{"id":54293,"date":"2014-04-21T08:07:09","date_gmt":"2014-04-21T13:07:09","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?post_type=tribe_events&p=54293"},"modified":"2014-04-21T08:29:37","modified_gmt":"2014-04-21T13:29:37","slug":"security-convergence-principles-information-security-digital-forensics","status":"publish","type":"tribe_events","link":"https:\/\/ict-pulse.com\/events\/security-convergence-principles-information-security-digital-forensics\/","title":{"rendered":"Curacao – Security Convergence: Principles of Information Security and Digital Forensics"},"content":{"rendered":"
Cross-training equates to improved cost-control and productivity.<\/strong><\/p>\n A cross-trained organization is more cohesive, with different divisions pursuing similar goals. All personnel working together will reduce an organization\u2019s overall risk profile and streamline some redundant security processes. A cross training plan that would help physical security professionals understand what information security threats are and how to spot them, with some technical training would go a long way towards team building and improved skill sets.<\/p>\n Keep pace updating your skills with new training.<\/strong><\/p>\n In addition to learning information security and networking principles, students will be introduced to digital forensics investigations and learn the “right-way” to collect digital evidence that could be used internally or in civil\/criminal litigation.<\/p>\n As a primer for getting started in computer forensics, this course covers basic principles of digital forensics and cloud computing forensics. This is the core pre-requsiste for the “Advanced Computer Forensic Investigation” three day “hands-on” course.<\/p>\n Topics Include:<\/strong><\/p>\n Cross-training equates to improved cost-control and productivity. A cross-trained organization is more cohesive, with different divisions pursuing similar goals. All personnel working together will reduce an organization\u2019s overall risk profile […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[126,206,236,196],"class_list":["post-54293","tribe_events","type-tribe_events","status-publish","hentry","tribe_events_cat-curacao","tribe_events_cat-cybercrimecybersecurity-3","tribe_events_cat-ict-tech","tribe_events_cat-seminar","cat_curacao","cat_cybercrimecybersecurity-3","cat_ict-tech","cat_seminar"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/54293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=54293"}],"version-history":[{"count":0,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/54293\/revisions"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=54293"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=54293"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events_cat?post=54293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n