article thumbnail

Learning, work and flexibility: a case study

CILIP

Learning, work and flexibility: a case study As part of our look at CILIP accredited courses we talk to Oona Ylinen, a part-time LIS student at UCL and Academic Support Librarian at University of Essex. IP: What did you hope the course would give you? IP: To what extent has it delivered this?

article thumbnail

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. Let’s take a look at five of the best online courses for cyber security. Certified Cyber Security Foundation Training Course.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Yammer case study: Hall & Wilcox, a law firm in Melbourne, Australia

ChiefTech

However, Hall & Wilcox is a good case study of the kinds of activities you could be using to help create and maintain momentum if you wanted to do more than simply throwing open the doors to an enterprise social networking platform.

IT 54
article thumbnail

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

I think it makes for an interesting case study. Edward's chief concerns were locking and data integrity (locking, of course, is a mechanism for preserving data integrity). Everyone chimed in with their thoughts on the matter, and in this blog entry I'll synthesize and summarize that information.

Mining 48
article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the course of March, 2016–March, 2017, we identify 788,000 potential victims of off-theshelf keyloggers; 12.4 million potential victims of phishing kits; and 1.9

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

Prerequisites include either taking a five-day, 20-module training course, or having proof of two years of work experience in a security-related field. An online review course and practice quiz are available. All four courses take approximately six months to complete at a suggested pace of two hours per week.