Business of Information Technology  >   Business Management  >   Human Resources Management  >   Training  >  

Certification Programs

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Certifications, Certificate Programs, Certification, Certificates
DEFINITION: Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network (SDN). CISS certification is awarded after the individual has achieved Cisco Certified Network Associate (CCNA) certification and passed the SND (Securing Cisco Network Devices)  … 
Definition continues below.
Certification ProgramsReports
26 - 31 of 31 Matches Previous Page  |  Next Page
2009 IT Skills and Salary Report
sponsored by Global Knowledge
WHITE PAPER: Download your free copy to learn the top paying salaries for IT jobs based on state, industry, certification, and more.
Posted: 03 Mar 2009 | Published: 03 Mar 2009

Global Knowledge

CCNA Wireless Certification
sponsored by Global Knowledge
WHITE PAPER: This paper will describe the growing need for CCNA Wireless certification, what the CCNA Wireless certification is, its benefits, and what pre-requisites, exams, and training are required to get certified.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2

An Introduction to PMI's Project Life Cycle
sponsored by Global Knowledge
WHITE PAPER: This paper provides a review of the steps and stages associated with project management according to the Project Management Institute® (PMI). It is a primer for anyone new to the PMBOK® and who is preparing to take the PMP exam.
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

Managing Storage: Trends, Challenges, and Options
sponsored by EMC Corporation
WHITE PAPER: With the explosion of data, storage environments are becoming more complex. Poorly designed storage infrastructures are putting companies at risk. Download this study to learn how storage managers built stronger storage management teams and environments.
Posted: 31 Jul 2006 | Published: 01 Jul 2006

EMC Corporation

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge
26 - 31 of 31 Matches Previous Page    1 2    Next Page
 
CERTIFICATION PROGRAMS DEFINITION (continued): …  Exam. Information Security Specialist Certification holders are also certified as having met the Committee on National Security Systems (CNSS) 4011 federal security certification and training standards mandated by the U.S. National Security Association (NSA). Skills validated in the new specialist certification include:Implementing basic authentication, authorization and accountingCisco Intrusion Detection System/Intrusion Protection System sensorsCisco VPN 3000 Series ConcentratorsEmploying access control lists to avert router, network, and common Layer 2 attacks. Cisco also offers security certification … 
Certification Programs definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement