UFC-Minimum Antiterrorism Standards for...
This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. While the course focuses on securing DOD assets, the concepts learned are prudent and applicable in reducing criminal and terrorist threats to non-DOD buildings, as well. Contractors and consultants seeking construction contracts with the Department of Defense will attend this course. The course is designed to familiarize...
SANS Cyber Defense San Diego 2015
Cyber security training in San Diego CA from SANS Institute, the global leader in Information Security training. SANS Cyber Defense San Diego 2015 features hands-on, immersion-style training courses for security professionals at all levels. Many of these security courses have Certifications that are aligned with DoD Directive 8570/8140 and most courses at this event are associated with GIAC Certifications. SANS delivers unparalleled security t...
UFC-Minimum Antiterrorism Standards for...
This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. While the course focuses on securing DOD assets, the concepts learned are prudent and applicable in reducing criminal and terrorist threats to non-DOD buildings, as well. Contractors and consultants seeking construction contracts with the Department of Defense will attend this course. The course is designed to familiarize...
Vulnerability Assessments and Risk Anal...
A variety of five qualitative and quantitative methodologies are discussed in detail during this three-day workshop. The “do’s & don’t” of report writing are covered. Field evaluations are conducted. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. This worksho...
Vulnerability Assessments and Risk Anal...
A variety of five qualitative and quantitative methodologies are discussed in detail during this three-day workshop. The “do’s & don’t” of report writing are covered. Field evaluations are conducted. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. This worksho...
SWAT and Critical Incident Management Program
The OpTac International SWAT and Critical Incident Management Program will be held July 23-24, 2015 in Hagerstown, Maryland. An effective law enforcement response to critical incidents involving armed suspects can determine whether someone lives or dies. The OpTac International SWAT and Critical Incident Management Program is based on the book, SWAT Operations and Critical Incidents: Why People Die, written by Stuart A. Meyers, and includes hi...
Vulnerability Assessment/Risk Analysis...
Students will learn the difference between qualitative and quantitative risk analysis. They will use a variety of methodologies (including MSHARPP & R3SME [asset owner's point of view], CARVER [aggressor's point of view], ABRA [combination] & CAIRA [analysis of energy systems supporting critical assets]) to evaluate single or multiple buildings and critical infrastructure nodes. This workshop is very “hands-on” with numerou...
TakeDownCon Capital Region Hacking and...
TAKEDOWNCON: CAPITAL REGION 2015 TakeDownCon, Hacking and IT Security Conference, is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on th...
May 28 - June 2, 2015
Organizer:
EC-Council Location:
East Hyattsville, MD
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Certified CISO (CCISO)
NEW DATE! EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assu...
March 2-6, 2015
Organizer:
EC-Council Location:
Greenbelt, MD
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.