TITLE

Heightened security concerns lead to classes

AUTHOR(S)
Parish, Linn
PUB. DATE
April 2002
SOURCE
Journal of Business (10756124);4/18/2002, Vol. 17 Issue 9, pA17
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports the system security breach of a healthcare provider in the U.S. Demand for training on security issues; Development of curricula; Target market for the training courses.
ACCESSION #
6788583

 

Related Articles

  • Backup and recovery--preparing to mitigate disaster. Sardoni, Ken // Enterprise/Salt Lake City;8/5/2002, Vol. 32 Issue 6, p13 

    Provides tips in developing a strategy to protect an organization from losing data. Importance of training information technology personnel in the appropriate backup and recovery functions of the operating system and application software; Creation of a backup, recovery and security plan;...

  • STEP 1.  // Information Security;Apr2007 Supplement, Vol. 10, p2 

    The article offers information on training courses available for information technology (IT) security professionals from the System, Administration Networking and Security (SANS) Institute in the U.S. The IT Security Audit & Control Essentials course is available for people in the security field...

  • Higher IT education. Abernathy, Donna J. // Training & Development;Jul98, Vol. 52 Issue 7, p65 

    Features the University System of Maryland's Year-2000 Fellowship Program that offers students technical training in computer, workforce experience, college credit and free tuition.

  • Tools. Abernathy, Donna J. // Training & Development;Jul98, Vol. 52 Issue 7, p65 

    Presents equipment and supplies related to computer training. Includes course developed by DigitalThink for information technology training; Web site for performing a skills-gap analysis; COBOL Programming curriculum.

  • Making the most of your training. Ray, Keith // InfoWorld;02/02/98, Vol. 20 Issue 5, p81 

    Offers advice on how to train electronic data processing personnel in the United States. Difficulties experienced by information technology managers in making the right training choices; Determining the training that would benefit the employees; Finding out if the training class offers hands-on...

  • Who's Watching the Store? Paller, Alan; Reeder, Franklin S. // Government Executive;Apr2000, Vol. 32 Issue 4, p72 

    Explores key considerations when hiring competent computer security professionals to handle government computer systems in the United States. Challenges in finding trained professionals; Credentials which should be required from applicants; Availability of certification programs for computer...

  • TRAINING EDP MAINTENANCE AND OPERATION PERSONNEL. Rowland, Alan D. // Training & Development Journal;Jun70, Vol. 24 Issue 6, p32 

    Focuses on the training of electronic data processing maintenance and operation personnel. Relationship between student qualification and training success; Employee's class grade; Correlation with such variables as age, family location, extent of formal education, college major and digital...

  • Skills in demand.  // SC Magazine: For IT Security Professionals (UK Edition);Sep2005, p17 

    This article reports on the demand for skills in the information security market in 2005. Many organisations are undertaking major projects to overhaul their security infrastructures, and this is starting to increase demand on information technology suppliers. As a result, technical consultants...

  • WEBMASTER.  // Tech Directions;Oct2003, Vol. 63 Issue 3, p34 

    Focuses on the Web site administrator profession in the U.S. Earnings of webmasters in the country; Characteristics of Web site administrators; High school and postsecondary training of webmasters.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics