Events Search and Views Navigation
Past Events › Online Course
Events List Navigation
This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment, focusing on system configuration and troubleshooting.
Find out more »This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment, focusing on system configuration and troubleshooting.
Find out more »This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment, focusing on system configuration and troubleshooting.
Find out more »This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment, focusing on system configuration and troubleshooting.
Find out more »This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment, focusing on system configuration and troubleshooting.
Find out more »This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment, focusing on system configuration and troubleshooting.
Find out more »This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of the component parts of the Sophos UTM. It explores best practice for network deployment, focusing on system configuration and troubleshooting.
Find out more »Please join us as we discuss TRENDnet's new Web Smart 2.5G switches. Learn about the technical benefits that 2.5G technology can bring to your network, and see how they can be used in real world network solutions. 24, 2018 7:30 PM - 8:30 PM IST
Find out more »How to recognize and identify potential threats in your workplace that precede an attack. This webinar references the Department of Homeland Security?s Pathway to Violence model and applies it to the workplace.
Find out more »As an ASIS-certified professional, you?ve made a commitment to stay current in the field through continuing education activities ? as is required for all accredited certification programs. To maintain your certification, you are required to recertify your designation every three years by completing 60 CPEs.
Find out more »Opportunities to mitigate risks inside an organization abound using modernized security technology. While it requires a more comprehensive understanding of IT concepts, learn about the history of the technology evolution in security and where it is headed. Discuss ways to strengthen the protection of the corporate security system in a changing office environment using continuous assurance and presence control for rapid alerting, more effective resilience, while leveraging established technology and security concepts.
Find out more »We know that ISIS has been operating in all 50 U.S. States and many other countries. We also know that terrorist organizations have a planning cycle which includes conducting hostile surveillance for weeks, months and even years prior to an attack. This seminar will inform participants on the terrorist planning cycle, what hostile surveillants look for, how hostile surveillance is conducted and what preventive security counter measures can be taken to identify hostile surveillance and prevent attacks.
Find out more »With the increased importance of finding efficiency in today?s complex and competitive business environment, the use of a risk-based approach has found its way into nearly all vertical markets. This presentation will explore the positive and negative influences that the application of risk has had on the security industry, while outlining common fallacies in the integration of risk with the security industry. Understand the importance that proper risk literacy has on aligning security programs to business objectives.
Find out more »Situational Awareness requires observation (seeing something), but it also requires an interpretation of what has been observed. This interpretation can then allow for the prediction of potential outcomes. The better the observer?s expertise on what has been observed, the more effective the interpretation and prediction.
Find out more »14 January 2020 10:00-11:00ET The ASIS Foundation recently conducted a landmark study on the convergence of physical security, cybersecurity, and business continuity. Find out who is converging, why, and how. Learn the advantages and drawbacks of convergence, as well as how factors such as organization size, geography, sector, and culture weigh into the equation.
Find out more »