218 Results Found
Expert Hesham Mahmoud discusses the importance of cybersecurity, how to secure your IT infrastructure and detect the latest vulnerabilities and threats your organization might encounter. This webinar will cover the latest cybersecurity trends and how to react to data breaches. View the slide deck>
You have spent money on software and hardware, implemented best practices, and believe you are secure, right? You may have overlooked the weakest link: your employee. Many breaches occur as a result of an employee mistakenly clicking on a link or visiting a site that allows a virus to be unknowingly downloaded, giving hackers access to your network. Today, a well-trained workforce is a necessity and may even be your most important cybersecurity tool. In this webinar, security expert David Willson will discuss how many breaches have occurred and are occurring, the tools and techniques hackers use to trick employees into clicking on links or opening attachments, and how to prevent such behavior.
This video focuses on the roles and responsibilities of cybersecurity architecture and policy job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of cybersecurity data loss prevention engineers at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of governance, risk, and compliance job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of identity and access management job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of incident response and forensic analysis job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of penetration testing job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of secure devops and devsecops job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of secure software development job functions at successful cybersecurity organizations.
As an IT professional you deal day in and day out with securing operating systems, patching software, installing and configuring firewall and routers But what about the physical infrastructure? Do you understand how simple techniques can allow theft of your company resources? In this session we will discuss how to reduce the possibility of loss of data and equipment. Physical security may not be part of your job but you should be aware and having discussions with the personnel who are responsible. Or does Physical Security become one of your job responsibilities? Come to this session and learn about one of the most important and yet least thought about areas of security by IT professionals.
This cybersecurity white paper explores the origins and motivations of cyberwarfare, and provides actions you can take in response.
Experts agree that as long as there is data, there will be people trying to steal it. For every defense mechanism put in place, there is someone who will find a way to get around it. Constant vigilance, education of the workforce, and management support are all necessary to implement effective security policies. While a well-trained IT staff is key to protecting data, all employees must understand the importance of protecting company assets, including data.
A mobile phone is just like a small computer, that can be hacked. Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.
Despite a growing awareness and preparation for distributed denial-of-service (DDoS) attacks, the overall arc of DDoS attacks is not weakening, but actually gaining more attention from the companies and personnel who have experienced these threats first-hand.
The world of Incident Response is evolving. No longer do we focus on indicators of compromise; we now focus on attacker behavior. MITRE has turned attacker behaviors into a usable framework shared both on their website and on GitHub. MITRE provides the MITRE ATT&CK Navigator on GitHub which includes a complete mapping of all techniques and sub-techniques to help you understand the attacker’s behavior. The Navigator can be leveraged to optimize Incident Response, evolving your team from responsive to predictive response.
Cloud computing enables development teams to get applications into production faster. IT Service Management (ITSM) leaders must adopt new strategies and change existing processes or risk becoming a barrier to success. Cloud computing requires DevOps-the blending of development and operations with the goal of accelerating time-to-market and reducing time-to-value. The good news is that ITIL® is uniquely positioned to accelerate DevOps, but it requires changes to existing ITSM processes.
A Dynamic Multipoint Virtual Private Network (DMVPN) can be used with other networks like Multiprotocol Label Switching (MPLS), but streaming multicast is accomplished quite well using "Default" and "Data" Multicast Distribution Trees (MDTs) with MPLS.
This quick reference guide will highlight the various certification tracks to help you find your path through the EC-Council programs.
There are two types of networks: those that have been hacked and those that will be. To defend against hacks, cyber professionals can benefit greatly from ethical hacking programs.
The 2021 revised and updated version CISSP (Certified Information System Security Practitioner) certification exam will be released on May 1, 2021. This new version of the popular CISSP exam will include a modest revision and re-organization of previously included topics, but will integrate a significant number of new topics.
A feature common to IPSec Virtual Private Network implementations throughout the Cisco product line is Perfect Forward Secrecy (PFS). This optional additional component is now a default supplied configuration setting with the Adaptive Security Device Manager (ASDM) I...
Global Knowledge instructor Doug Notini discusses the benefits of our FIREWALL 2.0 - Deploying Cisco ASA Firewall Solutions course.
Mobile payment systems have solid promise to become the dominant means of financial transactions, but there are some hurdles to overcome. Apple Pay might be the dominant force today, but Google Wallet and others are not far behind. The year 2014 was when digital and mobile payment systems became known to a wide range of the general population, while only techno-enthusiasts were aware of the options in the four to five years prior. Thus, mobile payment systems are not new, but customers and merchants are quickly adopting them now that they have become popular. It still remains your responsibility to thoroughly research any mobile payment option before implementing it. It is your money and you have the burden of ensuring that it has the best protection possible.
Introducing new talent to an established organization can be difficult for many reasons. Seasoned employees may view the incoming new hires as "too green" or as not having the required skills to contribute in a meaningful way. They may worry about having to "waste time" teaching the newbies things that they should already know or get aggravated when the new employees are not familiar with "the way we do things around here." Additionally, it is difficult to know if the right new hires are being put into the right positions for their interests, abilities and talents. After all, a resume and an interview can only tell a hiring manager so much about the person they are bringing on board, and often talented employees are simply being put into a role that is not a good fit.
Whether you’re a current cyber pro looking to specialize, or new to the industry and looking for direction, Focal Point Academy’s lead cyber workforce expert can give you the insight needed to fast-track a career into today’s most in-demand cyber jobs, like Threat Hunting and Reverse Engineering. We’ll profile the top job roles for the next few years, break down the knowledge, skills, and abilities required in each, and show you how to build a training plan that gets you the job you want. And best of all, we’ll end with a special offer designed to help jump start the process for you and your team. View the slide deck>
Securing corporate information can be a challenge, considering the numerous technologies and platforms that need to be protected. One technology that definitely helps achieve secure data is public key infrastructure (PKI), which enhances the security of data by using advanced access methods and making sure the authenticity of the data flow is preserved.
Google takes security to a whole new level thanks to their years of experience as one of the most popular targets on the internet for would-be hackers and denial of service bots. This led Google to build a sophisticated security infrastructure the likes of which few companies or organizations can claim. Google approaches security holistically and involves everything from the physical data centers, to the data pipelines between them, down to the training of each employee that is responsible for managing the infrastructure.
Whether you’re a beginner or intermediate Python developer, you’ll want to keep this guide close to your keyboard and Python editors. In it, you’ll find sample use cases for many of the most common language constructs and tasks that you’ll likely need to perform, such as reading a file or working with a database.
Your business has been hacked, leaving you with a persistent bot; now what? In this hour-long webinar, security expert David Willson will discuss ways you can eliminate the threat in an act of self-defense or defense of property. As new laws are explored, old ones amended, and solutions sought, you'll take a look at thinking outside the box to give the good guys the advantage-or at least a fighting chance.
Discover why healthcare organizations must take an immediate active role in securing their data. It is much more costly, monetarily as well as with regard to reputation, for an organization to react to a breach rather than plan for it.
Cybersecurity is a top technology investment area around the globe, with over half of our survey respondents saying it’s a priority. It’s no longer a niche skill—every IT professional needs some cybersecurity knowledge.
A firewall is a security tool which may be a hardware or software solution that is used to filter network traffic. Understand the basic functionality of a firewall where traffic is blocked or allowed to enter the network.
Every manager wants to get the most out of every employee and maximize team cohesion and efficiency. Making your team members feel as if they are being heard, understood, and acknowledged is critical to any management strategy. Actively listening to team members’ thoughts, ideas, and challenges drives employee engagement and satisfaction, which drives better results. View the slide deck>>
In this hour-long webinar, Global Knowledge instructor and PMP-certified project management expert Daniel Stober will look beyond the triple constraint model and focus on the true essence of project success: stakeholder satisfaction. Many project managers (PMs) fall into the familiar habit of managing based on the constraints of time, cost and scope. While all of these are important, managing them effectively doesn't guarantee project success if the PM fails to conduct proper stakeholder management. To manage stakeholders effectively, the PM has to set expectations. Once expectations are set, the PM must influence the perception of project performance with the stakeholder. Tune in as Dan explores methods you can use to accomplish that goal.
Planning for a cyber disaster makes recovering from one much easier. Still, as important as disaster planning is, it's often overlooked or put off until it is too late. In this webinar, Global Knowledge instructor Debbie Dahlin discusses planning for the unexpected -- whether the unexpected means a simple power outage, a network security breach, or a major natural disaster. She'll discuss risk analysis and risk management techniques and explain the importance and process of creating a business continuity plan. Using a fictional company as an example, Debbie will walk you through the disaster planning process a security professional should use, and she will provide simple tricks to reduce your company's downtime before, during, and after a disaster.
Digital transformation has bred equal parts innovation and risk. And it’s not just the IT department that’s been disrupted—technology is now the most critical risk factor for the entire organization.
For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.
An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Understand how an incident response team prepares, plans, and responds to a security breach.
Good global project managers develop their own competencies, and those of their team members. We can use technology to bridge distance, but also focus on the human aspects of culture, work habits, management style, English as a mandated language, communication, and uncertainty. Perform a self-assessment and assess your team members, then look for on-the-job and other improvement opportunities. A good way to learn more about how to overcome these challenges is to become involved in the international community.