$ AUD $ NZD

Size: px
Start display at page:

Download "$ 39.95 AUD $ 46.00 NZD"

Transcription

1 QuickBooks 2015: The Guide for Small Business Success Author: Leslie Capachietti ISBN-13: Pub Date: DECEMBER 2015 Price: $ AUD $ NZD Edition: 1 Previous ISBN: Subject: Computers - Desktop Applications / Personal Finance Applications Trim Height: 24 cm Trim Width: 19 cm Pages: 512 Format: Softcover INTRODUCTION Advanced Certified QuickBooks ProAdvisor Leslie Capachietti reveals best practices for customizing and using the #1 small business financial software QuickBooks: The Guide for Small Business Success takes the guesswork out of setting up and running a business with QuickBooks. Leslie Capachietti has worked one-on-one with thousands of small business owners and she s here to help! Updated to cover all QuickBooks 2015 desktop versions (versus just QuickBooks Pro in previous editions), this book offers new content, including: what s new in the QuickBooks 2015 editions, how to choose the right QuickBooks edition, best practices from other users, and common mistakes and how to avoid them. Helps readers quickly identify which features they need to know to run their business Topics organized logically so readers can get to mission critical tasks in the order they ll need them Easy-to-follow examples of best practices employed by other QuickBooks users Includes valuable tips on accounting, inventory management, payroll, budgets, business

2 reports, tax preparation, and more ABOUT THE AUTHOR Leslie Capachietti, MBA, (Winchester, MA) is an Advanced Certified QuickBooks ProAdvisor, Intuit Premier Reseller, and a member of Intuit s Accountant Training Network. Her firm, Automated Financial Solutions, has been recognized by Intuit as a Top Performer for outstanding achievement in supporting QuickBooks users.

3 Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Author: Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Michael Baucom, Ryan Linn ISBN-13: Pub Date: DECEMBER 2014 Price: $ AUD $ NZD Edition: 4 Previous ISBN: Subject: Computers - Security / Networking Trim Height: 24 cm Trim Width: 19 cm Pages: 704 Format: Softcover INTRODUCTION In-depth, advanced coverage of the latest strategies for vulnerability discovery and exploitation, mobile security, malware analysis, and reverse engineering Fully updated throughout and featuring 13 entirely new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition reveals how to thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Hacking-related law and ethics are discussed in detail. Readers will learn how to defend against the latest vulnerabilities in browsers, mobile devices, routers, web apps, and Linux and Windows operating systems. The book explains how to automate Metasploit to speed up the penetration testing process and how to dissect malicious Android apps, rootkits, 64-bit binaries, and botnets. Based on courses taught by the authors and professional experience gained through realworld engagements New topics covered include intelligent fuzzing, spoofing-based attacks, exploiting Cisco routers, mobile devices and web apps, advanced client-side exploitation, Android malware

4 dissection, and kernel-mode rootkit dissection A must-have resource for IT networking professionals: penetration testers, malware analysts, security analysts, security administrators, incident responders, and intrusion analysts Features 13 all-new chapters Explains the most advanced hacking techniques such as fuzzing, Java and Adobe Sandbox bypassing, IE use-after-free exploitation, and DEP/ASLR/SEHOP bypassing Covers emerging trends in malware such as Stuxnet, Android, Botnets, and 64-bit malicious binaries ABOUT THE AUTHOR Daniel Regalado, aka Danux, works for Symantec as a malware and vulnerability researcher and reverse engineer. Shon Harris, CISSP, is the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Force s Information Warfare unit, an instructor, and the bestselling author of the CISSP All-in-One Exam Guide. Allen Harper, CISSP, a retired U.S. Marine Corps Major, is president and founder of N2NetSecurity, Inc., and a faculty member for the Institute for Applied Network Security. Chris Eagle is a senior lecturer in the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California and has been a computer engineer/scientist for 25 years. Jonathan Ness is a software security engineer at Microsoft. He is a member of an Air National Guard unit where he leads network penetration tests against military facilities. Branko Spasojevic is a security engineer at Google. Michael Baucom is vice president of research and development at N2NetSecurity, Inc. Ryan Linn is a senior security consultant with Trustwave s SpiderLabs and a columnist with the Ethical Hacker Network.

5 PHP and MySQL Web Development: A Beginner s Guide Author: Marty Matthews ISBN-13: Pub Date: DECEMBER 2014 Price: $ AUD $ NZD Edition: 1 Previous ISBN: Subject: Computers - Programming / General Trim Height: 24 cm Trim Width: 19 cm Pages: 512 Format: Softcover INTRODUCTION This step-by-step tutorial shows how to use PHP and MySQL to power websites with dynamic content. PHP and MySQL Web Development: A Beginner s Guide takes readers from building static pages to ones with PHP and MySQL dynamic elements. Hands-on projects get readers using new skills right away. This solutions-oriented book is organized around real-world web scenarios that demonstrate the use of PHP and MySQL. These scenarios can be directly used by readers to build web pages with dynamic content. Security topics, such as validation, authentication and encryption are addressed throughout. Each chapter teaches practical techniques that can be immediately applied Covers the basics of what drives many of today s most popular sites like YouTube.com, Amazon.com, and LinkedIn.com Ready-to-use code examples from the book will be available for download

6 Instructor s Manual available to provide classroom support ABOUT THE AUTHOR Marty Matthews (Langley, WA) is the author or coauthor of more than 80 books, including Windows 8 QuickSteps, Microsoft Excel 2013 QuickSteps, and Computing for Seniors QuickSteps.

7 OCP Oracle Database 12c Advanced Administration Exam Guide (Exam 1Z0-063) Author: Bob Bryla ISBN-13: Pub Date: NOVEMBER 2014 Price: $ AUD $ NZD Edition: 3 Previous ISBN: Subject: Computers - Certification Guides / General Trim Height: cm Trim Width: cm Pages: 752 Format: Softcover with CDROM INTRODUCTION Complete coverage of all objectives on this new OCP exam Covers all exam topics, including installation, configuration, application tuning, database management, backup and recovery, security, and more Electronic content includes two simulated practice exams and a PDF ebook Also serves as an on-the-job reference after certification DESCRIPTION This new, exclusive Oracle Press certification exam guide prepares certification candidates for the new Oracle Database 12c Advanced Administration exam. Ideal as both an exam guide and on-the-job reference, OCA Oracle Database 12c: Advanced Administration Exam Guide covers all of the exam objectives on the Advanced Administration exam in detail, including installation, configuration, application tuning, database management,

8 backup and recovery, security, and more. Passing the Advanced Administration exam qualifies candidates for the Oracle Certified Professional credential. Each chapter includes examples, practice and lab questions, and a chapter summary. An Exam Readiness Checklist is featured at the front of the book; you re ready for the exam when all of the objectives on the list are checked off. Two-Minute Drills at the end of every chapter reinforce key knowledge. Inside the Exam sections in each chapter highlight key exam topics covered. The guide also includes 150+ exam questions that match the format, topics, and difficulty of the real exam. Electronic content includes two simulated practice exams and a PDF ebook. Proven strategies to help you increase your test-taking confidence Electronic content includes two practice exams that simulate the actual exam questions and include detailed answer explanations. Score report performance assessment tool and a PDF ebook are also included. An authoritative and cost-effective self-study tool from Oracle Press ABOUT THE AUTHOR Bob Bryla, OCP, is an Oracle 8, 8i, 9i, 10g, and 11g Certified Professional with more than 15 years of experience in database design, database application development, training, and Oracle database administration. He is the primary Internet database designer and an Oracle DBA at Lands End in Dodgeville, Wisconsin. Bob is the coauthor of Oracle Database 11g DBA Handbook, OCA/OCP Oracle Database 11g All-in-One Exam Guide, and several other books.

9 PHR/SPHR Professional in Human Resources Certification Bundle Author: Dory Willer, William H. Truesdell, Tresha Moreland, Gabriella Parente-Neubert, Joanne Simon-Walters ISBN-13: Pub Date: NOVEMBER 2014 Price: $ AUD $ NZD Edition: 1 Previous ISBN: Subject: Business & Economics - Human Resources & Personnel Management Trim Height: cm Trim Width: cm Pages: 1056 Format: Other INTRODUCTION A money-saving PHR/SPHR Professional in Human Resources Certification self-study bundle Covering all six HR functional areas, PHR/SPHR Professional in Human Resources Certification Bundle is a complete self-study package for these challenging exams. PHR/SPHR Professional in Human Resources Certification All-in-One Exam Guide covers all 2012 exam objectives. Pre-assessment tests in PHR/SPHR Professional in Human Resources Certification Practice Exams help readers gauge their readiness for the five full-length practice exams included in the bundle. For a final overview of key exam topics, readers can study the printable Quick Review Guide. Readers save $$ off manufacturer s suggested retail price. Total electronic content includes: 900+ practice exam questions; Quick Review Guide; supplemental worksheets and exercises All answer choices, correct and incorrect, are accompanied by detailed explanations

10 ABOUT THE AUTHOR Dory Willer, SPHR (Clayton, CA) is a certified business and life coach with 25 years of experience as a senior human resources executive, international speaker, and training facilitator. William H. Truesdell, SPHR (Walnut Creek, CA) is President and founder of The Management Advantage, Inc., a personnel management consulting firm. Tresha Moreland, MS, SPHR, MBA (Fresno, CA) is an executive leader in human resources with more than 20 years of experience and the founder and senior principle consultant for HR C- Suite. Gabriella Parente-Neubert, MLHR, PHR (Denver, CO) is a professor of Human Resources at Webster University in Denver, Colorado, and is a Senior Human Capital Consultant at TriNet HR Corporation. Joanne Walters, PHR, MBA (Chicago, IL) is a human resources leader with more than 15 years of progressive management experience in educational, IT, and financial industries as well as non-profit organizations.

11 Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) Author: Michael Meyers ISBN-13: Pub Date: NOVEMBER 2014 Price: $ AUD $ NZD Edition: 1 Previous ISBN: Subject: Computers - Certification Guides / General Trim Height: cm Trim Width: cm Pages: 1200 Format: Hardcover with CDROM INTRODUCTION An all-new CompTIA Security+ exam guide from the top CompTIA training and exam prep expert In Mike Meyers' CompTIA Security+ Certification Guide, the bestselling author and leading authority on CompTIA A+ certification brings his highly effective methodology to IT security for the first time. Like the exam, this book goes beyond knowledge application and is designed to ensure that security personnel anticipate security risks and guard against them. Meyers' in the trenches voice and the clarity of his explanations make his books the bestselling self-study resources available for professional certification. Digital content includes: 20+ lab simulations, 1+ hour of video training from Meyers, and hundreds of practice exam questions CAQC Authorized (CompTIA Approved Quality Curriculum) and will show the CAPP (CompTIA Authorized Partner Program) seal Includes Mike's toolbox of favorite network security related freeware/shareware

12 ABOUT THE AUTHOR Mike Meyers (Houston, TX) CompTIA A+, CompTIA Network+, CompTIA Security+, MCP is the industry s leading authority on CompTIA A+ certification and the bestselling author of eight editions of CompTIA A+ Certification All-in-One Exam Guide.

13 CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401) Author: Wm. Arthur Conklin, Greg White, Dwayne Williams, Chuck Cothren, Roger Davis ISBN-13: Pub Date: DECEMBER 2014 Price: $ AUD $ NZD Edition: 4 Previous ISBN: Subject: Computers - Certification Guides / General Trim Height: 24 cm Trim Width: 19 cm Pages: 704 Format: Hardcover with CDROM INTRODUCTION Complete coverage of the latest release of CompTIA's fastest-growing certification, CompTIA Security+ Co-written by two of the leading IT security academics, CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401) offers 100% coverage of all SY0-401 exam objectives. The book features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help readers pass the exam with ease, this definitive guide also serves as an on-thejob reference for IT security professionals. Electronic content includes two practice exams and a PDF ebook CompTIA reviewed and approved: CompTIA Approved Quality Content (CAQC)

14 ABOUT THE AUTHOR Wm. Arthur Conklin, Ph.D., CompTIA Security+, CISSP, (Houston, TX) is an associate professor in the Department of Information and Logistics Technology at the University of Houston. Greg White, CompTIA Security+, CISSP, (San Antonio, TX) is an associate professor in the Department of Computer Science at the University of Texas at San Antonio. Dwayne Williams, CISSP, (San Antonio, TX) is Associate Director, Technology and Research, for the Center for Infrastructure Assurance and Security (CIAS) at the University of Texas at San Antonio. Roger L. Davis, CISSP, CISM, CISA, (San Antonio, TX) is an operations manager at the Church of Jesus Christ of Latter-day Saints. Chuck Cothren, CISSP, (San Antonio, TX) is a senior consultant at Symantec Corporation.

15 Healthcare Information Privacy and Security Author: Sean Murphy, Dennis Seymour ISBN-13: Pub Date: NOVEMBER 2014 Price: $ AUD $ NZD Edition: 1 Previous ISBN: Subject: Computers - Security / General Trim Height: cm Trim Width: cm Pages: 560 Format: Softcover INTRODUCTION A global guide to securing and protecting sensitive personal patient healthcare information Written by two healthcare information security and privacy experts, this definitive resource fully addresses security and privacy controls for patient healthcare information. Healthcare Information Privacy and Security introduces readers to the realm of healthcare and patient health records with a complete overview of healthcare organization, technology, data, occupations, roles, and third parties. Readers will learn best practices for healthcare information security and privacy with coverage of information governance, risk assessment and management, and incident response. Written for a global audience, this comprehensive guide covers U.S. laws and regulations as well as those within the European Union, Switzerland, and Canada. The book covers: The healthcare industry and the regulatory environment Privacy and security in healthcare Information governance, risk assessment, and risk management

16 ABOUT THE AUTHOR Sean P. Murphy, HCISPP, FACHE, CPHIMS, CISSP-ISSMP, CIPP-IT, is a vice president at Leidos Health and serves as the organization s HIPAA/health information security officer. He was a lieutenant colonel in the U.S. Air Force Medical Service Corps and chairperson of the Health Information Management & Systems Society (HIMSS) Privacy and Security Committee. Dennis M. Seymour, HCISPP, CISSP, ITIL, is the senior security architect at Ellumen, Inc. A recognized healthcare information security expert, he has served on numerous U.S. government and industry committees, including chair of the HIMSS Medical Device Security Task Force, technical security advisor for the Veterans Health Administration, and chair of the Health Information Management & Systems Society (HIMSS) Privacy and Security Committee.

Title: Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, 2/e

Title: Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, 2/e Title: Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, 2/e Authors: Christopher Elisan, Michael Davis, Sean Bodmer, Aaron LeMasters APRIL 2015 9780071823074 Pre ISBN info: 9780071591188

More information

Social Engineering in IT Security: Tools, Tactics, and Techniques Author: Sharon Conheady ISBN-13: 9780071818469

Social Engineering in IT Security: Tools, Tactics, and Techniques Author: Sharon Conheady ISBN-13: 9780071818469 Social Engineering in IT Security: Tools, Tactics, and Techniques Author: Sharon Conheady ISBN-13: 9780071818469 Pub Date: AUGUST 2014 Price: $ 55.00 AUD $ 62.00 NZD Edition: 1 Previous ISBN: Subject:

More information

Windows 8.1 for Seniors QuickSteps Author: Marty Matthews ISBN-13: 9780071832588 Pub Date: APRIL 2014 Price: $ 35.95 AUD $ 39.

Windows 8.1 for Seniors QuickSteps Author: Marty Matthews ISBN-13: 9780071832588 Pub Date: APRIL 2014 Price: $ 35.95 AUD $ 39. Windows 8.1 for Seniors QuickSteps Author: Marty Matthews ISBN-13: 9780071832588 Pub Date: APRIL 2014 Price: $ 35.95 AUD $ 39.00 NZD Edition: 1 Previous ISBN: Subject: Computers - Operating Systems / Windows

More information

C# 5.0: A Beginner's Guide Author: Pat McGee ISBN-13: 9780071835831 Pub Date: JANUARY 2015 Price: $ 55.00 AUD $ 60.00 NZD

C# 5.0: A Beginner's Guide Author: Pat McGee ISBN-13: 9780071835831 Pub Date: JANUARY 2015 Price: $ 55.00 AUD $ 60.00 NZD C# 5.0: A Beginner's Guide Author: Pat McGee ISBN-13: 9780071835831 Pub Date: JANUARY 2015 Price: $ 55.00 AUD $ 60.00 NZD Edition: 1 Previous ISBN: Subject: Computers - Programming Languages / C# Trim

More information

Training Course ECSA/LPT

Training Course ECSA/LPT Brochure More information from http://www.researchandmarkets.com/reports/2226534/ Training Course ECSA/LPT Description: The EC-Council ECSA/LPT EC-Council Certified Security Analyst/ Licensed Penetration

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft) Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

LabSim. Anytime, anywhere learning. self-paced learning. www.gtslearning.com

LabSim. Anytime, anywhere learning. self-paced learning. www.gtslearning.com Anytime, anywhere learning www.gtslearning.com Love learning... LabSim from gtslearning offers the very best blend of learning tools, developed specifically to get students through their certification

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE 2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides

More information

Certification Programs

Certification Programs Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 sfisher@mibankers.com (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Presented by Evan Sylvester, CISSP

Presented by Evan Sylvester, CISSP Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Training Package: Business Intelligence Developer SQL Server 2008 (7-448; 70-452)

Training Package: Business Intelligence Developer SQL Server 2008 (7-448; 70-452) Brochure More information from http://www.researchandmarkets.com/reports/2226589/ Training Package: Business Intelligence Developer SQL Server 2008 (7-448; 70-452) Description: The Microsoft MCITP Business

More information

Active Learning with the CyberCIEGE Video Game

Active Learning with the CyberCIEGE Video Game Active Learning with the CyberCIEGE Video Game 2011 Michael F. Thompson and Dr. Cynthia E. Irvine Department of Computer Science Naval Postgraduate School Monterey, CA USA The CyberCIEGE Educational Video

More information

Integrated Threat & Security Management.

Integrated Threat & Security Management. Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate

More information

COMPUTER REPAIR III New - August 2014 Joseph Ramm Angelo Valdez

COMPUTER REPAIR III New - August 2014 Joseph Ramm Angelo Valdez COMPUTER REPAIR III New - August 2014 Joseph Ramm Angelo Valdez I. COURSE DESCRIPTION Computer Repair III is a full year study designed as a course to prepare the student Test Out s Security Pro certification

More information

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013 Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:

More information

DoD IA Training Products, Tools Integration, and Operationalization

DoD IA Training Products, Tools Integration, and Operationalization Defense Information Systems Agency A Combat Support Agency DoD IA Training Products, Tools Integration, and Operationalization Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students

More information

Information Security Engineering

Information Security Engineering Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information

More information

Certification Programs

Certification Programs Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security

More information

Shon Harris s Newly Updated CISSP Materials

Shon Harris s Newly Updated CISSP Materials Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Training Course 70-432 SQL Server 2008 Implementation and Maintenance

Training Course 70-432 SQL Server 2008 Implementation and Maintenance Brochure More information from http://www.researchandmarkets.com/reports/2226526/ Training Course 70-432 SQL Server 2008 Implementation and Maintenance Description: This course provides you with the knowledge

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER The Rise of Dell Training & Certification Sponsored by: Dell Inc. Ellen H. Julian Michael

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

DEVELOP ROBOTS DEVELOPROBOTS. We Innovate Your Business

DEVELOP ROBOTS DEVELOPROBOTS. We Innovate Your Business DEVELOP ROBOTS DEVELOPROBOTS We Innovate Your Business Security & Encryption Develop Robots has helped banks, real estate companies, law firms and many other businesses to secure and encrypt their database

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

CompTIA Security+ (Exam SY0-410)

CompTIA Security+ (Exam SY0-410) CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Certified Business Analysis Professional (CBAP) Certification

Certified Business Analysis Professional (CBAP) Certification eskills360 Certification Matrix as of Wednesday, August 07, 2013 When reviewing the contents of this document please keep the following points in mind: 1. Exam requirements are subject to change without

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

InfoSec Academy Pen Testing & Hacking Track

InfoSec Academy Pen Testing & Hacking Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Expert Guide: How to plan for a successful career in information security

Expert Guide: How to plan for a successful career in information security E-Guide Expert Guide: How to plan for a successful career in information security Information security professionals carry valuable skills, but they're still not immune to today's economic downturn. In

More information

About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators

About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators Profile MicroSolved, Inc. is an Ohio corporation with a Dun and Bradstreet number of 022904119. Since 1992, MSI has

More information

EC-Council. Program Brochure. EC-Council. Page 1

EC-Council. Program Brochure. EC-Council. Page 1 Program Brochure Page 1 Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

ASK PC Certified Information Systems Security Expert - CISSE

ASK PC Certified Information Systems Security Expert - CISSE Course Description As part of our mission to spread the awareness of IT security in the Middle East, we understand that an Arabic course will be valuable for native speakers. This is a comprehensive course

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing Expert Reference Series of White Papers 10 Security Concerns for Cloud Computing 1-800-COURSES www.globalknowledge.com 10 Security Concerns for Cloud Computing Michael Gregg, Global Knowledge Instructor,

More information

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis Training Brochure Synopsis This Four-day practical training is designed for Information Systems auditors, application

More information

E-Books FULL E-BOOK LIBRARY LISTING. CONTACT US ON 0800 160 1161 VISIT US AT http://itonlinelearning.com/

E-Books FULL E-BOOK LIBRARY LISTING. CONTACT US ON 0800 160 1161 VISIT US AT http://itonlinelearning.com/ E-Books FULL E-BOOK LIBRARY LISTING CONTACT US ON 0800 160 1161 VISIT US AT http://itonlinelearning.com/ o Pro WPF in C# 2010: Windows Presentation Foundation in.net 4.0 o Professional C# 4 and.net 4 o

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Cyber Exercises, Small and Large

Cyber Exercises, Small and Large First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,

More information

Training Course 70-515 Developing Web Applications on.net 4

Training Course 70-515 Developing Web Applications on.net 4 Brochure More information from http://www.researchandmarkets.com/reports/2226566/ Training Course 70-515 Developing Web Applications on.net 4 Description: QuickCert's Microsoft Exam 70-515 TS: Web Applications

More information

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many

More information

Learning Course Curriculum

Learning Course Curriculum Learning Course Curriculum Security Compass Training Learning Curriculum. Copyright 2012. Security Compass. 1 It has long been discussed that identifying and resolving software vulnerabilities at an early

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation Inno Eroraha, President 22375 Broderick Drive Suite 235 Dulles, VA 20166 SBA 8(a) Certified SDB GSA Contract # GS-35F-0288Y VA DCJS # 11-5605

More information

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT ASL IT SECURITY XTREME XPLOIT DEVELOPMENT V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: The most dangerous threat is the one which do not have a CVE. Until now developing reliable exploits

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

Education & Training Plan. Human Resource Management w/ PHR Exam Prep Certificate Program

Education & Training Plan. Human Resource Management w/ PHR Exam Prep Certificate Program Office of Professional & Continuing Education 301 OD Smith Hall Auburn, AL 36849 http://www.auburn.edu/mycaa Contact: Shavon Williams 334-844-3108 Last revised June 4, 2014 Auburn University is an equal

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

WINTER 2016 ONLINE CLASSES For West Bloomfield Schools Adult Education

WINTER 2016 ONLINE CLASSES For West Bloomfield Schools Adult Education 1 WINTER 2016 ONLINE CLASSES For West Bloomfield Schools Adult Education What to Expect with these Online Certificate Courses All classes meet online. Just turn on your computer, go to the Internet and

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY?

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY? E-Guide CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY? SearchCloud Security M ore and more certifications are being created around cloud security. An expert looks at some of the more prominent

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 276 Windows Security Management I. Basic Course Information A. Course Number & Title: CISY-276 Windows Security Management B. Date of Revision: Spring

More information

Information Technology, Certified Internet. Webmaster & Web Design. Making home learning easy... www.ukdlp.com

Information Technology, Certified Internet. Webmaster & Web Design. Making home learning easy... www.ukdlp.com Information Technology, Certified Internet Webmaster & Web Design Making home learning easy... www.ukdlp.com Information Technology, CIW & Web Design Studying For Information Technology, CIW & Web Design

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 275 UNIX and Linux Security Management I. Basic Course Information A. Course Number & Title: CISY-275 - UNIX and Linux Security Management B. Date of

More information

PREREQUISITE FOR ALL ONLINE CLASSES: You must have basic Computer and Internet skills with a highspeed Internet connection and an E-mail address.

PREREQUISITE FOR ALL ONLINE CLASSES: You must have basic Computer and Internet skills with a highspeed Internet connection and an E-mail address. SPRING/SUMMER 2015 ONLINE CLASSES What to Expect with these Online Courses All classes meet online. Just turn on your computer. Go to the Internet. Enter Online classroom. Your instructor will give you

More information

Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI

Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI Desktop Security Overview and Technology Guidance Michael Ramsey Network Specialist, NC DPI Desktop Security Best practices for both the technical type and the typical user Defensive Layering Top Vulnerabilities

More information

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright 2015. Security Compass. 1

LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3. Copyright 2015. Security Compass. 1 LEARNING CURRICULUM SECURITY COMPASS TRAINING 2015 Q3 Copyright 2015. Security Compass. 1 CONTENTS WHY SECURITY COMPASS...3 RECOMMENDED LEARNING PATHs...4 TECHNICAL LEARNING PATHS...4 BUSINESS / SUPPORT

More information

Penetration testing & Ethical Hacking. Security Week 2014

Penetration testing & Ethical Hacking. Security Week 2014 Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information

More information

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification

More information

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee. New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone

More information

QuickBooks 2012 What s New Technical Demo and QuickBooks at Year End using QuickBooks Accountant 2012

QuickBooks 2012 What s New Technical Demo and QuickBooks at Year End using QuickBooks Accountant 2012 QuickBooks 2012 What s New Technical Demo and QuickBooks at Year End using QuickBooks Accountant 2012 Learn about new features, see them in action Learn how to efficiently work with your client s files

More information

ITS425: Ethical Hacking and Penetration Testing

ITS425: Ethical Hacking and Penetration Testing ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The

More information

Presented By: Bryan Miller CCIE, CISSP

Presented By: Bryan Miller CCIE, CISSP Presented By: Bryan Miller CCIE, CISSP Speaker Introduction Risks Controls Why We Should Pen Test Why We Don t Pen Test Tools & Techniques Low Hanging Fruit Case Studies Copyright 2010 Syrinx Technologies

More information

Alisha Hall msa_hs@yahoo.com

Alisha Hall msa_hs@yahoo.com Alisha Hall msa_hs@yahoo.com Summary of Qualifications Education Proven organizational and leadership skills Enthusiastic team member and problem solver with outstanding communication skills Skilled in

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

THREAT VISIBILITY & VULNERABILITY ASSESSMENT THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

State of IT Skills Gap

State of IT Skills Gap State of IT Skills Gap 2014 Summary Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org IT Industry Overview Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org

More information

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference

More information

Networked Systems Security

Networked Systems Security Unit 32: Networked Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose J/601/7332 BTEC National The aim of this unit is to ensure learners know about the

More information

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services... Contents Company Biography...4 Qualifications & Accolades...5 Executive Leadership Team...6 Products & Services...8 Company History...10 Facts Founded: 2000 CEO: Brad Caldwell Website: www.securitymetrics.com

More information

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS OVERVIEW MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS 2016 Coursework to Meet Real World Demands The best. Made better. SANS graduate programs are the ultimate expression

More information

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Mobile Application Security Sharing Session May 2013

Mobile Application Security Sharing Session May 2013 Mobile Application Security Sharing Session Agenda Introduction of speakers Mobile Application Security Trends and Challenges 5 Key Focus Areas for an mobile application assessment 2 Introduction of speakers

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the

More information

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training

More information