Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
HEC-RAS
This course provides an introduction of HEC-RAS with applications to dam safety. The course provides a hands-on opportunity to use the program and resolve specific questions. The objective of this course is to review the basic principles of open channel hydraulics as they relate to the natural stream environment with application to dam safety. Bridges, culverts, and in-line structures will be discussed and both steady and unsteady flow modelin...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
CGRC | Official ISC2 Training Week
CGRC | Official ISC2 Training Week 40 CPE’s Official ISC2 CGRC certification provides a comprehensive review of the knowledge required to effectively gain the expert knowledge, skills, and experience to manage risk and authorize and maintain information systems within various frameworks. Participants receive the following with registration: Official ISC2 CGRC Student Training Guide (eBook) 180-Day Access to Class Recordings Applied Scena...
The Proactive Playbook: Mastering Fraud...
The landscape of financial fraud is evolving at an unprecedented pace, demanding proactive and sophisticated strategies to safeguard your institution, clients, and capital. In this dynamic webinar, we'll go beyond the scam to explore the proactive playbook for unmasking deceit in the digital age.We'll delve into the transformative power of AI – encompassing machine learning, deep learning, generative AI, and automation – as your es...
Government Efficiency Summit
Efficiency is no longer an ambition—it’s the foundation of public sector transformation under the new administration. As federal agencies modernize operations, cut costs, and enhance service delivery, strategic investments in technology and policy are redefining government effectiveness. GovExec proudly presents the inaugural Government Efficiency Summit, a premier forum spotlighting real-world solutions for optimizing agency perfo...
July 17, 2025
Organizer:
GovExec Location:
Washington, DC
Understanding and Navigating the Servic...
OverviewFailure to understand and comply with the McNamara-O’Hara Service Contract Act (SCA), or Service Contract Labor Standards (SCLS) can lead to costly outcomes, withholding of contract funds, and even debarment. Cross-functional (i.e., Human Resources, Contracts, Payroll, Accounting) understanding of the SCA is imperative to successfully administer an SCA contract. Many contractors find SCA confusing and intimidating, which often le...
The Two-Edged Sword of AI in Cybersecurity
Artificial Intelligence (AI) is transforming cybersecurity for the better—empowering teams to detect threats faster, reduce false positives, and identify risky behavior before it becomes a breach. But there are risks associated with AI: first, that AI tools currently are new to organizations and under-regulated for their own cybersecurity, so require careful review; also, as defenders become more sophisticated with those AI tools, so do...
July 16, 2025
Organizer:
Fedinsider Location:
Webcast
Non-Human Identity (NHI) Summit 2025
The rise of non-human identities (NHIs) is reshaping the cloud security landscape. APIs, service accounts, bots, and machine identities now outnumber humans in most cloud environments—and they often hold the keys to your most critical systems. Join global cloud and identity experts for CSA’s first-ever Non-Human Identity Summit, a free, two-day virtual event dedicated to tackling the complex challenges of NHI management. NHI Summit...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.