Google Cloud Big Data and Machine Learn...
Join us for this no cost training which introduces the Google Cloud big data and machine learning products and services that support the data-to-AI lifecycle. It explores the processes, challenges, and benefits of building a big data pipeline and machine learning models with Vertex AI on Google Cloud.
Financial Planning For Federal Employees
An Overview of Financial Planning for Federal EmployeesSetting goalsPractical considerationsProjecting future income needsHow much money will you need saved when you retire?How do your retirement benefits come into play?The Retirement “Tripod”CSRS and FERS annuities, plus military pensionsSocial Security benefitsTSP, IRAs, and other savings/investmentsEd thoroughly explores all 3 components! Other Information to ConsiderHealth Insu...
Vertex AI Model Garden
Join us for this no cost training where you'll learn how to leverage pre-trained models as part of your machine learning workflow and how to fine-tune models for your specific applications.
CISA Tabletop Exercise Package (CTEP) W...
PLEASE NOTE: There is no registration for this event. Event website link will open in Microsoft Teams - NOT THE MEETING. If you have any questions or would like the invite, please reach out to cisa.exercises@cisa.dhs.gov. In order to support our partners who wish to use the wide array of CTEPs available through CISA, which include such topics as active shooter, vehicle ramming Unmanned Aerials Systems, Cyber vectors, etc. CISA Exercises will b...
Introduction to Responsible AI in Practice
Join us for this no cost training workshop for a high-level exploration of Google's recommended best practices for responsible AI usage across different areas of focus: Fairness, Interpretability, Privacy and Safety. Along the way, you will learn how you can leverage different open-source tools and tools on Vertex AI to explore these concepts and spend time considering the different challenges that arise with generative AI.
Implementing the HIPPA Security Rule (N...
This CPE training event is designed to provide participants with the knowledge and skills necessary to effectively implement the HIPAA Security Rule within their organizations. The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) to ensure its confidentiality, integrity, and availability. Implementing this rule is crucial for healthcare organizations and their business associates to protect sensitive...
Risk Management Overview (ISO 31000)
Join us for a highly informative and engaging 1 CPE event, where we will review the world of risk management through the lens of the ISO 31000 standard. This event is designed to provide participants with an overview of the ISO 31000 standard and its significance in the field of risk management. ISO 31000, also known as "Risk Management – Guidelines," is an internationally recognized standard that offers principles, a framework, and a p...
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.