Global Knowledge to Host Two Live Cybersecurity Webinars in February

Global Knowledge will host two free, hour-long cybersecurity webinars in February 2011. Cybersecurity expert Jay Ferron will lead both.

In the second cybersecurity webinar, “Securing Communications,” scheduled for 12 pm EST Wednesday, February 23, attendees will learn how to put into practice the cybersecurity concepts covered in the first webinar. They will learn about using cryptography to secure services and wireless networks and about using rights management for protecting data.The first webinar, “Protecting Your Network with Authentication and Cryptography,” is scheduled for 12 pm EST Wednesday, February 9, and will focus on password protocols, user verification, symmetric and asymmetric encryption, and using cryptography to protect data.

“In this cybersecurity webinar series, we’ll discuss using cryptography, authentication, and encryption from theory to practice,” said Ferron. “Grasping these concepts will help you understand the basics of keeping your data secure.”

Webinar: Protecting Your Network with Authentication and Cryptography

Live Presentation: Wednesday, February 9, 2011, 12:00–1:00 pm EST

Webinar: Securing Communications

Live Presentation: Wednesday, February 23, 2011, 12:00–1:00 pm EST

Register for “Protecting Your Network with Authentication and Cryptography” and “Securing Communications” on the Global Knowledge web site. Recorded versions of these cybersecurity webinars will be available approximately one week after the live sessions.

Cybersecurity Practice Lead, instructor, and course author Jay Ferron holds the following certifications: CEHI, CISM, CISSP, CWSP, MCITP, MCSE, MCT, MVP NSA-IAM. Jay brings more than 20 years of experience in security, networking, virtualization, and high-performance computing. A multi-faceted author, trainer, speaker, and designer, Jay has led the development of Windows and UNIX security designs, network infrastructures, enterprise designs, and installations for numerous Fortune 500 companies as well as government and health agencies. He is the author of more than 15 courseware books and papers for Microsoft and other vendors on security, networking, and virtualization technologies. In his current work at Global Knowledge, he is building a unique cybersecurity program that provides a global perspective of the challenges of designing a secure system.