Archive of month: October 2013

Common sense isn’t so common

Sounds like we’re having a few of the usual pseudo-debates on a number of the LinkedIn groups again…I always hesitate to get involved in these conversations because so much of this is common sense, but then again, perhaps common sense isn’t so common. Certification v Experience Isn’t this silly? It was silly for CNAs, MCSE’s, CISSPs, and […]
Read More

Integrating ITIL with project management

One of the many issues facing organizations trying to get substantial traction with ITIL initiatives is the incorrect perception that ITIL is “for operations.” I can’t begin to count the number of developers and project managers who have openly asked in one of my Foundations classes “this isn’t for projects, right?” Well, yes, of course […]
Read More

ITIL hands make light work…

Today’s post really is meant to remind all of us (myself very much included) why ITIL and IT service management matter. 20 years ago, if my email service went down, hardly anyone even noticed (On my BITNET account, I probably could send e-mail to about 5 people). Now, an e-mail outage can disrupt world commerce […]
Read More

Changing the way we think about change management

One of the more challenging problems with deploying ITIL processes is our desire to make workflows linear. We teach the lifecycle one domain at a time, and teach processes in association with the book in which they are described. Reality is seldom so tidy, however. Processes like Change Management, Service Asset and Configuration Management, and […]
Read More

Request Fulfillment is really obvious…and really important

One of the new processes in ITIL v3 is the Request Fulfillment process. The premise is simple enough; we get a number of routine service requests from users, so how do we deal with them and get them taken care of in a way that minimizes the pain? Users want us to facilitate the approvals […]
Read More

CEH

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by […]
Read More

CISSP

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description In this course, students will analyze a wide range of information systems security subjects that are organized into 10 domains for CISSP exam certification. Who Should Attend? This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and […]
Read More

CISM

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description The focus of this course is in-depth coverage of the four domains required to pass the CISM exam: Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Who Should Attend? Experienced information security managers and those who have […]
Read More

CISA

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description The field of information systems is growing and changing at an increasingly fast pace. Organizations are investing in and relying on a secure and efficient IT infrastructure to maintain business and meet business goals and objectives. Information systems auditing plays a crucial role in developing and maintaining […]
Read More

Security+

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description You will implement and monitor security on networks, applications, and operating systems, and respond to security breaches. Course Objectives Upon successful completion of this course, students will be able to: Identify the fundamental concepts of computer security. Identify security threats and vulnerabilities. Examine network security. Manage application, […]
Read More