Information Technology Security

If you can't find what you want, Ask Us.

Refine Your Results


Filter by Category




Showing 1-20 of 155 results Sort by:


  • 1 Request Info

    Certificate in Cybersecurity

    The Certificate in Cybersecurity program is a suite of online courses offering information security training in Asset Security, Communications and Network Security, Identity and Access Management, Security and Risk Management, Security Assessment and Testing, Security Engineering, Security Operations, and Software Development Security.
  • 2 Request Info

    Information Security for End Users

    +Introduction to Information Security +Using your Desktop Computer and Mobile Devices Safely +Using E-mail, the Internet, and Social Media Safely in a Corporate Environment
  • 3 Request Info

    Securing User Accounts

    Securing User Accounts: Fundamental Security Concepts Securing User Accounts: Authorization, Registration, and Passwords Securing User Accounts: Logon, Logoff, Account Changes, and Attack Mitigation
  • 4 Request Info

    Cryptography Fundamentals

    Cryptography Fundamentals: Defining Cryptography Cryptography Fundamentals: Applying Cryptography
  • 5 Request Info

    Foundations of iOS Security

    iOS Security Architecture and Application Data Protection Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices
  • 6 Request Info

    Foundations of Android Security

    Android Architecture, Protection, and Development Best Practices Android Security Vulnerabilities, Testing, and Enterprise Considerations
  • 7 Request Info

    OWASP Top 10

    Introduction to OWASP and the Top 10 OWASP Mitigations for .NET
  • 8 Request Info

    Certified Secure Software Lifecycle Professional (CSSLP)

    CSSLP: Secure Software Concepts CSSLP: Secure Software Requirements CSSLP: Secure Software Design CSSLP: Secure Software Implementation and Coding CSSLP: Secure Software Testing CSSLP: Software Acceptance, Deployment, Operations, Maintenance, and Disposal CSSLP: Supply Chain and Software Acquisition
  • 9 Request Info

    Risk Reduction against Regulatory Enforcement by the Investment Advisory Community Panel

    This training will help make you aware of the importance of your clean enforcement record. We will explore what a compliance program is and how to protect against each kind of exposure. You will be trained about protecting your compliance reputation to make it a profit enhancer. How the world of finance deals with compliance and how you can use your favorable compliance record as magnet for investors will be explored. How protecting your compliance record against enforcement action will be focused upon and use of special insurance to protect your compliance record and bottom line will be explained. Expanding the depth and breadth of the markets to which you sell by creating a multiplier of revenue with clean compliance to further increase your market reach. You will be instructed about how and when to utilize this successful strategy for growing your enterprise
  • 10 Request Info

    Cyber Security Incident Response Program (CSIRT) and Plans

    Cyber Security Incident Response Program is a must for any organization using the Internet. It must be robust yet flexible. Unfortunately in spite of all of the Cyber Events, many companies are taking a long time to respond. Teams must be trained and have written procedures. Time is critical in responding to an incident. Every incident costs the organization, money and reputation, In this session you will learn: Best practices and the standards that make up a great Cyber Incident Response Program Learn what teams should be part of your CSIRT Team Get insight into how to create CSIRT Playbooks and Management Plans Learn how to conduct inexpensive tests of the CSIRT Teams and Programs This program will help you determine your current Gaps and provide milestones for correcting the Gaps
  • 11 Request Info

    Webinar on Key Steps to Successful Project Management Principles

    A project is a temporary endeavor undertaken to create a unique product, service or result. Project management is the application of knowledge, skills, tools and techniques to project activities to meet the project requirements. Companies have come to recognize the importance of project management in helping them achieve their objectives and have added this to their organizational structure. Project management started with the construction industry and has evolved over time. It is now principally used for Information Technology projects. However, project management can be used and applies to any temporary endeavor, no matter how large or small.
  • 12 Request Info

    Human Factors and Predicate Combination Products 2017

    The FDA has placed significant emphasis on the role of Human Factors in the approval of devices used for medical purposes. There are several current guidance documents and new proposed Draft Guidance documents. This seminar will compare these Guidance documents. Additionally, strategic recommendations will be presented on how to implement these requirements into the medical device design, development and approval processes. Finally, Human Factors methods and best practices will be covered that the FDA is requiring. Why should you attend: Are you familiar with the role of Human Factors with respect to combination products and the FDA requirements? Are you current on the FDA's current perspectives on Human Factors? Human Factors has become increasingly important to the FDAs approval of medical devices. It is a part of the design and development of the device and the collateral information, e.g., labeling, IFUs, and training. Incorporating Human Factors into the device development
  • 13 Request Info

    Implementing a Technology Transfer Process - 2017

    Overview: It will cover the concepts associated with transferring the scientific technology needed to manufacture the product, processes to ensure the receiving manufacturing facility is ready for the product and tools and templates to help capture the knowledge. Why Should you attend: However execution of that transfer is complex involving the interactions of many disciplines across an organization.
  • 14 Request Info

    HIPAA for the Compliance Officer 2017- Before 30 April 50% Discount for its All Seminars

    I will be going into great detail regarding you practice or business and how it relates to the HIPAA Security/Privacy Rule, Areas covered will be history of HIPAA, privacy vs security, business associates, changes for 2016, audit process, paper based PHI, HIPAA and suing, texting, email, encryption, medical messaging, voice data and much, much, more I will uncover myths versus reality as it relates to this very enigmatic law based on over 600 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will also speak to real life audits conducted by the Federal government (I've been on both sides of these audits) what your highest risks are for being fined (some of the risk factors may surprise you). Read More :
  • 15 Request Info

    Learn how to streamline your payroll processing procedures for maximum efficiency 2017

    This course covers a very broad range of topics from worker classification, to employee classification, to establishing methods and rates of pay, what must be included in the rate of pay, hours that must be compensated as worked time, required benefits, de minimus working fringes, withholdings and deductions from pay, voluntary deductions, child support and garnishment orders, payroll reporting, analysis of risks of noncompliance, proper documentation of your policies and procedures and record retention requirements. We will show where to find the laws, how to interpret them and how to apply them in the most effective ways.
  • 16 Request Info

    Understanding Compliance Program Requirements -HIPAA 2017

    Being in compliance with HIPAA involves not only ensuring that you provide the appropriate patient rights and controls on your uses and disclosures of Protected Health Information; but that you also have the proper policies and procedures in place. If audited or the subject of a compliance review, you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards. This starts with the fundamentals of a HIPAA compliance program. If your healthcare practice, business, or organization needs to understand how to put a HIPAA compliance program in place or make sure the current program is adequate and can withstand government scrutiny, please join us for this informative and interactive two-day training course.
  • 17 Request Info

    Introduction to Risk Management and Quality System Integration 2017

    Gaps and/or incorrect or incomplete implementation of safety functionality can delay or make the certification/approval of medical products impossible. Most activities cannot be retroactively performed since they are closely linked into the development lifecycle. Diligent, complete and correct implementation of risk management from the start of product development is therefore imperative. This course will introduce all the steps necessary to design, implement and test critical medical devices in a regulatory compliant environment. This course will additionally address the software risk management and the resulting interfaces to device level risk management. To comprehensively summarize all risk related activities and to demonstrate the safe properties of a device, the 'Safety Case' or 'Assurance Case' document is a well-established method to collect all safety related information together in one place. This documentation will most likely become mandatory for all devices (currently onl
  • 18 Request Info

    Writing and implementing effective SOP 2017

    An SOP is a meticulous step-by-step description of how to do a task that leave no chance for errors and divergence. Writing a good SOP is not an easy job. It requires a firm understanding of the task to be described, an ability to describe in specific unique to that laboratory. Writing, implementing, maintaining and assessing, revising an SOP are all different and necessary jobs. Many people must continuously be involved in these steps. Read More :
  • 19 Request Info

    Data Integrity FDA/EU Requirements and Implementation 2017

    There is no doubt that data integrity is the current and future inspection focus of all regulatory health care agencies. More than 50% inspection reports such as 483's and Warning Letters quote data integrity as deviations from GxP regulations. This new two-day course provides the regulatory background and guides attendees through the complete record lifecycle from data entry or acquisition through evaluation, reporting, archiving and retrieval. It also helps to fully understand not only the text but also the meaning of related regulations such as FDA's Part 11 and the EU/PICS Annex 11. Read More :
  • 20 Request Info

    Tougher Import Rules for FDA Imports in 2017

    FDA and the Customs and Border Patrol Service (CBP) have become increasingly sophisticated and equally demanding in the submission of import information and adherence to government procedures. Firms that fail to understand and properly execute an import and export program find their shipments delayed, detained or refused. As of December 2016, FDA and CBP officially implemented the Automated Commercial Environment (ACE) entry filing system. You either meet ACE requirements or face entry refusals and monetary penalties of up to $10,000 per offense. Other factors can derail the expectation of a seamless import entry process. The course covers detailed information about the roles and responsibilities of the various parties involved with an import operation and how to correct the weakest link(s) in the commercial chain. The course will include tips on how to understand FDA's thinking, negotiate with the FDA and offer anecdotal examples of FDA's import program curiosities.