F5 | FireEye SPAWAR TechTalk
PKI Identity and Break & Inspect Please join F5 Networks, FireEye, and GuidePoint to learn and discuss how GuidePoint has leveraged F5 and FireEye to create a comprehensive security solution that combines application delivery infrastructure with advanced content security, including: network segmentation and policy management, protocol conformance, DDoS mitigation, SSL inspection, advanced threat protection, intrusion prevention, threat int...
SANS San Francisco 2015
You are invited to attend another great SANS training event in "The City by the Bay." SANS San Francisco 2015 will be in the heart of the city at the Hilton San Francisco Union Square campus.Some of our courses are in alignment with DoD Directive 8570 requirements for Baseline IA Certifications. Several courses also have GIAC Certification attempts available. See the GIAC homepage for more information.Register for SANS San Francisco 2015, and...
November 30 - December 5, 2015
Organizer:
SANS Institute Location:
San Francisco, CA
Data Analytics for Action & Impact - Sa...
ABOUT THIS COURSE This two-day course will prepare functional managers and analytic practitioners to finally make sense of data analytics and take control of the analytic process. “Transforming Data to Decisions” develops core skills for data analytics and lays the foundation for data-intensive analytic projects that deliver insight, clarity, confidence and actionable decision support. Attendees will learn the four major types of p...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
Cloud Computing Conference
Cloud Computing continues to grow in importance in the public sector. Agency personnel responsible for developing and implementing cloud-based solutions -- for implementing data center consolidation and other technology efficiencies -- continue to look for opportunities to learn about the best technologies, configurations, service and deployment models and appropriate mix of cloud services -- based on their government agency requirements. Digi...
Nothing Stays the Same: New Challenges...
Gain a better understanding of hottest issues in Wisconsin employment law. During the last several years, there have been a flurry of developments and changes to laws that impact Wisconsin employers. This topic will help employers navigate these changes in four key areas. First, a discussion on the recent and proposed changes to state and federal wage and hour laws, including changes to the exemptions under the Fair Labor Standards Act. Next,...
US Export Controls Awareness Training i...
Avoid fines and penalties for violating export control regulations due to a lack of knowledge, training and comprehension of corporate or individual responsibility of your employees. This webinar was created for employees whose first language is Spanish. The presentation and speaker commentary will be provided in Spanish. Ver esto en español Due to a lack of knowledge and internal corporate controls, company employees can negatively imp...
F5 Air Force TechTalk SSL Break and Inspect
Join F5 Networks and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for Application Cybersecurity protection in the Datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS designs to mitigate web-based App...
F5 Gov TechTalk SSL Break and Inspect
Join F5 Networks, World Wide Technology, Inc. and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for application cybersecurity protection in the data center. Learn which SSL/TLS standards are necessary to meet the new federal requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.