Home > Topics > Certification > Other IT

Other IT


Joseph Muniz

Modern organizations rely on specialists to keep cyber criminals at bay. How can you demonstrate that you have the necessary skills to gain a desirable job in a security-related position? Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains the value of achieving the Cisco SCYBER certification, which is designed around responding to cyber attacks.

In this video excerpt from Oracle Certified Associate, Java SE 7 Programmer Exam (1Z0-803) Complete Video Course, Java instructor, architect, and programmer Simon Roberts introduces the course, what he covers in the course, how the course is structured, and his teaching approach.

This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.

This chapter introduces the trusted computer base and the ways in which systems can be evaluated to assess the level of security to help you prepare for the CISSP exam.

See More Other IT Articles


John  Traenkenschuh

As 2015 winds down to a close, I reflect on what 2015 brought IT.

John  Traenkenschuh

New Mac OS X Means New Tricks...

John  Traenkenschuh

Wow, who abducted our Windows 10 assumptions and left this smooth running and easy-to-use Operating System in their place?

Jamie Shoup

Holiday shopping can be difficult when trying to find something for those high-level techie-types. Gadgets go out of style and it’s hard to know if a specific technology syncs up with what they currently have --- one gift that keeps on giving is learning.

See More Other IT Blogs