Back to Search Begin New Search Save Search Auto-Notify
CompTIA CySA+ Training Boot Camp
The CompTIA CySA+ Training Boot Camp prepares you to pass the CySA+ certification exam by covering the following domains: Threat and vulnerability management: Perform vulnerability management activities and analyze output from vulnerability assessment tools. Software and systems security: Apply security solutions for infrastructure management and implement software and hardware assurance best practices. Security operations and monitoring: Anal...
June 24-28, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
Ethical Hacking Dual Certification Boot...
Delve into the tools and techniques used by cybercriminals over five days. Gain in-depth training in ethical hacking methodologies through lectures and hands-on labs. Our cloud-hosted cyber range provides practical experience in reconnaissance, system access, vulnerability exploitation and data exfiltration. You’ll gain two highly sought-after certifications: EC-Council Certified Ethical Hacker (CEH) and CompTIA PenTest+. These certifica...
June 24-28, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
CompTIA Security+ Training Boot Camp
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
June 24-28, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
June 24-28, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Haystack CTF: The Hunt for IOC's
Immerse yourself in the world of Intrusion Detection in our new Blue Team game, Haystack. Your mission is to follow the trail of Indicators of Compromise (IOCs) and spot the tell-tale signs of cyber threats. It's a mix of fun, challenge, and learning - an experience you don't want to miss! An up-and-coming hacker prodigy known as Leopold falls into debt with The League after unsuccessfully trying to hack into The League's network to exploit th...
June 27, 2024
Organizer: World Wide Technology
Location: Virtual
Add Favorite
Neurodiversity in Cybersecurity Summit 2024
As the cybersecurity talent shortage persists, with an estimated 700,000 unfilled jobs, the industry needs to redouble its efforts to attract and retain workers. One important way to accomplish this is by recognizing that jobs and workplaces can’t be “one size fits all.” As many as 20% of adults are neurodivergent (ND), and when we fail to account for the unique strengths, experiences, and challenges of neurodivergent cyberse...
June 27, 2024
Organizer: SANS Institute
Location: Virtual
Add Favorite
Nextgov/FCW Supply Chain Workshop
Proper supply chain management and national security concerns have never been more interconnected. As geopolitical tensions bring cyber threats to the fore, the public and private sector must collaborate to ensure each link of the supply chain is secure. And everyone in the organization, from developers to senior leadership, must prioritize risk management across the entire threat landscape. Because cybersecurity risks can arise at any point i...
June 27, 2024
Organizer: GovExec
Location: Virtual
Add Favorite
Choosing the Right Mobile App Security...
In today's rapidly evolving digital landscape, securing mobile applications is more critical than ever for enterprises. As cyber threats become increasingly sophisticated, organizations must carefully consider their approach to mobile app security. Should they adopt a comprehensive platform solution or opt for best-of-breed tools tailored to specific needs?Join us for an insightful webinar with GigaOm’s Howard Holton. We will explore the...
June 27, 2024
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
The ONE Thing That Will Guarantee Succe...
'It's not what you know, but who you know.' In federal sales success, that is absolutely true. Relationships lead you to predictable, repeatable results. FREE LinkedIn live The ONE Thing That Will Guarantee Success for Government Contractors Join Neil McDonnell for a dynamic 30-minute BD training designed specifically for small business government contractors like you. Topics:The 3 essential federal relationships needed for successful salesHow...
June 27, 2024
Organizer: GovCon Chamber
Location: Virtual
Add Favorite
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search