Getting ready for IPv6 - the first five steps
Even if your organization does not need to deploy IPv6 immediately, getting free training is step one! Impress your IT colleagues with the answers to questions like, "Why is DNS64 the IPv6 to IPv4 Babble Fish?" and "Why is /64 a typical subnet mask?" See five "how to" demonstrations: Setting up your DNS fast and securely with easy to use workflow wizards Running name servers over IPv6 Registering and delegating to IPv6 Setting up forward- and...
NLIT Summit 2011
This year's National Laboratories Information Technology (NLIT) Summit, hosted by the National Renewable Energy Laboratory, will take place at the Vail Marriott Resort and Spa, June 14 through June 17, 2010 with exhibit days June 14-16, 2010.The 2011 NLIT Summit brings together representatives from across the U.S. Department of Energy (DOE) complex to facilitate an exchange of information technology (IT) best practices and ideas. Each year, th...
Prepare Your Network for IPv6 with Expe...
Two Ways to Participate: Watch the Live Broadcast Online Watch the event online as Cricket presents from Washington D.C. A lucky online viewer from each broadcast will be selected to win an iPad 2®! Join us online or in-person on June 7 as world IPv6 expert Cricket Liu, author of several books on DNS and IPv6, presents a variety of IPv6 topics, including: IPv6 basics Setting up forward- and reverse-mapping with AAAA and PTR records Running...
Unleash The Power of Microsoft DNS/DHCP...
We would like to extend a personal invitation for you to join one of two 30 minute live demonstration sessions of Infoblox IPAM for Microsoft DNS/DHCP on Thursday May 12th at either 10 AM ET or 4 PM ET. We’ll show you how centralized management of DNS, DHCP and IP Address Management can lead to increase in network uptime, efficiency and cost reduction. We’ll also cover: • Enterprise requirements for IP address management ...
FREE Seminar: "Doing More with Less: Ac...
With budgets up in the air, continuing resolutions continuing, and a call to trim staff but maintain productivity, you need to keep the work moving with less time, less money, and less personnel. That's why Feith Systems is coming to DC to share the secrets of how to do more with less and still deliver results. Hyatt Regency Capitol Hill, Washington DC - Registration and Complimentary Breakfast begin at 830am. Join us on April 27th for a FREE...
FREE Seminar: "Achieve Your Workflow Go...
Join Feith Systems April 27th in DC for free for an exclusive Washington Workflow Workshop! One day only, see the latest applications in maximizing your Business Processes, best practices in streamlining your Workflow, creating lasting efficiency in Operational Control, and so much more. Hyatt Regency Capitol Hill, Washington DC - Registration and Complimentary Breakfast begin at 830am. Feith Workflow Workshop Presents a FREE Event Achieve Yo...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
Getting a GSA Schedule: An Overview of...
Introduction to GSA Schedule Contracts: Understanding, Securing, & Managing a GSA Schedule Contract The GSA Schedule Contract is the most widely used government contract vehicle. In fiscal year 2009 government agencies purchased over $37.4 billion products and services through the GSA Schedules. Join us for this complimentary information session to learn more about what the GSA Schedule Contract is and what is involved in pursuing and hold...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.