Product and Services Finder

Security Training

    
<  1  2  3  4  5  6  7  >
CGI  Our 68,000 professionals in more than 40 countries worldwide provide end-to-end IT services—including IT consulting, systems integration, application management, infrastructure services and BPO—to facilitate the ongoing...
 
Enterprise security services With CGI’s enterprise risk management services, clients have the practical steps they need to protect their operations.
PTC Security Training Academy  This course meets the requirements of the department of professional regulation as outline in the detective act. It covers security fundamentals for new officers and provides a review for experience employees, who want to...
Security Guard Card Training  We are proud to be one of only two security training centers listed with the California EDD for Security Guard Training. We are a Postsecondary Educational Training Center listed with the State of California. We have the...
MIS Training Institute  Founded in 1978, MIS Training Institute is the international leader in audit and information security training, with offices in the USA, UK, and Asia. MIS' expertise draws on experience gained in training more than...
 
Advanced Audit Techniques for Windows 2000/2003 and Active Directory Networks -ASO402 In this three-day, hands-on seminar you will gain the skills you need to perform a detailed audit of a Windows® 2000/2003 and Active Directory network....
 
Fundamentals of Information Security - ISG101 This three-day primer will guide you through the basics of information security in today's internetworked, business and home environment. Beginning with...
 
InterNetwork Defense  InterNetwork Defense (IND) is the premier provider of Information Security Training and Consulting Services in the Mid-Atlantic region. Founded in 1997 and headquartered in suburban Philadelphia, we are the Delaware...
 
CISSP for Security Professionals Companies invest substantially in information assets, including technology, architecture and process. How can protection of these assets be ensured? Only...
 
Security Policy Management Sound security practices begin with planned security policies. A security policy is simply a formal statement of the proper use and maintenance of...
Blue Steel Security inc.   Blue Steel Security Guard Training School is a certified (NYSDCJS) school that has a New York State certified training instructor on site. Blue Steel Security Guard Training School (BSSGTS) is dedicated to transforming...
Cygnos IT Security  Cygnos Corporation, know as Cygnos I.T. Security, was launched in 1998 with the focus to provide comprehensive IT Services to the Ontario and Quebec marketplaces. Over the past six years, Cygnos has evolved into one of...
 
Hacker Tools & Methodologies: Securing Wireless Networks This course is the first of its kind offered in Canada. Participants will learn how hackers infiltrate wireless systems and what can be done to stop them....
 
Hacker Tools & Methodologies: Understanding and Countering Attacks Hackers prepare for a serious attack the way Generals prepare for war. They spend months collecting intelligence about their target and use this knowledge...
Professional Computing Security Academy  Professional Computing Security Academy specializes in securing the IT environment for Small and Medium Businesses with customizable training and service packages at an affordable pricing structure. PCSA brings together...
 
Data Protection (DP601) This 6-hour lab session details the 'HowTo' of common InfoSec processes. Content is tailored to participants needs. Topics include (but not limited to)...
 
Network Protection (NP401)(NP501) In these two 6-hour lab sessions you will setup the major security areas in a Win2000/XP/2003 LAN connected to the internet. Emphasis on the following...
 
Security Awareness Incorporated  Security Awareness Incorporated delivers the most comprehensive line of awareness training materials available. From posters to web-based e-learning courses and everything in between. Our clients span across every...
 
Protect ITâ„¢ - Security Awareness Workshop Holding a workshop is an excellent way to provide interaction and a personal touch to your awareness training. Our workshop is designed to enable a person...
 
S.T.A.R.T.® - Security Training, Awareness & Reference Tool An effective way to provide information to your staff is through a company intranet. It allows users to browse large amounts of information and learn at...
 
Talisker Security Wizardry  The Talisker site was formed in 1999 as, built and maintained by Talisker as a hobby, moving from being NetworkIntrusion.co.uk to SecurityWizardry. The site quickly grew, becoming ever more popular. It is widely...
 
Ethical Hacking Training Ethical Hacking courses are designed to teach the security professional the tools and techniques of his/her adversary, using the philosophy 'it takes a...
 
Windows Security Training Up until the advent of Windows Server 2003 most Microsoft products were by default insecure. There are are many ways to offer security to Windows from...
 
Offensive Security   With course material based off of the same years of experience in real world penetration testing that has created the incredibly successful BackTrack Linux distribution, and then delivered by renowned security experts,...
Eno's Internet Security  Eno, a worldwide leader in corporate blended learning solutions, has assembled a full complement of products and services to help you align corporate knowledge with business objectives. A pioneer in learning, Eno has...
 
Certified Information Systems Security Professional The Certified Information Systems Security Professional (CISSP) is a very difficult certification to achieve and is considered a global standard that proves...
 
Security+ certification This learning path addresses the topics and concepts that learners need to know in order to obtain Security+ certification. Security+ certification is an...
SecureNode  Founded in 2000 by a team of Internet security experts, SecureNode is headquartered in the heart of Silicon Valley, California. SecureNode is the leading provider of Information Security Education, Information Security...
 
CISSP Training CISSP certification is only available to those qualified candidates who successfully pass the examination created by the international Information Systems...
 
CNSE-1 (Certified Network Security Engineer- Level 1) This program is designed to equip the student with the essential skills, knowledge and experience of fundamentals of network security. In addition, students...
 
<  1  2  3  4  5  6  7  >
More

Security Training Research Library

Decreasing Energy Consumption through Energy Management Solutions
CGI
Given all the hype and opportunities for improvement in becoming “green,” many organizations are bombarded with a myriad of energy management solutions that promise a panacea of results. This paper helps cut through the clutter by providing background on the current definitions and drivers for energy management and outlines recommendations for how to approach a project. It discusses CGI's energy ...
 
VoIP Security Vulnerabilities
Dell SecureWorks
Since the dawn of time, humans have tried to communicate with eachother. As languages and dialects prospered, the forms of communication became more advanced by using letters in various alphabets and writing messages on papers or letters. From the Caeser cipher that Julius Caesar used where letters in encrypted messages were actually three letters off, to the Nazis in WWII who built and used the ...
 
Top 10 Information Security Breaches & Blunders of 2009
Perimeter E-Security
2010 is upon us. I am amazed that it has been a decade since all the fear and speculation of Y2K. Take a moment to review your personal technological transformation in the last 10 years. Were you using a mobile phone 10 years ago? Could you live without it today? How about how far the Internet has come and your reliance upon it? Did you ever imagine you would use technologies like Facebook and ...
 
Risk Management and Security
Risk Watch International
RISK MANAGEMENT AND SECURITY Author: Caroline R. Hamilton INFORMATION RISK MANAGEMENT IN A RISKY ENVIRONMENT Our society depends on fast, accurate transmission of information. Everything from e-mail, stock quotes credit ratings, bank balances, travel arrangements, even the weather, are all transacted by computer systems. Wh ten years ago, employees worked with dumb terminals that performed a ...
 
Enabling security
Cenzic, Inc.
New security vulnerabilities are found almost daily. When they are, the affected software must be retrofitted with an appropriate patch while companies fend off the wrath of customers. Applications have become the most fertile ground for attackers to ply their trade -- seeking out the seemingly innocuous features and utilities in today's complex systems that can give them unauthorized access. ...
 

Security Training Video

Information security begins with Cyber Authentication Access Smart, LLC What do you get when you purchase the Power LogOn Administrator Starter Kit from Access Smart. Information security begins with cyber access control, and ...
 
Atomic Training Company Overview Atomic Training
 
Security Training Fiserv Inc Products

Security Training News

Security Training AvaLAN Wireless Products
Security Training Centage Information
Copyright © 2014, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.