In partnership with itSM Solutions LLC and UMass Lowell, a NSA/DHS National Center of Academic Excellence in Cyber Defense Research (CAE-R), LRS Education Services is proud to offer the NIST Cybersecurity Professional (NCSP) training curriculum. The curriculum is designed to train how to engineer and implement a cybersecurity program to protect critical assets using the NCSF.
Read More »about NIST Cybersecurity Framework – A Risk Assessment Process
Whether you are a seasoned administrator looking to confirm or polish your skills and/or prepare for an exam, or an admin who is fairly new to the world of identity management, security and compliance in Microsoft Azure and/or Office 365 and wanting to get some resources to help you advance your skills and maybe eventually go through the certification process, I think this course has some very valuable lessons to offer.
Read More »about MS-500 Microsoft 365 Security Administration Track.…is this course for you?
Admittedly the vast majority of my technical background is on the Windows side. Like many of you I’ve spent years in the field and through training courses improving my Windows skills and gathering a bunch of certifications from Microsoft. Windows is powerful and ubiquitous. I have a great time working in Windows networks and teaching Microsoft courses. But sometimes we all need to broaden our horizons.
Read More »about Fun with Kali
We are very proud of our NIST CSF courses. The reviews have been fantastic! Many organizations take that knowledge and create or improve a cybersecurity program on their own. In the Bootcamp/Practitioner classes we get very specific as to what that program could contain and how it might be organized.
However, we’ve heard from clients that they want more. They need a partner to come alongside and help them through the process of discovering exactly where they are in cybersecurity. What’s going well, what are the gaps and what should be done to close them?
Read More »about Are You Ready To Assess The State of Your Cybersecurity?
It's time to give SharePoint a second look; chances are you'll be using it in the very near future. Reports are showing that approximately 80 percent of Fortune 500 companies are using this multi-platform collaboration tool. Why?
Read More »about It’s Time To Give SharePoint a Second Look!
Cyber security breaches are a huge expenditure in today’s internet-based world; therefore, it’s incumbent upon organizations to invest in prevention rather than just recovery from a security breach.
Read More »about Microsoft 365 Threat Intelligence
Big data and the process of turning raw information into meaningful reporting and visualization has seen huge growth by companies focused on data driven decision making. Just this year alone, many of my enterprise accounts have shown a specific interest on how to better use data for making business decisions based on historical, real-time and predictive analytics.
Read More »about Business Analytics with Microsoft Power BI
EC Council upped their game with the release of the Certified Ethical Hacker v10 course! Not only does it now cover how to defend IoT devices but there is a strong focus on cloud computing threats.
Read More »about To Beat a Hacker You Need to Think Like One!
Amidst all the different security technologies, such as firewalls, antivirus, encryption, etc. an entire critical category, which may be the most important, becomes either an afterthought or even ignored. In fact, without careful work in this area your other security devices and applications will be ineffective.
Let’s be clear. Organizations who fail in this area are many times more likely to suffer a costly data breach. Not 50% more likely, or twice as likely but a breach becomes an almost certainty.
Read More »about Miss This and Your Cybersecurity Program Will Fail
If you are already using PowerShell to automate and quickly solve tedious administration tasks, let us help you expand your PowerShell foundational knowledge!
Read More »about PowerShell scripting is a sought-after skill!