TECHNICAL SECURITY CONFERENCE (FREE FOR GOVT) : GET Continuing Education Credits
/
0 Comments
EC-Council is bringing some technical training classes to DC which culminates with a one-day highly technical security seminar on Aug 25 and it is free for all Government employees!..... and subsidized for the rest to just $99 !
Unlike other conferences, participants will not be rushed through the presentations, and they can actually learn about the specific topics that are being presented. Renowned security and cyber warfare experts - Jeff Bardin and Richard Stiennon, will be the keynotes for this seminar.
The pricing of the event is kept very low to ensure that budget cuts do not affect the community.
NSA Trusted Computing Early Bird Rate Runs Out Friday!
To ensure the reduced early bird registration rate, be sure to sign up for the 2nd Annual NSA Trusted Computing Conference & Exposition by Friday, 12 August! Join hosts, the National Security Agency, on 20 - 22 September in Orlando, FL, to explore the conference theme, "Using COTS Technologies to Deliver Decisive Defensive Advantage."
The National Security Agency is pleased to announce the addition of three new exceptional speakers to the agenda:
Enterprise Log Management: An Overview (Part 2) – – FOSE
In part 1 of my guest post series for the FOSE Insights Blog,…
Enterprise Log Management: An Overview (Part 1) – – FOSE
Log management is the collection of self-generated data from IT hardware devices and software applications. The collection of this data can contain useful information about business processes such as the number of errors on a website or even a security issue that displays the number of failed attempts to access a perimeter router.
Watch Live: Sub-Oversight Committee Hearing at 11AM ET on Cybersecurity
Watch Live: Sub-Oversight Committee Hearing at 11AM ET on Cybersecurity
SECURITY 660: Advanced Penetration Testing, Exploits, and Ethical Hacking
As a perpetual student of information security, I am excited to offer this course on advanced penetration testing. Often, when conducting an in-depth penetration test, we are faced with situations that require unique or complex solutions to successfully pull off an attack, mimicking the activities of increasingly sophisticated real-world attackers.
