12 minute read
THE LEARNING HUB
Master Of Cyber Security And Forensics
"Fight crimes using cyber forensics. The 100% online Master of Cyber Security and Forensics at the UniSC consists of 14 courses you can complete within two years.You’ll analyse case studies and real-world data and gain insider knowledge as you learn more about digital and network forensics, programming, cyber laws, cryptocurrency, research and more.As part of the program, you’ll graduate with your master’s AND the industry certifications employers look for beyond a degree. These 3rdparty certifications are globally recognised. They demonstrate your experience level and knowledge and put you ahead of graduates with the same degree. Microsoft (Security, Compliance, Identity Fundamentals) ITS Python"
VISIT HERE
Ict30120 Certificate Iii In Information Technology
This course will help you build essential industry skills that are transferable across different sectors – including critical thinking, problem solving, presenting and customer service. You will learn how to support a range of technologies, processes, policies and clients.The ICT30120 Certificate III in Information Technology will prepare you for roles in a range of ICT disciplines including Help Desk Officer, ICT Operations Support, Network Support Officer, ICT Technician and Web Development.If you want to become an advanced ICT user, or if you want to progress to higher level IT qualifications, this accredited and nationallyrecognised course could be what you’re looking for.
Visit Here
THE COMPLETE CYBER SECURITY COURSE: HACKERS EXPOSED!
An advanced practical skillset in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness including mitigating government spying and mass. Explore the threat landscape - Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more. Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. We cover operating system security, privacy, and patching - On Windows 7, Windows 8, Windows 10, MacOS and Linux.You will master encryption in an easy to follow crash course. You will learn about nation state secret tracking and hacking infrastructure.
Visit Here
Google Cybersecurity Professional Certificate
Understand the importance of cybersecurity practices and their impact for organizations.Protect networks, devices, people, and data from unauthorized access and cyberattacks using Security Information and Event Management (SIEM) tools.Identify common risks, threats, and vulnerabilities, as well as techniques to mitigate them.Gain hands-on experience with Python, Linux, and SQL.
Visit Here
Security Now
With Steve Gibson and Leo Laporte
Beginning in 2005, Security Now has been providing weekly episodes to keep you up to date on the latest breaches, exploits, and other technical developments in the world of cybersecurity. Hosts Steve Gibson and Leo Laporte cover a wide variety of cybersecurity topics including malware, data privacy, device security, and so much more – without getting too bogged down in jargon.
The Cyber Queens Podcast
With Maril Vernon, Erika Eakins, and Nathalie Baker
Inspiring Gen-Z women and LGBTQ minorities to seize their place in cyber and the success the field has to offer.
Choice Words With Samantha Bee
With Samantha Bee
We make a lot of choices, every single day. Some explode, some implode, most we barely remember. Each week on Choice Words, Samantha Bee sits down with people she admires to examine the biggest choices they’ve made in their lives and the ripple effects those decisions have had.
WISER THAN ME WITH JULIA LOUIS - DREYFUS
With Julia Louis-Dreyfus
Julia Louis-Dreyfus wants to know why the hell we don’t hear more from older women, so she’s sitting down with Jane Fonda, Carol Burnett, Amy Tan, Diane von Furstenberg, Isabel Allende and Fran Lebowitz (and more!) to get schooled in how to live a full and meaningful life. Each week Julia has funny, touching, personal conversations with women who are always WISER THAN ME™.
We Can Do Hard Things With Glennon Doyle
With Glennon Doyle & Cadence13
I’m Glennon Doyle, author of Untamed, the book that was released at the very start of the pandemic and became a lifeline for millions. I watched in awe while this simple phrase from Untamed – WE CAN DO HARD THINGS – the mantra that saved my life twenty years ago, became a worldwide rally cry.
Give Them Lala
With Lala Kent
Every day is a brand-new beginning for Lala Kent. Get to know the actress, singer, TV personality and entrepreneur, as she dives deep into relationships, sex, betrayal, mental health, personal life, and business. Lala’s top priority is to make her listeners feel heard, understood, and inspired. To give them honesty. Give them motivation. To Give Them Lala.
Breaking Glass
With Nancy Novak
Breaking Glass is a video podcast series focused on women, and the unique issues they face, in the high tech industry. Hosted by Compass Datacenters39; Chief Innovation Officer Nancy Novak, each episode will feature a prominent woman in the technology industry discussing her personal experiences in the workforce. The series is co-sponsored by Infrastructure Masons.
Fiftyfaces Focus
With Inspiring Israeli Women in Tech and Beyond
A series focused on inspiring Israeli women in tech and beyond - describing their career trajectory, their perception of diversity in the Israeli tech sector and what supports have made a difference as they reach for their goals.
TECH CAREERS & BADASS WOMEN
With Chatting with Christine
Highlighting young women and tech professionals on their journeys and careers! Made by and made for the young working professional. On the side, we also like to talk about issues, problems, and observations we see from our generation as well! Get inspired or learn something along the way.
Unseen Battles
With Parul Goel
On Unseen Battles, you will hear raw, honest conversations with women leaders about an unseen battle in their careers - working with a difficult manager, receiving critical feedback, hesitating to negotiate - issues we all face in some form. We will go deep into their motivations and fears. Tune in for you bi-weekly dose of hope and inspiration.
QUIET: THE POWER OF INTROVERTS IN A WORLD THAT CAN'T STOP TALKING
Author
// Susan Cain
In Quiet, Susan Cain argues that we dramatically undervalue introverts and shows how much we lose in doing so. She charts the rise of the Extrovert Ideal throughout the twentieth century and explores how deeply it has come to permeate our culture. She also introduces us to successful introverts—from a witty, high-octane public speaker who recharges in solitude after his talks, to a record-breaking salesman who quietly taps into the power of questions. Passionately argued, superbly researched, and filled with indelible stories of real people, Quiet has the power to permanently change how we see introverts and, equally important, how they see themselves.
MINDSET: THE NEW PSYCHOLOGY OF SUCCESS
Author
// Carol S. Dweck
After decades of research, worldrenowned Stanford University psychologist Carol S. Dweck, Ph.D., discovered a simple but groundbreaking idea: the power of mindset. In this brilliant book, she shows how success in school, work, sports, the arts, and almost every area of human endeavor can be dramatically influenced by how we think about our talents and abilities. People with a fixed mindset — those who believe that abilities are fixed — are less likely to flourish than those with a growth mindset — those who believe that abilities can be developed. Mindset reveals how great parents, teachers, managers, and athletes can put this idea to use to foster outstanding accomplishment.
CYBERWAR: HOW RUSSIAN HACKERS AND TROLLS HELPED ELECT A PRESIDENT: WHAT WE DON'T, CAN'T, AND DO KNOW
Author
// Kathleen Hall Jamieson
The question of how Donald Trump won the 2016 election looms over his presidency. In particular, were the 78,000 voters who gave him an Electoral College victory affected by the Russian trolls and hackers? Trump has denied it. So has Vladimir Putin. Others cast the answer as unknowable. In Cyberwar, Kathleen Hall Jamieson marshals the troll posts, unique polling data, analyses of how the press used hacked content, and a synthesis of half a century of media effects literature to argue that, although not certain, it is probable that the Russians helped elect the 45th president of the US.
Buy The Book Buy The Book Buy The Book
The Immortal Life Of Henrietta Lacks
Author // Rebecca Skloot
Her name was Henrietta Lacks, but scientists know her as HeLa. She was a poor Southern tobacco farmer who worked the same land as her enslaved ancestors, yet her cells—taken without her knowledge—became one of the most important tools in medicine. The first “immortal” human cells grown in culture, they are still alive today, though she has been dead for more than sixty years. If you could pile all HeLa cells ever grown onto a scale, they’d weigh more than 50 million metric tons—as much as a hundred Empire State Buildings. HeLa cells were vital for developing the polio vaccine; uncovered secrets of cancer, viruses, and the atom bomb’s effects; helped lead to important advances like in vitro fertilization, cloning, and gene mapping; and have been bought and sold by the billions.
Buy The Book
Enterprise Cybersecurity In Digital Business
Author // Ariel Evans
In Enterprise Cybersecurity in Digital Business, you will learn about cyber-risk from a business rather than technical standpoint. Learn how to set goals, create new roles to fill cybersecurity gaps and include everyone in your business. This book is geared toward CEOs, chief information security officers, data protection officers and compliance managers.
COUNTDOWN TO ZERO DAY: STUXNET AND THE LAUNCH OF THE WORLD’S FIRST DIGITAL WEAPON
Author // Kim Zetter
Countdown to Zero Day is an informative look at the start of digital warfare, deep-diving into the release of Stuxnet and how it came to impact a nuclear facility in Natanz, Iran. This is one of those must-read cyber security books for experts and non-technical people alike to gain an insight into the power and impact of modern cyber tools and attacks.
THE COMPLETE GUIDE TO CYBERSECURITY RISKS AND CONTROLS (INTERNAL AUDIT AND IT AUDIT), 1 ST EDITION
Author // Anne Kohnke, Dan Shoemaker and Ken E. Sigler
The Complete Guide to Cybersecurity Risks and Controls is a formative book that takes a practical approach to control and governance of information and communication technologies (ICT). Unlike other books, the authors view the topic through a lens of ICT operations being less of a technical issue than one of strategic governance.
GRIT: THE POWER OF PASSION AND PERSEVERANCE
Author // Angela Duckworth
In this must-read book for anyone striving to succeed, pioneering psychologist Angela Duckworth shows parents, educators, students, and business people both seasoned and new that the secret to outstanding achievement is not talent but a focused persistence called grit.
THE CYBERSECURITY PLAYBOOK: HOW EVERY LEADER AND EMPLOYEE CAN CONTRIBUTE TO A CULTURE OF SECURITY
Author // Allison Cerra
Alright… last but certainly not least on our list of the best cybersecurity books is The Cybersecurity Playbook. This one is all about helping employees at all levels of an organization identify weaknesses and assess threats. It also drives home the importance of having effective policies in place to help protect organizations against vulnerabilities associated with the human factor: their employees.
RECLAIMING CONVERSATION: THE POWER OF TALK IN A DIGITAL AGE
Author // Sherry Turkle
"Renowned media scholar Sherry Turkle investigates how a flight from conversation undermines our relationships, creativity, and productivity—and why reclaiming face-to-face conversation can help us regain lost ground.
We live in a technological universe in which we are always communicating. And yet we have sacrificed conversation for mere connection."
UNMASKING THE HACKER: DEMYSTIFYING CYBERCRIME
Author // Amanda-Jane Turner
"Do you use computers, smart phones and the internet? If you do, please read this book and help protect yourself from cybercrime.There is no solely technical solution to fight cybercrime and neither is there a solely human solution. That is why everyone who uses technology and the internet need to have at least a basic understanding of what they can do to help protect themselves in cyberspace.
The stereotype that cybercrime is committed by mysterious hoody-wearing hackers is harmful. It encourages a feeling of hopelessness about how to protect ourselves and our information. How can we fight these mysterious hidden figures? This book provides easy to understand information to demystify cybercrime and make cyber security more understandable and accessible to all.
As technology has evolved exponentially since the advent of the Internet, and because each subsequent generation does not know a time without being connected via smart phones, social media and emails, this book also provides a brief history of computing and the Internet, hacking, social engineering and cybercrime."
THIEVES OF STATE: WHY CORRUPTION THREATENS GLOBAL SECURITY
Author // Sarah Chayes
The world is blowing up. Every day a new blaze seems to ignite: the bloody implosion of Iraq and Syria; the East-West standoff in Ukraine; abducted schoolgirls in Nigeria. Is there some thread tying these frightening international security crises together? In a riveting account that weaves history with fast-moving reportage and insider accounts from the Afghanistan war, Sarah Chayes identifies the unexpected link: corruption.
People Hacker
Author // Jenny Radcliffe
A burglar for hire, con-artist and expert in deception and physical infiltration – Jenny Radcliffe is a professional people hacker. After being schooled in the art of breaking and entering by her family, she became an expert social engineer, doing an insider’s job to exploit the flaws and weaknesses in top-grade security operations.In People Hacker, Jenny reveals how she uses her inimitable blend of psychology, stagecraft and charm to gain access to top-grade private and commercial properties. From the back streets of Liverpool to the City of London's Square Mile, across rooftops, cellars and staircases in Europe to the mansions of gangsters in the Far East, Jenny has risked it all to earn the title ‘People Hacker’.
Confident Cyber Security
Author // Jessica Barker
Confident Cyber Security is here to help. This jargon-busting guide will give you a clear overview of the world of cyber security. Exploring everything from the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm.Featuring real-world case studies from Disney, the NHS, Taylor Swift and Frank Abagnale, as well as social media influencers and the entertainment and other industries, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. Let Confident Cyber Security give you that cuttingedge career boost you seek.
3 WAYS TO DEBUG TECH’S DIVERSITY GAP IN 2021
By Kasee Bailey
It’s clear by now that social and environmental forces contribute to the differences in earning potential for women and minorities, and that these forces also hold the same people back from careers in STEM (Science, Technology, Engineering, and Math). What needs to be done? Let’s take a look at how to debug the diversity gap.
READ BLOG
HEIMDAL CYBERSECURITY & THREAT INTELLIGENCE REPORT 2022-2023
By Vladimir Unterfingher
Marked by significant geopolitical shifts and unrest, 2022 has galvanized the cybersecurity landscape as well; war-profiteering fueled by endless media disputes has allowed the threat actors not only to operate unhindered but also to find safe harbor with states that choose to turn blind eye to cyber-criminal activity. 2023 will most likely be just as challenging as the previous few years, but I’m confident that the cybersecurity market has the right tools to deal with the constantly shifting cybercrime landscape and new/ consolidated threats, whether we’re talking about supply chain attacks, ransomware, deepfakes or cyber espionage.
TECH INDUSTRY STRUGGLES TO COURT WOMEN, BUT PROGRESS IS SLOW
By Rachel Schramm
Many people were disappointed when Google, Inc. released its demographics data in May, showing that only 30 percent of its employees are women and just 21 percent of its people in leadership roles are female. Google isn’t alone, however. The National Center for Women and Information Technology (NCWIT) reported early this year that women hold only 26 percent of all professional IT-related jobs in the U.S., up just 1 percent from 2010 and far below the 57 percent of professional jobs that women hold in the U.S.
READ BLOG
AI AT THE OFFICE MAKES YOU A LONELY, SLEEPLESS ALCOHOLIC, NEW STUDY FINDS
By Nikki Main
Employees using AI in the workplace experienced heightened levels of loneliness, insomnia, and alcohol consumption, according to a global study.
These Are The 3 Us Companies With The Highest Median Worker Salaries
By Sabrina Ortiz
Staying informed about trends in the ever-evolving job market can assist you in planning your future career moves. For example, factors such as salary and profitability are important when picking a new company to work for.
AN INDIVIDUALIZED APPROACH TO TREATING CANCER: AN INTEL OPEN SOURCE PROJECT
By Marlene Den Bleyker
Big data and analytics are now providing a personal approach in the battle against cancer.
READ BLOG
“CAFFEINE” PHISHING SERVICE DOMAINS, PATTERNS STILL HEAVILY USED AFTER STORE SEEMINGLY DEFUNCT
By Nathaniel Raymond
An evolving set of credential phishing activity targeting Microsoft Office 365 credentials has been observed reaching enterprise email inboxes. This activity is categorized by several key components that make it stand out from other campaigns.
Malicious Actors Utilizing Qr Codes To Deploy Phishing Pages To Mobile Devices
By Kian Buckley Maher
The Cofense Phishing Defense Center (PDC) has noted an increase in the number of malicious emails utilising this attack vector. In an attempt to bypass traditional file and text detection software, QR codes provide threat actors with a different tactic to encode malicious URLs.
READ BLOG
Your Next Employer Is More Interested In Your Skills Than Your Degrees
By Jada Jones
The job market has taken many new shapes and forms during the past three years since the COVID-19 pandemic transformed how we work. Now as companies push for return-to-office initiatives, generative AI shakes up the hiring market, and more young people enter the workforce, employers are looking for different qualities in employees than in the past.
READ BLOG
15 Absolute Mustreads For Women Working In Tech
By Kasee Bailey
We’ve rounded up 15 must-read books, blogs, and more for women in tech. Add these to your reading list (or blog feed) for a dose of tech news, opinions, career and leadership advice, and solidarity from women like you.