Home » 2014 » August (Page 2)
Aug 9

Domains of CISSP: Application Development Security

August 9th, 2014 by

Application security refers to the controls that are included within systems and applications software and the steps used in their development. Applications refer to agents, applets, software, databases, data warehouses, and knowledge-based systems. These applications may be used in distributed or centralized environments.[...] Read More

Aug 8

Implementing an Effective ITIL® Request Fulfillment Process

August 8th, 2014 by

ITIL Fulfillment RequestsWhat happens to your service when the client needs major assistance halfway through the project? Do you keep on trucking, or do you have to shut everything down to respond? It’s extremely common for clients to encounter stumbling blocks, even with services that seem relatively well designed.[...] Read More

Aug 6

Certified Ethical Hacker – An Overview

August 6th, 2014 by

The Certified Ethical Hacker (CEH) is a professional certification offered by the International Council of E-Commerce Consultants (EC-Council). EC-Council is a member supported professional organization that educates individuals and organizations by offering insights and techniques to secure their IT environment from hackers.[...] Read More

Aug 5

The ITIL® Service Transition Stage Helps Service Lifecycle Run Smoothly

August 5th, 2014 by

ITIL TrainingOver the past several decades, technology has played a major role in the way many daily work activities are now conducted in the business world. In addition, the impact that technology has made reaches far beyond just changes in daily work activities.[...] Read More

Aug 5

Domains of CISSP: Operations Security

August 5th, 2014 by

Operations Security is used to identify the controls over hardware, media, and the operators with access privileges to any of these resources. Audit and monitoring are the mechanisms, tools and facilities that permit the identification of security events and subsequent actions to identify the key elements and report the pertinent information to the appropriate individual, group, or process.[...] Read More

Aug 3

What is a CISM (Certified Information Security Manager)?

August 3rd, 2014 by

A Certified Information Security Manager focuses on information risk management as the basis of security. This professional is also involved with the management of information security processes, develop and management of an information security program, and management of incidents.[...] Read More

Aug 2

ITIL® V3 RCV – Release, Control and Validation

August 2nd, 2014 by

The ITIL® V3 Release, Control and Validation (RCV) Certificate is one of the certifications that provides its holders with skills that cut down service costs and add efficiency to processes. For that reason, many IT professionals and business managers tend to seek this certification out. The RCV Certification course is an intermediate ITIL V3 training course and is one of the four modules which make up the ITIL V3 Capability Stream. The RCV Certificate is also considered a free-standing qualification.[...] Read More

Aug 2

Cyber-Warfare…The Unseen Front Lines

August 2nd, 2014 by

As with the rise of any new technology, the Internet has developed both beneficial and harmful elements.  As a tool for business, the Internet is unmatched; as a tool for criminal behavior, the Internet is equally unmatched.  In 2009, U.S. President Obama released the Cyberspace Policy Review to guide his administration in seeking ways to thwart criminal activity on the web.  A key concern involves the use of the Internet as a tool for conducting clandestine criminal warfare.[...] Read More