You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
18 lines
1.6 KiB
18 lines
1.6 KiB
5 months ago
|
tas&Roben&tasottw4&6.0.0&&&tasottw4&&&bcarico@actscorp.com&N.Y.N.N.N.N.N
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
1.1.o.o.o.N.0&tasottw4.001&tasottw4.002&tasottw4.003&tasottw4.005&tasottw4.006&tasottw4.008&tasottw4.010&tasottw4.012&tasottw4.013&tasottw4.017&tasottw4.019
|
||
|
&::tas.0:1:1:0&::tas.0:1:1:0&::tas.0:1:1:0&?0=0?1=0?2=0?3=0?4=0::tas.0:1:1:0&?0=0?1=0?2=0?3=0?4=0::tas.0:1:1:0&::tas.0:1:1:0&?0=1?1=0?2=0?3=0?4=0::tas.0:1:1:0&::tas.0:1:1:0&::tas.0:1:1:0&?0=0?1=0?2=0?3=0::.0:1:1:0&?0=0?1=0?2=0?3=0?4=0?5=0?6=0::undefined.0:1:1:0
|
||
|
&I only attended the IT Security session with John Kirschner.::&Some of the material provided is outdated, and the instructors answers to many questions demonstrated that he was unaware of the current state of IT security. Despite its title, the session was not adapted to the government context.::&See answer to # 2.::&?xxx?xxx?xxx?xxx?4::&?xxx?xxx?xxx?3?xxx::The presentation material is set of disconnected elements: no attempt to cover current topics such as cyber incident handling, I and A, risk management, intrusion detection/prevention, vulnerability assessment, ethical hacking, wireless security strategy, B2B ecommerce, etc.&Hire competent instructors aware of the current state of IT security business and technolgy.::&?xxx?xxx?2?xxx?xxx::&::&I would not recommend TAS unless an instructor with much more current IT security knowledge is available.::&&?xxx?xxx?xxx?xxx?xxx?xxx?6::- MSc Computer Engineering<BR>- 3 years of teaching 3rd/4th Computer Engineering/Science at RMC and Queens<BR>- 19 years as officer in Comm and Elec Eng with DND<BR>- 15 years as Eng 05/06 and CS 04/05 in GoC<BR>- CISSP 2001
|
||
|
Not Scored by Definition
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|