Big data and the process of turning raw information into meaningful reporting and visualization has seen huge growth by companies focused on data driven decision making. There are seemingly endless application options to consider for helping to process and organize data through statistical modeling.
Read More »about Business Analytics Comparison with Microsoft Power BI, Tableau and QlikView
With cybersecurity attacks a clear and present danger, you already know the importance of maintaining an expert IT staff to protect your data and electronic assets. At the same time, you probably worry about the cost of ongoing training to keep your IT team one step ahead of the ever-evolving ploys that plague organizations. Now more than ever, you need to make sure you are maximizing educational investments for your business.
Read More »about Maximize your cybersecurity training budget
Are you an IT Professional trying to create and organize your security team, or trying to decide which security certification or training program is best for your role? You are not alone!
Read More »about CompTIA Security+ or CYSA+ training?
Learning how to implement, or improve upon, your cybersecurity program utilizing the NIST Cybersecurity Framework will allow you to mitigate risks based on your organization’s needs/goals … and hopefully save your organization from having to choose whether or not to pay a ransom!
Read More »about Should you pay the ransom?
Recently I realized I could no longer support living in the past. It was time to loosen up the purse strings, latch on to this Adobe Creative Cloud subscription concept and start appreciating the benefits that this new business model now provides.
Read More »about Adobe 2019 revealed
Microsoft’s cybersecurity team has provided some top recommendations for implementing security to protect your Office 365 environment. The Office 365 security roadmap provides these recommendations in a staged timeframe so you can easily identify where your priorities should be in the first 30-90 days and beyond
Read More »about Office 365 security – do you know where to start?
In partnership with itSM Solutions LLC and UMass Lowell, a NSA/DHS National Center of Academic Excellence in Cyber Defense Research (CAE-R), LRS Education Services is proud to offer the NIST Cybersecurity Professional (NCSP) training curriculum. The curriculum is designed to train how to engineer and implement a cybersecurity program to protect critical assets using the NCSF.
Read More »about NIST Cybersecurity Framework – A Risk Assessment Process
Whether you are a seasoned administrator looking to confirm or polish your skills and/or prepare for an exam, or an admin who is fairly new to the world of identity management, security and compliance in Microsoft Azure and/or Office 365 and wanting to get some resources to help you advance your skills and maybe eventually go through the certification process, I think this course has some very valuable lessons to offer.
Read More »about MS-500 Microsoft 365 Security Administration Track.…is this course for you?
Admittedly the vast majority of my technical background is on the Windows side. Like many of you I’ve spent years in the field and through training courses improving my Windows skills and gathering a bunch of certifications from Microsoft. Windows is powerful and ubiquitous. I have a great time working in Windows networks and teaching Microsoft courses. But sometimes we all need to broaden our horizons.
Read More »about Fun with Kali
We are very proud of our NIST CSF courses. The reviews have been fantastic! Many organizations take that knowledge and create or improve a cybersecurity program on their own. In the Bootcamp/Practitioner classes we get very specific as to what that program could contain and how it might be organized.
However, we’ve heard from clients that they want more. They need a partner to come alongside and help them through the process of discovering exactly where they are in cybersecurity. What’s going well, what are the gaps and what should be done to close them?
Read More »about Are You Ready To Assess The State of Your Cybersecurity?