OSHA Safety Regulations - Webcast
This five-hour course is designed to give you an overview of the critical OSHA general industry regulations and help you determine which standards apply to your facility. Course topics include hazard communication, PPE, confined space, process safety management, and HAZWOPER. Recordkeeping, reporting, and training requirements are also covered. The coursebook, Environmental, Health, and Safety Laws and Regulations is included as a downloadable...
Transparent Defense: Bringing Open Gove...
In tackling the administration’s open government initiative, the Department of Defense must walk a fine line to balance the imperatives of public transparency with the protection of national security. Have security concerns made transparency a greater challenge for DoD agencies? Moving forward, what resources do DoD agencies need to foster greater openness and collaboration? The Government Business Council (GBC), the research division of...
Environmental Regulations - Webcast
This five-hour course is designed to provide a broad understanding of major U.S. environmental laws and regulations. You will learn how to determine which laws and regulations apply to your facility and how to maintain compliance. Major emphasis is placed on the statutes that affect most facilities, including the Clean Air Act, Clean Water Act, RCRA, CERCLA, EPCRA, and TSCA. Recordkeeping, reporting, and training requirements are also covered....
Water Resource Part II: Civic Engagemen...
Who Should Attend?Natural resource managers from federal, state and local agencies; NGOs; researchers; environmental and planning contractors; decision-makers; and waterway and water resource stakeholders.What Will You Learn?Through civic engagement case studies exemplifying both successes and failures you will gain an understanding of principles and practices directly applicable to adaptive management of community water resources. Explore th...
October 20, 2010
Organizer:
Anne Lewis Location:
Washington, DC
Hazardous Waste Management in California
If your facility generates hazardous waste in the state of California, you must comply not only with the California hazardous waste regulations, but also with federal regulations that have not yet been incorporated into the California rules. Attend this two-day seminar and meet both the California and federal annual training requirements for generators of hazardous waste in California. Topics covered include waste characterization, on-site man...
Florida Government Technology Conference
Join us in October for a discussion about IT innovation and cyber security in our newly opened, state-of-the-art conference facility! Innovation Now, more than ever, IT innovation in government is critical for implementation of basic services as budgets are shrinking and demand for services is increasing. Industry speakers will discuss solutions to these issues. Cyber Security This October marks the sixth annual National Cybersecurity Awarenes...
ISS World Americas
Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering ISS World Americas is the world's largest gathering of North American, Caribbean and Latin American Law Enforcement, Intelligence and Homeland Security Analysts and Telecom Operators responsible for lawful interception, electronic investigations and network Intelligence gathering. ISS World Programs present the methodologies and tools to b...
Hacker Halted USA 2010
Hacker Halted - World Leading Ethical Hacker Conference EC-Council's Hacker Halted Conference 2010 in Miami is the ultimate white hat hacker con in the US. With hacker events all over the world, Hacker Halted is slated to be the world’s largest reunion of Certified Ethical Hackers to date. If Information Technology, Information Security, Computer Hacking, and black hat techniques with white hat professionalism sounds enticing to you, Hac...
October 9-15, 2010
Organizer:
EC Council Location:
Miami, FL
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.