All classes available with Virtual Classroom Live! Learn More

Tag Archives: Columbus ohio

← Older posts

Cloud Computing – A Beginner’s Guide

What is Cloud Computing? Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. You typically pay only for cloud services you use, helping you lower your operating costs, run your infrastructure more […]

Tagged , , , |

Get Started with Azure Fundamentals

Ready to learn the basics of cloud services? Start with Microsoft Azure Fundamentals. This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step and learning about cloud services and Microsoft Azure. The course will cover general cloud […]

Tagged , , , , , , , , |

Build Azure Data & AI Skills – Azure Data Engineer

Azure Data Engineers design and implement the management, monitoring, security, and privacy of data using the full stack of Azure data services. It’s a role that requires diverse skills. Technology changes fast, so the following available training options can help you stay ahead of the game: DP-200T01: Implementing an Azure Data Solution In this course, […]

Tagged , , , , , , |

Build Azure Data & AI Skills – Azure Data Scientist

Become an Azure Data Scientist As an Azure Data Scientist, you can apply Azure’s machine learning techniques to train, evaluate, and deploy models that solve business problems. Attend Designing and Implementing a Data Science Solution on Azure training where you will gain the necessary knowledge about how to use Azure services to develop, train, and […]

Tagged , , , , , , , |

Cybersecurity: Increasing Regulation

A final aspect of the cybersecurity landscape that is worthy of attention isn’t strictly technology related but instead relates to regulation and legislation. For many years the information technology industry was left to its own devices when it came to how much energy they put into protecting information systems infrastructure. Unfortunately, the industry hasn’t been […]

Tagged , , , , , , , , , , |

Cybersecurity: Transition to the Cloud

The cybersecurity landscape has been substantially altered by organizations moving on-premise workloads to the cloud. Important to note though is that moving infrastructure, applications, and data to the cloud doesn’t mean that the responsibility for information security shifts from organizational personnel to the cloud provider. As has been amply demonstrated by developers leaving cloud storage […]

Tagged , , , , , , , , , , |

Cybersecurity: IoT

Another big change in the cybersecurity landscape over the past decade has been the rise of the Internet of Things (IoT). The IoT is the network of physical objects, devices, televisions, refrigerators, home climate systems, cars, and other items, that are increasingly embedded with electronics, software, sensors and network connectivity that enables these objects to […]

Tagged , , , , , , , , , , |

Cybersecurity: Automation of Detection

One aspect of the cybersecurity landscape that has become brighter for defenders is that it has become easier to detect attacks that would have otherwise only been apparent through expert analysis of information system’s event log telemetry. While some attackers are overt and do little to hide their presence on the network, competent attackers often […]

Tagged , , , , , , , , , , |

Cybersecurity: Monetization of Malware

A big change in the recent cybersecurity landscape is coin mining software. Coin minding software is software that mines cryptocurrency, such as Monero, Bitcoin, or Ethereum. This is a big change because in the past it was difficult for an attacker to monetize an intrusion. Coin mining software makes monetizing intrusions straightforward. An attacker who […]

Tagged , , , , , , , , , , |

Cybersecurity: Attack Tools Availability and Sophistication

An adage within the cybersecurity industry is that tools that are only available to the elite hacking teams of nation-state intelligence agencies today will be available to teenage script kiddies within five years. “Script Kiddie” is a derisive term to describe an individual who uses sophisticated scripts and applications developed by experts to attack information […]

Tagged , , , , , , , , , , | ← Older posts