Home > Articles > Certification > Other IT

Other IT

85 Items

Sort by Date | Title

Why Should You Consider Passing the SCYBER Exam?
Jan 5, 2016
Modern organizations rely on specialists to keep cyber criminals at bay. How can you demonstrate that you have the necessary skills to gain a desirable job in a security-related position? Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, explains the value of achieving the Cisco SCYBER certification, which is designed around responding to cyber attacks.
Video: Oracle Certified Associate, Java SE 7 Programmer Exam (1Z0 803): Course Introduction
Mar 27, 2015
In this video excerpt from Oracle Certified Associate, Java SE 7 Programmer Exam (1Z0-803) Complete Video Course, Java instructor, architect, and programmer Simon Roberts introduces the course, what he covers in the course, how the course is structured, and his teaching approach.
Security Program and Policies: Governance and Risk Management
Apr 16, 2014
This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
CISSP Exam Cram: Security Architecture and Models
Feb 4, 2013
This chapter introduces the trusted computer base and the ways in which systems can be evaluated to assess the level of security to help you prepare for the CISSP exam.
Hands-on Guide to the Red Hat Exams: System Logging, Monitoring, and Automation
Apr 28, 2011
This chapter covers working with Syslog, monitoring system performance, and automation with cron and at.
SCEA for Java EE Exam Prep: Web Tier Technologies
Mar 29, 2010
In preparation for the SCEA for Java EE exam, this chapter covers the area of presentation in the JEE platform and focuses on presentation technologies designed to render in a standards-compliant HTML browser.
Tips to Secure Your Small Business Wi-Fi Network
Jul 21, 2009
Eric Geier presents twelve critical tips to consider when securing a small business wireless network.
Tips to Secure Your Home Wi-Fi Network
Jul 10, 2009
Eric Geier points out important steps beyond encryption to secure your home Wi-Fi network.
Network Security Inside and Out: An Interview with Arvind Durai and Ray Blair
Jul 1, 2009
Arvind Durai and Ray Blair talk about the current landscape for enterprise security.
CISSP Exam Cram: Business Continuity and Disaster Recovery Planning
Jun 8, 2009
This chapter covers the steps that make up the business continuity plan process to pass the business continuity and disaster recovery domain portion of the CISSP exam.
CISSP Practice Questions: Application Security
Jun 8, 2009
This chapter provides sample questions (with answers and explanations) to help you prepare for the CISSP exam.
CompTIA Security+ Infrastructure Basics
Jun 8, 2009
This chapter discusses the concepts of identifying and mitigating network infrastructure threats and alerts you to the most common attacks.
Network Security Using Cisco IOS IPS
Jun 8, 2009
This chapter describes the functions and operations of IDS and IPS systems.
Understanding Cisco Secure Firewall Services Module 4.x Routing and Feature Enhancements
Jun 4, 2009
This chapter discusses the key additions to the Cisco Secure Firewall Services Module (FWSM) 4.x code.
Online Security: A Quest to Be One Step Ahead of the Bad Guys
May 29, 2009
Linda Leung interviews security expert Jamey Heary about network security and the world of "white hats" versus "black hats."
Controlling Access and Configuring System Messaging in Solaris 10
May 22, 2009
This chapter covers two main topics: Role-Based Access Control (RBAC) and system messaging (syslog) as they relate to the CX-310-202 exam.
Solaris 10 System Administration Exam Prep: Managing System Processes
Oct 7, 2008
Bill Calkins explains how to view processes, understand the effects signals have on processes, and how to manage processes.
MCTS 70-640 Exam Cram: Group Policy and Active Directory Security
Sep 30, 2008
Learn to use Group Policy to create and enforce a secure computing environment.
VoIP Threat Taxonomy
Sep 24, 2008
This chapter categorizes the main threats against VoIP service and explains their impact and possible methods of protection.
Security Features on Switches
Jul 4, 2008
This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.

Page 1 2 3 4 5 Next >