Quantcast
Browsing all 98 articles
Browse latest View live

Dale Beauchamp

Dale Beauchamp is a leading authority on protecting the most valuable assets from insider threat.  He combines a mix of professional leadership, coaching, business strategy, and technical expertise in...

View Article


Image may be NSFW.
Clik here to view.

The Technology Advancement Center: Driving Innovation in Cybersecurity | I95...

Thank you to I-95 Business for featuring the Technology Advancement Center – Please view original article here With new leadership, TAC has a fresh direction — and an ambitious mission. By Kate...

View Article


Image may be NSFW.
Clik here to view.

What is a Cyber Range

Cyber ranges are specially designed virtual environments that simulate real-world operational settings. They give cybersecurity professionals—whether they defend, operate, or test these systems—a safe...

View Article

SOSSEC AI Panel

SOSSEC, Inc. is hosting a Cyber Talk in conjunction with the Project Manager Defensive Cyber Operations, COBRA OTA, inviting DOD, SOSSEC members, and interested companies for an informational and...

View Article

Image may be NSFW.
Clik here to view.

RISE Mentoring Program for Women Professionals in Cyber

Join The Cyber Guild’s RISE Mentoring Program for Women Professionals in Cyber Are you a cyber professional feeling stuck in your career? Looking to return or transition to the field? The Cyber Guild...

View Article


Image may be NSFW.
Clik here to view.

TAC Open House 2024

YOU ARE INVITED TO JOIN US FOR TAC OPEN HOUSE HOLIDAY SOCIAL AND ANNIVERSARY CELEBRATION RSVP Join us for an evening of making connections and holiday celebration over cocktails and light fare. This...

View Article

Article 2

TAC Event Panel

View Article

Image may be NSFW.
Clik here to view.

What is a Cyber Range Exercise – 6 Key Benefits

A cyber range exercise is a simulated environment designed for training and testing cybersecurity skills, strategies, and technologies. These exercises replicate real-world cyber-attack scenarios,...

View Article


ITIL 4Foundation

Course Overview ITIL® 4 Foundation introduces an end-to-end operating model for the creation, delivery and continual improvement of technology-enabled products and services. The ITIL® 4 Foundation...

View Article


Protected:  Architecting on AWS 

This content is password protected. To view it please enter your password below: Password:

View Article

Protected:  AWS Certified Cloud Practitioner Essentials 

This content is password protected. To view it please enter your password below: Password:

View Article

Image may be NSFW.
Clik here to view.

 CompTIA Advanced Security Practitioner+ (CASP+) 

Course Overview  Information security threats are on the rise globally. Organizations are increasingly concerned over the lack of adequately trained senior IT security staff’s ability to effectively...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Azure Data Fundamentals

Course Overview In this course, students will gain foundational knowledge of core data concepts and related Microsoft Azure data services. Students will learn about core data concepts such as...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Power BI Data Analyst 

Course Overview This course covers the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Azure Administrator 

Course Overview This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Azure AI Fundamentals 

Course Overview This course introduces fundamentals concepts related to artificial intelligence (AI), and the services in Microsoft Azure that can be used to create AI solutions. The course is not...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Azure Fundamentals 

Course Overview This one-day course will provide foundational level knowledge on Azure concepts; core Azure services; core solutions and management tools; general security and network security;...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Power Platform Fundamentals

Course Overview  This course will teach you how to build apps with low-code techniques to simplify, automate, and transform business tasks and processes using Microsoft Power Platform. This course...

View Article

Image may be NSFW.
Clik here to view.

EC-Council Certified Ethical Hacker (CEH)

Course Overview The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information...

View Article

Image may be NSFW.
Clik here to view.

EC-Council Certified Network Defender (CND)

Course Overview  The network security training course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The...

View Article
Browsing all 98 articles
Browse latest View live