Recently I realized I could no longer support living in the past. It was time to loosen up the purse strings, latch on to this Adobe Creative Cloud subscription concept and start appreciating the benefits that this new business model now provides.
Read More »about Adobe 2019 Revealed
Microsoft’s cybersecurity team has provided some top recommendations for implementing security to protect your Office 365 environment. The Office 365 security roadmap provides these recommendations in a staged timeframe so you can easily identify where your priorities should be in the first 30-90 days and beyond
Read More »about Office 365 security – do you know where to start?
In partnership with itSM Solutions LLC and UMass Lowell, a NSA/DHS National Center of Academic Excellence in Cyber Defense Research (CAE-R), LRS Education Services is proud to offer the NIST Cybersecurity Professional (NCSP) training curriculum. The curriculum is designed to train how to engineer and implement a cybersecurity program to protect critical assets using the NCSF.
Read More »about NIST Cybersecurity Framework – A Risk Assessment Process
Whether you are a seasoned administrator looking to confirm or polish your skills and/or prepare for an exam, or an admin who is fairly new to the world of identity management, security and compliance in Microsoft Azure and/or Office 365 and wanting to get some resources to help you advance your skills and maybe eventually go through the certification process, I think this course has some very valuable lessons to offer.
Read More »about MS-500 Microsoft 365 Security Administration Track.…is this course for you?
Admittedly the vast majority of my technical background is on the Windows side. Like many of you I’ve spent years in the field and through training courses improving my Windows skills and gathering a bunch of certifications from Microsoft. Windows is powerful and ubiquitous. I have a great time working in Windows networks and teaching Microsoft courses. But sometimes we all need to broaden our horizons.
Read More »about Fun with Kali
We are very proud of our NIST CSF courses. The reviews have been fantastic! Many organizations take that knowledge and create or improve a cybersecurity program on their own. In the Bootcamp/Practitioner classes we get very specific as to what that program could contain and how it might be organized.
However, we’ve heard from clients that they want more. They need a partner to come alongside and help them through the process of discovering exactly where they are in cybersecurity. What’s going well, what are the gaps and what should be done to close them?
Read More »about Are You Ready To Assess The State of Your Cybersecurity?
It's time to give SharePoint a second look; chances are you'll be using it in the very near future. Reports are showing that approximately 80 percent of Fortune 500 companies are using this multi-platform collaboration tool. Why?
Read More »about It’s Time To Give SharePoint a Second Look!
Cyber security breaches are a huge expenditure in today’s internet-based world; therefore, it’s incumbent upon organizations to invest in prevention rather than just recovery from a security breach.
Read More »about Microsoft 365 Threat Intelligence
Big data and the process of turning raw information into meaningful reporting and visualization has seen huge growth by companies focused on data driven decision making. Just this year alone, many of my enterprise accounts have shown a specific interest on how to better use data for making business decisions based on historical, real-time and predictive analytics.
Read More »about Business Analytics with Microsoft Power BI
EC Council upped their game with the release of the Certified Ethical Hacker v10 course! Not only does it now cover how to defend IoT devices but there is a strong focus on cloud computing threats.
Read More »about To Beat a Hacker You Need to Think Like One!