comments  (0)

Page « < 37 - 38 - 39 - 40 - 41 > »