Business of Information Technology  >   Business Management  >   Human Resources Management  >   Training  >   Certification Programs  >  

CISSP

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Certification for Information Systems Security Professional
DEFINITION: A Cisco Certified Security Professional (CCSP) is an IT (Information Technology) professional who has received formal training from Cisco Systems in network-related security hardware, software and management. CCSPs are commonly employed in IT security departments and as system administrators.CCSP training typically covers:identity management authentication authorizationfirewalls anti-malware programssecurity  … 
Definition continues below.
CISSPReports
226 - 250 of 870 Matches Previous Page  | Next Page
CW+: Analyst's take: Cyber-Ark benefits privileged account management
sponsored by ComputerWeekly.com
WHITE PAPER: Managing privileged accounts requires balancing accessibility and control while ensuring audit capabilities.  Cyber-Ark enables organizations to increase administrator productivity while reducing risk.
Posted: 20 Oct 2011 | Published: 31 Dec 2010

ComputerWeekly.com

CW+: Analyst's take: IBM Cognos software helps schools score top marks
sponsored by ComputerWeekly.com
WHITE PAPER: IBM Cognos software helps K-12 organizations increase visibility and improve decision making, driving improved student performance, lowered cost of interventions, greater productivity, and lower operating costs.
Posted: 20 Oct 2011 | Published: 05 Jan 2011

ComputerWeekly.com

CW+: Analyst's take: Leveraging IBM Cognos software with training
sponsored by ComputerWeekly.com
WHITE PAPER: When IBM Cognos users complement their deployments with formal training services, end users become more productive, report building costs are reduced, and more end users adopt IBM Cognos tools such as BI and PM.
Posted: 20 Oct 2011 | Published: 29 Dec 2010

ComputerWeekly.com

CW+: Analyst's take: The benefits of third-party SAP and Oracle support
sponsored by ComputerWeekly.com
WHITE PAPER: Organizations running mature SAP or Oracle applications experience significant ongoing savings from third-party support.  Nucleus found Rimini Street customers can reduce their annual license maintenance fees by at least 50 percent and avoid upgrade costs while extending the value of their software investment.
Posted: 21 Oct 2011 | Published: 27 Dec 2010

ComputerWeekly.com

CW+: How to use predictive modeling to run an effective technology platform
sponsored by ComputerWeekly.com
WHITE PAPER: IT is moving from being a point of differentiation for an organisation towards becoming a point of constraint.
Posted: 20 Oct 2011 | Published: 05 Jan 2011

ComputerWeekly.com

CW+: Open Group technical document: IT Specialist Certification (ITSC) Conformance Requirements
sponsored by ComputerWeekly.com
WHITE PAPER: The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions.
Posted: 20 Oct 2011 | Published: 21 Oct 2010

ComputerWeekly.com

CW+: Open Group technical report: IT Specialist Certification (ITSC) accreditation requirements
sponsored by ComputerWeekly.com
WHITE PAPER: The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions.
Posted: 20 Oct 2011 | Published: 22 Oct 2010

ComputerWeekly.com

CW+: Roundtable debate: The impact of IT consolidation on business growth
sponsored by ComputerWeekly.com
WHITE PAPER: Organisations have been under pressure to make savings wherever possible and have consolidated their IT during the recession. However, along with the opportunities consolidation presents there are also challenges, and experts warn that any form of consolidation needs to be undertaken carefully.
Posted: 21 Oct 2011 | Published: 14 Dec 2010

ComputerWeekly.com

CW500: Business and Economics Outlook for IT Leaders in 2014
sponsored by ComputerWeekly.com
PRESENTATION: In this presentation, given to Computer Weekly's 500 Club for IT leaders, Lee Ayling talks about the business and economic trends IT leaders need to look out for in 2014.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

CW500:Future Gazing 2020 (II)
sponsored by ComputerWeekly.com
PRESENTATION: Professor Victor Newman, author, advisory board member and mentor at Social Innovation Lab Kent (Silk), gives his take on the future of the IT department in 2020.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

Data Protection Masterclass: Global Privacy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.
Posted: 12 Jun 2012 | Published: 24 May 2012

ComputerWeekly.com

Defining the Business Change Agenda  
sponsored by ComputerWeekly.com
ANALYST REPORT: Is business transformation really the key to success ? This research from analyst group Freeform Dynamics offers some answers.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Delivering Value
sponsored by Workday
WHITE PAPER: More often than not, HR struggles to deliver the right information or service to the right person at the right time. This brief explains why, and introduces a unified Human Capital Management (HCM) solution equipped to help you achieve your objectives.
Posted: 24 Mar 2014 | Published: 31 Dec 2012

Workday

Developing an Information Strategy in the Financial Services Industry
sponsored by Information Builders
WHITE PAPER: In this resource, financial services organizations will learn how they can use five key actions to develop a successful information strategy in order to improve processes, boost productivity, enhance decision-making, and more.
Posted: 01 May 2013 | Published: 31 Dec 2012

Information Builders

DCM serves as a useful tool for a business approach to process management
sponsored by IBM
EGUIDE: Check out this tip guide today to learn how dynamic case management (DCM) serves as a useful tool for a business approach to process management.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

IBM

Decision Management Smarter Insurance Processes
sponsored by IBM
CASE STUDY: With varying compliance demands, change is the mainstay of the insurance industry. There are constant alterations to underwriting, rating, claims processing, fraud detection and billing. Read this case study of the Traveler's implementation of a business rules management system to effectively improve all of their processes.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

Define your cloud business model
sponsored by Channel Transformation Alliance
WHITE PAPER: This guide offers valuable tips and recommendations for those interested in adopting and defining a successful new cloud business model.
Posted: 28 Dec 2011 | Published: 28 Dec 2011

Channel Transformation Alliance

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

developerWorks Live! briefings
sponsored by IBM
RESOURCE CENTER: Attending one of the jam-packed IBM developerWorks Live! briefings will shorten your learning curve, and improve the quality and results of your most difficult software projects. Keep up-to-speed on the latest trends in the industry by signing up now for some of the most powerful briefings.
Posted: 20 Dec 2011 | Published: 20 Dec 2011

IBM

Digital Transformation: Creating New Business Models Where Digital Meets Physical
sponsored by IBM
WHITE PAPER: Access this resource to discover what makes up an enterprise-grade digital transformation strategy. Gain insight into the 3 transformation paths available, 4 factors to consider before choosing a transformation policy, and 5 critical components an effective strategy must contain.
Posted: 22 May 2012 | Published: 01 May 2012

IBM

Disclosure Management for budgeting, planning and forecasting -- the next frontier?
sponsored by IBM
WHITE PAPER: This resource explains how disclosure management can lead to significant productivity gains when used for statutory reporting, and evaluates the viability of this strategy as an option for improving budgeting, planning, and forecasting (BPF) financial processes.
Posted: 26 Apr 2013 | Published: 31 Oct 2012

IBM

DM Portfolio E-Book: (Top level) - Data Management for Smarter Business Outcomes
sponsored by IBM
EBOOK: This e-book highlights ways in which you can drive more cost effective data management with less overall resources, in good times and in tough times.
Posted: 19 Oct 2009 | Published: 16 Jul 2009

IBM

Doing Business with Comstor
sponsored by Comstor
WHITE PAPER: Learn more about Comstor, a leader in Cisco product distribution and an established provider of networking and advanced technology solutions.
Posted: 01 Feb 2012 | Published: 27 Jan 2012

Comstor

Driving Business Agility through SOA Connectivity & Integration Whitepaper from IBM
sponsored by IBM
WHITE PAPER: In this whitepaper, you will learn how to work smarter so you can solve the problems of today and seize the opportunities of tomorrow.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

IBM

Driving Business Execution Through HR
sponsored by SuccessFactors
VIRTUAL ENVIRONMENT: This webcast examines methods for driving business execution through HR initiatives and how it can lead to increased revenues.
Posted: 09 Oct 2012 | Premiered: 26 Apr 2012

SuccessFactors
226 - 250 of 870 Matches Previous Page    8 9 10 11 12 13    Next Page
 
CISSP DEFINITION (continued): … A Cisco Certified Security Professional (CCSP) is an IT (Information Technology) professional who has received formal training from Cisco Systems in network-related security hardware, software and management. CCSPs are commonly employed in IT security departments and as system administrators.CCSP training typically covers:identity management authentication authorizationfirewalls anti-malware programssecurity policy development. CCSP training covers current technologies to develop comprehensive network defense solutions. For certification, a CCSP must demonstrate a solid understanding of networking protocols and multi-level security paradigms for use in a business environment, particularly e-commerce. Another focus of training is the management of LAN (local area network) and WAN (wide area network) security to enable the highest possible level of business asset protection at the lowest possible cost.
CISSP definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement