Online

Managing & Improving Electronic Products Reliability Across the Entire Lifecycle – From Prototype into Volume Manufacture

What could an unreliable product really cost your company? Markets are demanding cheaper, more reliable electronic products and systems and many manufacturers find that traditional, established procedures and processes. Yet in today’s market-driven climate you need, even more, to review procedures, examine options and pursue cost-effective solutions that will allow you to stay competitive and

Managing & Improving Electronic Products Reliability Across the Entire Lifecycle – From Prototype into Volume Manufacture Read More »

How to architect an identity management strategy in AWS

An identity and access management (IAM) strategy can help organizations grant users and customers access to the right resources under the right conditions. In this webinar, SANS and AWS Marketplace will provide guidance on how to architect and execute an IAM strategy with AWS services and third-party identity management solutions.  They will cover defining permission

How to architect an identity management strategy in AWS Read More »

(ISC)² Certified Information Systems Security Professional (CISSP) Training

Leadership and Operations This course is designed for information security professionals with deep technical and managerial knowledge and experience to effectively design, engineer and manage the overall security posture of an organization. This training course provides a comprehensive review of information systems security concepts and industry best practices, covering the following eight domains of the

(ISC)² Certified Information Systems Security Professional (CISSP) Training Read More »

(ISC)² Certified Cloud Security Professional (CCSP) Training

Cloud Security This course provides a comprehensive review of the knowledge required for understanding cloud computing and its information security risks and mitigation strategies. This training course will help students review and refresh their knowledge and identify areas they need to study for the CCSP exam. Course Objectives At the end of this course, learners

(ISC)² Certified Cloud Security Professional (CCSP) Training Read More »

(ISC)² Systems Security Certified Practitioner (SSCP) Training

Security Administration and Operations This course provides a comprehensive review of the knowledge required to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability. This training course will help students review and refresh their knowledge and identify areas they need to study for

(ISC)² Systems Security Certified Practitioner (SSCP) Training Read More »

(ISC)² Certified Secure Software Lifecycle Professional (CSSLP) Training

Software Security This course is designed for software professionals that have the expertise to incorporate security practices – authentication, authorization and auditing – into each phase of the software development lifecycle (SDLC), from software design and implementation to testing and deployment. Led by an (ISC)² authorized instructor, this training seminar provides a comprehensive review of

(ISC)² Certified Secure Software Lifecycle Professional (CSSLP) Training Read More »

Cloud Security APAC 2022

Historically, people look at cloud security like it is something new but what we now know security is much easier on the cloud with large cloud providers helping organizations to reduce risk and improve security. Traditional network cybersecurity takes more work and resources as you engage with different vendors for different solutions and incur more

Cloud Security APAC 2022 Read More »