You are here

Cybersecurity

Featured in 

Join renowned Finance Author Edgar Perez to gain a comprehensive overview of the fast-growing field of cybersecurity and learn how to develop and implement an effective cybersecurity plan in your organisation. As Internet usage becomes increasingly widespread and information technology ever more complex, cybersecurity is becoming an increasingly important and business-critical field. Are you and your organisation effectively prepared to handle cybersecurity threats? Do you know how to identify threats, address challenges and apply a cybersecurity framework?

Monday, August 27, 2018 - 9:00am
Featured in 

This course is intended for those wishing to qualify with CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA's CySA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts.

Monday, August 20, 2018 - 10:00am
Featured in 

The Certified Ethical Hacker (CEH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice of the industry globally. It is a respected certification in the industry and is listed as a baseline certification on the United States Department of Defense Directive 8570. The CEH exam is ANSI 17024 compliant adding credibility and value to credential members.

Monday, August 6, 2018 - 10:00am
Featured in 

This course is intended for those wishing to qualify with CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA's CySA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts.

Monday, August 20, 2018 - 10:00am
Featured in 

This course is intended for those wishing to qualify with CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA's CySA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts.

Monday, August 20, 2018 - 10:00am
Featured in 

This course is intended for those wishing to qualify with CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA's CySA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts.

Monday, August 20, 2018 - 10:00am
Featured in 

This course is intended for those wishing to qualify with CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA's CySA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts.

Monday, August 20, 2018 - 10:00am
Featured in 

This course is intended for those wishing to qualify with CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA's CySA+ Certification is an intermediate-level certificate for IT professionals with previous experience of working in the field of IT security. The CompTIA CySA+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts.

Monday, August 20, 2018 - 10:00am
Featured in 

Testing is our main means of reducing software risk and typically takes half of software projects, yet still fails to catch many important defects. Traditional testing books and training emphasize using well-known test design techniques, including boundary tests and decision trees/tables, which indeed can help detect more defects; but their value is limited by testing too late and largely reacting to whats specified in the system design.

Monday, August 6, 2018 - 10:00am

Pages