Remove Course Remove Information Security Remove Programming
article thumbnail

Good People at @SecureNinja Provide Cyber Kung Fu Certified Ethical Hacker Course Free

CTOvision

From the video description: The Cyber Kung Fu program is designed for anyone who wants to learn about the EC-Council's Certified Ethical Hacker version 8 curriculum. Giving both context and additional content, Tom Updegrove's Cyber Kung Fu for CEH with Larry Greenblatt program has received worldwide accolades.

Course 150
article thumbnail

Combatting Phishing with Enhanced Cybersecurity Awareness Programs

SecureWorld News

At the end of the day, it turned out that this was the work of the company's information security team, aimed at showing management how simply attackers could gather data for targeted phishing campaigns. These could be booklets, information sheets, lectures, training, mentoring, video courses, simulated phishing campaigns , etc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

E-Government: A Graduate Class

CIO Musings

This will be a very hands-on course. No tests or exams, we will have reading assignments and writing assignments and a main project for the course. I have guest lectured for the FTEMS program as well as other graduate MIS classes. I have guest lectured for the FTEMS program as well as other graduate MIS classes.

article thumbnail

20 IT management certifications for IT leaders

CIO Business Intelligence

IT security is a growing priority for businesses and the CISM certification is often required by government agencies hiring IT workers. GAQM offers an e-course that takes 30 to 35 hours on average to complete that you can take prior to taking the exam.

article thumbnail

Join Women in Cybersecurity This Week in Dallas

CTOvision

Speakers for this year’s event include: Regina Wallace-Jones, Head of Security Operations, Facebook. White, VP Senior Information Security Officer, Global Information Security, Bank of America. Heather Adkins, Founding member of the Google Security Team. Find the full program here. Margaret N.

article thumbnail

16 best entry-level IT certifications to launch your career

CIO Business Intelligence

The courses are designed to be completed in succession, starting with the Apple Device Support course, which focuses on the skills and expertise you’ll need as a help desk professional, technical coordinator, or service provider for an organization that relies on Apple hardware and software. before you can pass the exam.

SCRUM 135
article thumbnail

Top 10 governance, risk, and compliance certifications

CIO Business Intelligence

A variety of roles in the enterprise require or benefit from a GRC certification, such as chief information officer, IT security analyst, security engineer architect, information assurance program manager, and senior IT auditor , among others.