Security of Cyberspace

Cyberspace has become all pervasive. Every facet of a modern life has elements of cyberspace embedded in it. Therefore securing the cyberspace has become a necessity, which can no more be wished away. This space collate the news and views affecting the security of our cyberspace.

19 December 2011

CISSP Training - New Curricula - Target 18 Feb 2012 Exam @ New Delhi

Click here for complete information
Posted by Commander Mukesh Saini (Retd) at 12:16 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Certified Information System Security Professional, CISA, CISM, CISSP, ISC, ISC2, ISO 27001, ISO 27K

No comments:

Post a Comment

Newer Post Older Post Home

Followers

Blog Archive

  • ►  2014 (3)
    • ►  November (3)
  • ►  2013 (59)
    • ►  August (1)
    • ►  July (2)
    • ►  June (8)
    • ►  May (10)
    • ►  March (6)
    • ►  February (14)
    • ►  January (18)
  • ►  2012 (375)
    • ►  December (1)
    • ►  November (2)
    • ►  October (9)
    • ►  September (5)
    • ►  August (28)
    • ►  July (48)
    • ►  June (47)
    • ►  May (54)
    • ►  April (32)
    • ►  March (41)
    • ►  February (52)
    • ►  January (56)
  • ▼  2011 (275)
    • ▼  December (84)
      • Wi-Fi Protected Setup easily unlocked by security ...
      • Kaspersky claims ‘smoking code’ linking Stuxnet an...
      • The effects of social media sites on elections
      • Phishing E-mail Scam Victimize Customers of Chase ...
      • Phishing Scam Targets New Owners of Apple Products
      • Second Person Charged in Emmet County Child Porn Case
      • Facebook status can open door to crime
      • Posting photos online can help criminals track you
      • Thousands warned of charity hacking threat
      • Brit police clamp down on websites aiming to dupe ...
      • Cyber Crime: Man arrested for credit card fraud
      • 'I'll be dead by morning': Terrified mother's Face...
      • Misspelled websites aim to steal information
      • Mystery buyer acquires vatican.xxx web address
      • Hackers hit genocide bill author’s website
      • New Hackers Attacks Focus on ICloud Users
      • 'Anonymous' hackers hit US security firm Stratfor
      • Heartbroken musician killed himself after Facebook...
      • Police officer arrested on suspicion of misusing c...
      • Covert Trojan targets military families' bank account
      • Rising cybercrime pushes African governments to ta...
      • Nepal Police arrests Facebook mis-user for Cyber c...
      • Smartphone Geo-Location Tagging Is A Major Securit...
      • China's cyberwar against U.S. is too vital to ignore
      • RAW gets nod to snoop on calls, emails Provides Ag...
      • Lawless Internet is crushing U.S. creators
      • CISSP Training - New Curricula - Target 18 Feb 201...
      • Cyber criminals will target small business, the cl...
      • DHS issued - Blueprint for a Secure Cyber Future
      • How the RQ-170, US drone was hijacked
      • FBI says hackers hit key services in three US cities
      • The Kremlin's Ham-handed Effort to Squelch Online ...
      • Anatomy of a Nitro Cyber Attack by Symantec
      • Now, a social network only for women
      • Sixteen Persons Charged in International Internet ...
      • FDLE arrests 48 in child computer sex crimes inves...
      • Latin America's Criminal Gangs Get Tech-Savvy
      • Cisco: Cyber criminals keen on mobile device, clou...
      • Manufacturing is the third largest targeted indust...
      • New Phishing Scheme Targets American Airlines
      • Cybercrime Gang Sends Malicious Emails in Symantec...
      • Smartphone Security, Cybercrime, and Fraudulent SS...
      • Evolution of Russian Phone Number Spam
      • Four Romanians Indicted for Hacking Subway, Other ...
      • Russian website publishes vote monitor's e-mails
      • Vladimir Putin's Cyber Warriors
      • Student phishing scam: Two men charged with fraud
      • India is a Sitting Duck in the Cyber Battlefield
      • Virtual Attack, Real Threat
      • Microsoft to fix Duqu virus
      • Pornography distribution - most common type of cyb...
      • Six Arrests In £1m Student 'Phishing' Scam
      • Cyber attacks could wreck world oil supply
      • Cyberwar is more ugly than we thought
      • BBB Alert: Phishing Attack Using BBB Name Strikes ...
      • Iran Prepares For War In Response To Alleged US Dr...
      • Spam sinks to lowest level in almost three years, ...
      • Iran blocks US 'virtual embassy'
      • Surveillance tools: Not just for spies now
      • FBI, Bulgarian Authorities Bust High-Profile Cyber...
      • Facebook 'security glitch' reveals Mark Zuckerberg...
      • Lewd text messages land girl in trouble
      • Cyber bullying out of control
      • News Hackers Hit UN Website, Leak Obama’s Emails ...
      • Why cloud services are a tempting target for attac...
      • Apple's internal employee social media policies le...
      • Smartphones hacking - challenge for business
      • Stockton pervert prosecuted over cartoons of child...
      • Beware of holiday shipping email scams
      • Hackers attacked Saskatchewan government computers...
      • The 2012 World Conference on International Telecom...
      • Insight: Did Conficker help sabotage Iran program
      • Java is hackers' most common target
      • Family’s child porn trial delayed over legal issues
      • GNP staffer blamed for attack on NEC website
      • Selling Surveillance to Dictators
      • millions of smartphones are secretly monitoring th...
      • Checking out women "for sexual purposes" was just ...
      • The Mystery of Duqu: Part Six (The Command and Con...
      • Anoka’s cyber bullying problem
      • Collinsville teen becomes victim of cyber-bullying
      • Feds Seize 150 Websites in Counterfeit Crackdown
      • Organisations encouraged to comply with ISO 27001 ...
    • ►  November (82)
    • ►  October (41)
    • ►  September (68)
www.xcyss.in. Theme images by gaffera. Powered by Blogger.