Back to Search Begin New Search Save Search Auto-Notify
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
July 1, 2025
Organizer: General Services Administration
Location: Webcast
Add Favorite
Computers for Learning
This training will examine how federal agencies can help schools and educational non-profits serving some portion of the pre-kindergarten through grade 12 population by directly donating their excess computer equipment. This training will teach you (the federal agency) what your responsibilities are and how to navigate PPMS and the GSA-hosted Computers for Learning (CFL) website. Topics include CFL allocations, CFL requisitions, CFL manual tra...
June 30, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Mobile Security: The Human Layer is the...
Phishing today isn’t just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific tactics—like smishing and quishing—are designed to exploit human trust, not technical flaws. And they’re working. Protecting users from falling for such schemes is difficult. Threat researchers have seen malicious smishing c...
June 27, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Mobile Security Series: Securing the Hu...
Phishing today isn’t just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific tactics—like smishing and quishing—are designed to exploit human trust, not technical flaws. And they’re working. Protecting users from falling for such schemes is difficult. Threat researchers have seen malicious smishing c...
June 27, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Basic Soil Mechanics Related to Earth Dams
The objective of this course will be to provide a comprehensive presentation of the significant principles and concepts of soil mechanics to the participants. The material will be presented with emphasis on the basic soil mechanics principles prerequisite to further study for the design or rehabilitation of earth embankment dams. This is a basic-level course intended as an introduction for those with minimal to moderate knowledge or experience...
June 24-27, 2025
Organizer: Association of State Dam Safety Officials
Location: Virtual
Add Favorite
SSCP | Official ISC2 Training Week
SSCP | Official ISC2 Training Week 40 CPE’s Official ISC2 SSCP certification provides a comprehensive review of the knowledge required to effectively gain advanced technical skills and knowledge to implement, monitor, and administer IT infrastructure using information security policies and procedures. Participants receive the following with registration: Official ISC2 SSCP Student Training Guide (eBook) 180-Day Access to Class Recordings...
June 23-27, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Tampa Cybersecurity Conference
Join Us in Tampa for the Futurecon Cybersecurity Event!Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community. Don’t miss our special ceremony recognizing our...
June 26, 2025
Organizer: FutureCon
Location: Tampa, FL
Add Favorite
Defense One Tech Summit 2025
The Future Won’t Wait—Will You? Technology is moving faster than the Pentagon can harness it. As strategic adversaries rapidly advance, the U.S. must decide: adapt or fall behind. The future belongs to those who move fast, challenge convention, and embrace disruption. The 2025 Defense One Tech Summit: Rise of the Futurists is where vision meets action. Gather with the innovators who refuse to let today's systems dictate the pace of...
June 26, 2025
Organizer: Defense One
Location: Arlington, VA
Add Favorite
2025 Effective Market Research (MRAS)
Target Audience: Federal/State/Local Agencies and MilitaryAttention all public sector employees in the contracting and acquisition career field! In GSA's Market Research As a Service (MRAS) Customer Training: Effective Market Research (Fed/Military), you'll learn the importance of market research, how and when to conduct it, and how to get the best results by making your data collection methods more efficient. You'll also delve into the regula...
June 26, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Talking Tech: Simplifying STIG Complian...
The U.S. Department of Defense uses security standards that are set forth in its Security Technical Implementation Guide (STIG) to help protect its systems and networks. By implementing unified automation, which integrates automated tools with the STIG standards, DoD can improve system-level control compliance throughout the software lifecycle. From reduced timelines and improved reliability to sustainable ATO processes, unified STIG automatio...
June 26, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search