Cyber Security Courses

Program on Cyber Security Studies

Protect yourself from Sony-style hacks with these cyber security resources – The Next Web

Protect yourself from Sony-style hacks with these cyber security resourcesThe Next WebThe Cyber Security Developer Bundle includes six courses with 60 hours of tutorials that cover essential topics like cryptography, encryption methods, application attacks, VPN protocols, website hacking methods, preventing SQL injection attacks and more.

Cyber Security Honor (smunews?format=xml)

Summary: SMU's Fred Chang receives the “Security 7” Award for being at the top of his profession.
DALLAS (SMU) – SMU's cyber warrior, Fred Chang, has been named an Information Security Magazine "Security 7" award winner, which annually spotlights information security leaders at the top of their profession.

Fred Chang
Chang, who is former research director for the National Security Agency (NSA), joined the SMU faculty in September 2013 as the first Bobby B. Lyle Centennial Distinguished Chair in Cyber Security. He was named founding director of the Lyle School of Engineering's Darwin Deason Institute for Cyber Security at the announcement of its creation in Jan. 2014.
"The Security 7 award recognizes security professionals who are making important contributions to their organizations and the security community," said Kathleen Richards, features editor for Tech Target Information Security Magazine and SearchSecurity.com. "Frederick Chang is one of this year's winners because he has served the industry in government, commercial and research capacities and is now tackling one of the security industry's greatest challenges – educating the next generation of security specialists."
"I am proud to be recognized by Information Security Magazine for work that I am passionate about," said Chang. "Building …

Philippines security summit 2012

The growing number of attacks on our cyber networks has become one of the most serious economic and national security threats our nation faces.

The aim of this Annual Summit is to equip us with knowledge to keep our corporate & civilian networks secure, and secure the cyberspace and critical infrastructure on which we all depend. That means working across government agencies, partnering with the private sector, and empowering the general public to create a safe, secure, and resilient cyber environment, and promote cyber security knowledge and innovation.

Whether you are already an IT Security practitioner or someone who just wants better understanding of the current security threats, you won't want to miss the PHILIPPINE'S CYBER SECURITY SUMMIT 2012.

8:00a — 8:45a Registration
8:45a — 9:00a Opening Keynote
9:00a — 10:30a Global Security Trends and Threats
– Highlights the threats targeting your organization's valuable assets
– State of the art attacks method uncovered in our data breaches investigation
10:30a — 10:45a Coffee Break
10:45a — 12:00n Ethical Hacking & Countermeasures
– Advance Attacks have a growing number of sophisticated targeted attacks in our networks every year. How can organizations effectively detect and respond to this.
12:00nn — 1:00p Lunch Break
1:00pm — 2:15p Digital Forensics
– Available forensic tools in the market today to successfully investigate and document many cybercrimes.
2:15p — 3:15p Cyber Squad Awareness & Alliances in the Philippines
– Key agencies and alliances in the Philippines tasked to counter cyber crimes and threats
3:15p — 3:30p Coffee Break
3:30p — 3:30p BONUS: Available Training and Certification in IT Security
3:30p — 4:00p Q&A
4:00p -4:15p Summit Wrap-Up

Who Should Attend:
– CEOs
– CIOs
– Government
– Law Enforcement
– Information System Security Managers
– Information System Security Officers
– Privacy Officers
– Information Technology Administrators
– Information Technology Directors
– Information Management Officers
– Network Administrators
– Security Engineers
– Security Education
– Training Specialists
– Industry and Academia Professionals with Cyber Security Specialties

Registration Pricing:
The registration fee includes:
– Demo Labs and Lectures
– Networking Events
– Exhibit Hall Access
– Summit Presentations and Materials
– Raffle Ticket (Chance to WinGadgets)
– Sponsors' Give-away
– Discount Vouchers on GlobalKnowledge Courses
– Lunch and AM/PM Snacks.

Cyber threat security


Posted in Security Guard Training.