Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Building a Security Team: Security Training and Certification Paths with Pluralsight

Автор: Ingram Micro Cloud

Загружено: 2023-07-28

Просмотров: 89

Описание:

Although cybersecurity may seem like a complex subject, it's about educating your team on current security best practices. In this webinar, we will help to close the skills gap by outlining popular cybersecurity certification paths based on roles.

Discover the best cybersecurity certification path for your staff as you start positioning yourself as a security-first MSP.

Topics we will cover:

The best cybersecurity learning paths designed to help anyone at any level
Vendor-neutral certifications that validate your team's ability to protect your organization across cloud environments
Our recommendations for the top cybersecurity certifications from Microsoft, (ISC)² and CompTIA

Speakers:

Briana Lau - Global Growth Solutions Lead, Cybersecurity at Ingram Micro

Just Koch- Cloud Vendor Business Manager at Ingram Micro

Benjamin Barnard- Channel Sales Executive at Pluralsight

Ashton Brillante- Partner Solutions Architect at Pluralsight

Building a Security Team: Security Training and Certification Paths with Pluralsight

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#4574 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "HhqFz3sJXT4" ["related_video_title"]=> string(41) "Expanding your Security Practice with MDR" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(18) "Ingram Micro Cloud" } [1]=> object(stdClass)#4547 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "FEMrlY9BK4g" ["related_video_title"]=> string(55) "Strengthening your CMMC 2.0 Go-To-Market with Microsoft" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(18) "Ingram Micro Cloud" } [2]=> object(stdClass)#4572 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "9-5MQiEF3W8" ["related_video_title"]=> string(81) "Sink or Swim: Using Contracts Effectively to De-risk your Cybersecurity Offerings" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(18) "Ingram Micro Cloud" } [3]=> object(stdClass)#4579 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "e9RwuaTvbtQ" ["related_video_title"]=> string(96) "From Buzzword to Business Tool: How SMEs Can Actually Use AI – Brian Horsburgh at #EBL2025" ["posted_time"]=> string(19) "1 час назад" ["channelName"]=> string(14) "Elite Business" } [4]=> object(stdClass)#4558 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "qEm4ffUh2zk" ["related_video_title"]=> string(48) "Meeting and Advising for Cybersecurity Insurance" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(18) "Ingram Micro Cloud" } [5]=> object(stdClass)#4576 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "_13mIg3L7Ww" ["related_video_title"]=> string(38) "Modern Mobility: From Chaos to Control" ["posted_time"]=> string(22) "13 дней назад" ["channelName"]=> string(14) "vCom Solutions" } [6]=> object(stdClass)#4571 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "wjZofJX0v4M" ["related_video_title"]=> string(148) "LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(11) "3Blue1Brown" } [7]=> object(stdClass)#4581 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "blWdjRUPP6E" ["related_video_title"]=> string(72) "Разведчик о том, как использовать людей" ["posted_time"]=> string(25) "3 недели назад" ["channelName"]=> string(18) "Коллектив" } [8]=> object(stdClass)#4557 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "uUrpicDpiWs" ["related_video_title"]=> string(100) "Покушение на Зеленского / Предатель в Офисе президента" ["posted_time"]=> string(23) "8 часов назад" ["channelName"]=> string(10) "NEXTA Live" } [9]=> object(stdClass)#4575 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "NNSHu0rkew8" ["related_video_title"]=> string(47) "Учебник по Power BI за 10 минут" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(15) "Kevin Stratvert" } }
Expanding your Security Practice with MDR

Expanding your Security Practice with MDR

Strengthening your CMMC 2.0 Go-To-Market with Microsoft

Strengthening your CMMC 2.0 Go-To-Market with Microsoft

Sink or Swim: Using Contracts Effectively to De-risk your Cybersecurity Offerings

Sink or Swim: Using Contracts Effectively to De-risk your Cybersecurity Offerings

From Buzzword to Business Tool: How SMEs Can Actually Use AI – Brian Horsburgh at #EBL2025

From Buzzword to Business Tool: How SMEs Can Actually Use AI – Brian Horsburgh at #EBL2025

Meeting and Advising for Cybersecurity Insurance

Meeting and Advising for Cybersecurity Insurance

Modern Mobility: From Chaos to Control

Modern Mobility: From Chaos to Control

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

Разведчик о том, как использовать людей

Разведчик о том, как использовать людей

Покушение на Зеленского / Предатель в Офисе президента

Покушение на Зеленского / Предатель в Офисе президента

Учебник по Power BI за 10 минут

Учебник по Power BI за 10 минут

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]