Women In Security Magazine Issue 13

Page 106

THE LEARNING HUB

CYBERACES: CYBER SECURITY TRAINING COURSE We live in a networked world keeping in touch with friends, paying bills, operating a city’s energy grid, strengthening national security - it happens online. The need to secure our networks has never been greater. The number of cyber-attacks is increasing dramatically and there aren’t enough people with the right skills to fill missioncritical jobs needed to ensure our security online. Developed from our library of professional development curriculum, SANS Cyber Aces Online is an online course that teaches the core concepts needed to assess and protect information security systems. And it’s free!

VMWARE LEARNING: VMWARE TRAINING Internet security is one of many free online courses that are offered by WMware Training, which offers a suite of courses having to do with computers and a business environment. VMware Learning provides training and certification programs to grow your skills and leverage opportunities available with VMware solutions. Helps grow your career and advance your credibility with employers, colleagues, and clients. VMware Learning Paths are designed to help you identify course needs based on your VMware product focus, your role and skill level.

The course material is updated regularly to keep pace with changes in technology and threat landscape. It is an engaging, selfpaced, easy-to-use combination of tutorials and videos where learners will come away with a solid foundation for building a career in cybersecurity or just strengthening their own home network.

SAYLOR.ORG: CS406: INFORMATION SECURITY This course covers information security principles, an area of study that engages in protecting the confidentiality, integrity, and availability of information. Information security continues to grow with advancements in technology – as technology advances, so do threats, attacks, and our efforts to mitigate them. In this course, we discuss the modes of threats and attacks on information systems. We also discuss an important area of threat mitigation that saw rapid development in the twentieth century: cryptography. Information security is concerned with user identification and authentication and access control based on individual or group privileges. The basic access control models and the fundamentals of identification and authentication methods are included in this course.

It’s available as open courseware so learners can take it anytime and anywhere.

VISIT HERE

106

W O M E N I N S E C U R I T Y M A G A Z I N E

VISIT HERE

VISIT HERE

M A R C H • A P R I L 2023


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

ACCIDENTALLY IN CODE

2min
page 118

THE LEARNING HUB

17min
pages 108-117

THE LEARNING HUB

3min
pages 106-107

LISA ROTHFIELD-KIRSCHNER

2min
pages 102-103

STUDENT IN SECURITY SPOTLIGHT

16min
pages 94-101

WHY ZERO TRUST NEEDS SYSTEMS ENGINEERING

4min
pages 88-90, 92

ARE SOCS THE NEW BLACK?

3min
pages 86-88

Agreeing with your partner about how your child uses tech

2min
page 84

IN TIMES OF CONFLICT, WOMEN ARE STEPPING UP FOR THE CYBER FIGHT

6min
pages 80-84

LEADING EARLY: IDENTIFYING LEADERSHIP QUALITIES IN YOURSELF FOR A MORE FULFILLING CAREER IN SECURITY

4min
pages 78-79

SPOTTING AND REPORTING A SCAM

3min
pages 76-77

THE WEIGHT OF AUTHORITY

4min
pages 74-75

APAC NATIONS OFFERED FREE TRAINING TO COUNTER QUANTUM COMPUTING THREATS

1min
page 73

IS IT TIME FOR A PERSONAL C-I-A TRIAD?

4min
pages 70-72

“From little things big things grow”

1min
page 66

JOB BOARD

4min
pages 64-66

JOB BOARD

4min
pages 62-63

IT TAKES A GUIDING LIGHT TO FIND A WAY THROUGH THE DARKNESS

6min
pages 58-61

THE NONLINEAR ROAD TO CISO

3min
pages 56-57

FIVE HIGH PERFORMING HABITS TO HELP YOU REACH THE NEXT LEVEL OF BEST SELF

6min
pages 52-56

MENTORING IN 2023: CREATING THE ‘PERFECT PAIR’

4min
pages 48-50

Events

0
page 46

Let’s make 2023 a year to remember!

3min
pages 44-45

TALENT BOARD

4min
pages 40-43

TALENT BOARD

1min
pages 38-39

2023 NEW ZEALAND WOMEN IN SECURITY AWARDS

4min
pages 35-37

WHAT’S HER JOURNEY?

23min
pages 16-26, 28-34

All cybercrime victims are equal, but…

1min
page 14

DESPITE AMBITIONS FOR EQUALITY, SECURITY’S GENDER SPLIT IS STILL FALLING SHORT OF EXPECTATIONS

6min
pages 10-14

FROM THE PUBLISHER

3min
pages 2-5, 7
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.