La course aux talents technologiques

DXC Technology

Les entreprises peinent de plus en plus à trouver les talents dotés des compétences nécessaires qui les aideront à réussir leur transformation digitale. Ce déséquilibre entre l’offre et la demande crée une situation imparfaite pour les entreprises, qui, pour rester compétitives, sont obligées d’investir considérablement dans la gestion et l’acquisition des compétences. Parmi les compétences […]. Digital Transformation Leadership and Success Workplace

Top cyber security courses for 2018

IT Governance

Find out how to pick the best training course and qualification to advance your cyber security career. Training courses are generally tailored to specific careers, so the first thing you need to decide is what aspect of cyber security interests you most.

BCS Data Protection Courses Available for 2019!

Managing Your Information

What courses are available? Tkm is delighted to announce new data protection courses are available for 2019! We now have courses at a range of levels including those offered by BCS together with Tkm’s own qualifications, which are approved and certificated by the SQA.

New Online Course For Local Governments

The Texas Record

SLRM is excited to announce the relaunch of our Introduction to Records Management Course for local governments! You may remember a previous iteration of the IRM course available on our training page. For the uninitiated, the IRM course is a self-paced multi-subject class that covers the fundamentals of records management. For information about our trainings (like how to enroll in a course), please see our Frequently Asked Questions.

CISMP training courses now available in Glasgow

IT Governance

High demand means we are now offering our CISMP training course in different locations, including Glasgow. Our CISMP training course is delivered by an experienced cyber security consultant over five days and enables you to put your new knowledge and skills to work instantly.

New Video Course for State Agencies

The Texas Record

We are pleased to announce a new online video course for state agency records management officers and records liaisons. we are currently revamping local government online courses as well!). Click here to access the video on the course page.

Achieve your professional potential with 15% off our courses

IT Governance

Whatever category you fall into, we have courses that will help you achieve your professional potential. To help you achieve your potential faster, we are currently offering 15% off all October and November courses if you book by 31 October. We offer courses in: GDPR and DPO.

Collection Management: a Crash-Course

The Security Ledger

Thomas Hofmann, the Vice President of Intelligence at Flashpoint offers a crash-course in creating an effective collection management program. Effective collection management is integral to the success of an intelligence operation. What is it and how does it work? Collection management is one of the most overlooked and misunderstood aspects of an. Read the whole entry. »

New Pluralsight Course: OWASP Top 10, 2017

Troy Hunt

Just a tad over 5 years ago, I released my first ever Pluralsight course - OWASP Top 10 Web Application Security Risks for ASP.NET. More than 32k people have listened to more than 78k hours of content in this course making it not just the most popular course I've ever released, but also keeping it as my most popular in the library even today by a long way. Because this is a "Play by Play" course, it's only an hour and 12 minutes of easy listening.

New Pluralsight Course: Bug Bounties for Researchers

Troy Hunt

I wrote about that in the aforementioned post which went out in May and I mentioned back then that we'd also created a second course targeted directly at researchers. This course covers many of the issues folks considering getting involved in bug bounties often ask: How do they find bounties? This is only a 36-minute course and it's in the very casual Play by Play format (basically just Casey and I having a chat and sharing some screen content) so it's easy watching.

New Pluralsight Course: Modern Browser Security Reports

Troy Hunt

Rounding out a recent spate of new Pluralsight courses is one final one: Modern Browser Security Reports. You may remember Scott from such previous projects as , Report URI and, as it relates to this course, our collective cleaning up at a couple of recent UK awards nights: With @Scott_Helme (at a different awards night) learning we both just scored at the European Cyber Security Blogger Awards!

New Pluralsight Course: Modern Web Security Patterns

Troy Hunt

Whilst this blog post is about a Pluralsight course I created with Lars Klint , it only really hit me during that bank conversation just how much there is to take onboard when it comes to securing things in the browser today. There were so many edge cases and angles not just to the security controls the folks at the bank had heard of before, but of course all those others that were entirely new to them.

New Pluralsight Course: Emerging Threats in IoT

Troy Hunt

It's another Pluralsight course! It's another "Play by Play" course which means it's Lars and I sitting there having a conversation like this: We choose to talk about IoT because frankly, it's fascinating. And of course, they're just a tiny snippet of the broader set of things we're seeing go wrong with IoT. These Play by Play courses are easy watching.

New Pluralsight Course: Bug Bounties for Companies

Troy Hunt

That's oversimplifying things, of course, but to me that's always been a cornerstone of why bug bounties make so much sense: they change the ROI of bugs such that it incentivises people of all ethical positions to disclose them to the organisation involved rather than run amuck with them. Which brings me to this: I'm sitting with Casey Ellis in a studio in San Franciso recording a Pluralsight course per the title of this blog post.

New Pluralsight Course: Adapting to the New Normal: Embracing a Security Culture of Continual Change

Troy Hunt

Which, of course, also means you can't tell people to look for the company name in the address bar either! Best of all, we've made this series easily accessible to everyone: This course and the entire Security Culture series is still 100% free!

CILIP accredits new undergraduate course in Wales


CILIP accredits new undergraduate course in Wales. CILIP is delighted to announce that the BA (Hons) Library and Information Management undergraduate course at Coleg Llandrillo has been awarded CILIP accreditation following the institution?s We are delighted to welcome a new undergraduate course to the range of accredited programmes available.

Why the Certified Ethical Hacker course is for you

IT Governance

View this infographic and find out why the Certified Ethical Hacker (CEH) Training Course is for you: Book your place on the CEH Training course with IT Governance and gain the skills to be a Certified Ethical Hacker.

New course dates for GDPR training in Edinburgh and Glasgow

IT Governance

We run two different GDPR training courses across the UK, providing employees with an introduction to the Regulation and the knowledge required to manage a GDPR compliance project. High demand means we’ve added new course dates in Edinburgh and added Glasgow courses to our schedule.

Progress your career with an ISO 27001 Lead Implementer course

IT Governance

However, information security is a complex, multidisciplinary field, and knowing which course is right for you can be tricky. If you’re interested in gaining that qualification, you should enrol on our ISO27001 Certified ISMS Lead Implementer course.

New Pluralsight Course: JavaScript Security Play by Play

Troy Hunt

So that's the course in a nutshell, "Play by Play: JavaScript Security" is now live! BTW - fun fact: Aaron was responsible for introducing me to the folks at Pluralsight back in 2012 which ultimately led to many courses and my independence from corporate life and indeed, life as I know it today. Ah JavaScript, the answer to - and cause of - all our problems on the web today! Just kidding, jQuery has solved all our JS problems now.

A Certified Ethical Hacking Course with a difference

IT Governance

Michael Stout, our course trainer, has led CEH courses for more than ten years, and has worked for all the major training centres in the UK and Western Europe. He was the first CEH trainer on the continent and helped roll out training courses in a number of European markets.

New Pluralsight Course: Care and Maintenance of Development VMs

Troy Hunt

Regular readers will know I create a lot of Pluralsight courses. It's now 5 years ago I started writing my first one which incidentally, is still my highest rated course every month (apparently the OWASP Top 10 as it relates to ASP.NET is still a big thing). Most of the time, the courses I create are on topics I know well, primarily on security but occasionally with a bit of cloud and development practices sprinkled in for variety.

Three Decades On: RSA Labs Sets Course for Future

The Security Ledger

RSA Chief Technology Officer and head of RSA Labs Zulfikar Ramzan says his company, which pioneered commercial applications of public key cryptography, is setting its sites on the future as it looks to embrace the disruptive security solutions of the future.

How an ISO 27001 Foundation course can help build your career path

IT Governance

The ISO 27001 Certified ISMS Foundation Training Course is the starting point for all prospective ISO 27001 project managers and auditors, or anyone who wishes to build a career in information security management. Book a course today to build you career path >> ISO 27001

New Pluralsight Course: Defending Against JavaScript Keylogger Attacks on Payment Card Information

Troy Hunt

Only a few weeks ago, I wrote about a new GDPR course with John Elliott. We've been getting fantastic feedback on that course and I love the way John has been able to explain GDPR in a way that's actually practical and makes sense! When we recorded that course in London a couple of months back, we also recorded another one on Defending Against JavaScript Keylogger Attacks on Payment Card Information.

Records Management Training – Upcoming Courses – March, April, May, 2018

National Archives Records Express

We offer a Certificate of Federal Records Management Training to individuals who successfully complete Knowledge Area courses 2-6 and pass exams associated with each course. Upon completion of the courses and exams, participants will receive a certificate signed by the Archivist of the United States. Online courses.

New Pluralsight Course: The State of GDPR - Common Questions and Misperceptions

Troy Hunt

Which brings me to the new course and I put precisely this question to John Elliott whilst in London last month, only a couple of weeks after GDPR had hit. I've known John for a while via Pluralsight channels and we recorded 2 courses together that day, this one and another I'll announce after it goes live. Of course, we also talk about penalties too and what levels will likely apply in what cases, plus how they'll be enforced in jurisdictions outside the EU too.

Simple Security Flaws Could Steer Ships Off Course


A PoC shows how ships could be hacked and fooled into changing direction - all due to simple security issues. Hacks Vulnerabilities admin credentials CVE-2016-9361 hack operational technology Proof of Concept ship attack shipping

New Pluralsight Course: The Role of Shadow IT and How to Bring it out of the Darkness

Troy Hunt

It's a new Pluralsight course! Yes, I know I said that yesterday too , but this is a new new Pluralsight course and it's the second part in our series on Creating a Security-centric Culture. As I wrote there back in Jan, we're doing this course on a quarterly basis and putting it out in front of the paywall so in other words, it's free! This course looks at how shadow IT is changing, what it means in a cloud era and what practices we can apply to address it.

Google offers online course in jobs push amid concerns about AI

Information Management Resources

The firm has poured billions into artificial intelligence, a technology that many expect will render jobs across several fields obsolete. Artificial intelligence Machine learning Google

Of Course Apple Is Going to Do Search.

John Battelle's Searchblog

Yep, it was search, and the signal was the link, interpreted, of course, through PageRank and ultimately hundreds of other sub signals (click through, freshness, decay, etc.). you just have to rethink what "search" really means. Last night Jobs said he had no interest in search. I am quite certain what he meant is he has no interest in HTML, "traditional" search. But think about what search really is, and I am certain, Apple will be in the search business.

The Periscope Podcast – Reporting on staff training and awareness

IT Governance

BreachReady Podcast Uncategorised accountability under gdpr Certified GDPR training course GDPR GDPR FoundationStep into the Breach. Welcome to the IT Governance Periscope Podcast.

Of Course Apple Is Going to Do Search.

John Battelle's Searchblog

Yep, it was search, and the signal was the link, interpreted, of course, through PageRank and ultimately hundreds of other sub signals (click through, freshness, decay, etc.). you just have to rethink what "search" really means. Last night Jobs said he had no interest in search. I am quite certain what he meant is he has no interest in HTML, "traditional" search. But think about what search really is, and I am certain, Apple will be in the search business.

Course Credits as a Reward for Collaboration

Collaboration 2.0

Distance learning - providing access to learning when the source of information and the learners are separated by time and/or distance - has been around since the dawn of postal delivery services. In the current economic climate further education seems likely to take a pounding given the huge personal expense and often substantial debt involved, so

Does the Colorado Data Privacy Law Affect You?


Covered entities include organizations and even individuals that maintain, own or license PII in the course of their work.

How the PGA TOUR is Employing Information Lifecycle Management to Address Privacy Concerns


Unique records: The PGA TOUR has a variety of types of records; for example, records on players and golf courses. I recently had the pleasure of speaking at the International Association of Privacy Professionals (IAPP)’s Global Privacy Summit in Washington D.C. on May 2, 2019.


How Worried Do We Need to Be About GDPR and Brexit?


Since May 25, 2018, of course, the General Data Protection Regulation (GDPR) has been effective, meaning that a large region of the world has had to comply with its requirements governing the processing and control of EU residents’ personally identifiable information (PII).


Is It Time for a Federal U.S. Data Protection Law?


Of course, we’d still have to comply with GDPR and other international laws, but rather than following everyone else’s lead, the U.S.

IT 84

The Procurement Process: Key to an Information Governance Strategy


The issue only becomes known in the course of a software audit or, worse, during the discovery process of a legal matter. When it comes to enforcing an IG strategy, I am often asked, “What is the one thing you would do to improve my program?”

Researchers: Aircraft Landing Systems Vulnerable

Data Breach Today

Study Finds Bogus Instrument Landing System Signals Could Send Planes Off Course The majority of aircraft accidents occur during landing. And during bad weather or low-visibility, pilots are trained to entirely trust their instruments.

Study 213