Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

149 Results Found for "azure"

Results per page: 10 40 80

Benefits of an “Agile” Mindset

Article | Nov. 24, 2015

Projects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment.

Pen Test Legal Issues

Article | Nov. 13, 2014

Pen testers beware. Whether you believe you know and understand all the potential legal issues, read on. First of all, a penetration test or “pen test” is a method that’s used to evaluate the security and/or vulnerabilities in a network. This test is normally conducted externally wherein the tester is attempting to hack a network or computer. Breaking into computers and networks is illegal under the Computer Fraud and Abuse Act (CFAA), and depending on your activities and other factors, other federal laws and state laws may be broken.

Working from home – a hacker’s paradise!

Webinar – Recorded | Oct. 09, 2020

With the increase in remote work, it is important for both individuals and companies to be aware of the added cybersecurity risks

Data Center Basics: the Differences Between IOS and NX-OS

Article | Sep. 04, 2012

As we discussed previously, Cisco created the Nexus Operating System (NX-OS) to power its next-generation data-center switching platform. While this new OS shares many similarities to the original IOS, there are some definite differences that you need to be aware of as you begin using it.

Management Skills Training Courses

Related Page

Management skills training on building business cases, developing competitive strategies, managing team conflict, and recruiting and interviewing employees.

Cybersecurity: Physical Security

Webinar – Recorded | May 26, 2014

Learn about physical security for cybersecurity in our webinar.

Zero Day Exploits

White Paper | Oct. 23, 2012

A zero day exploit is an attack that was previously unknown to the target or security experts in general.

JNCIP-SEC - Juniper Networks Certified Specialist - Security

Certification

The Juniper Networks Certification Program verifies your advanced knowledge of Juniper Networks security technologies. Juniper Certification Training.

JNCIP-SEC - Juniper Networks Certified Internet Professional

Certification

The Junos Security Certification track is a program that allows participants to demonstrate competence in general and Junos software for SRX Series devices.