Security, et al

Randy's Blog on Infosec and Other Stuff

«  New Software that Unlocks... | LogRhythm 5.0 Opens New F... »

Register Now: Security Log Secrets Training Seminar - Los Angeles - 1/25-27/2010

Mon, 21 Sep 2009 11:52:49 GMT

Venue announced:

Hilton Los Angeles North/Glendale & Executive Meeting Ctr
100 West Glenoaks Blvd
Glendale, CA
United States, 91202
Tel: 818-956-5466
Fax: 818-956-5490

Many of you have expressed interest in my Security Log Secrets in-person training if I ever scheduled a seminar at a public venue and date. 

Choosing the right date and venue makes all the difference in getting enough attendees in order to run the course.  My recent survey indicated that first quarter of 2010 in Los Angeles was overwhelmingly the best venue and date.  (DC you were a close second so I'll be looking at you next.) 

This special public training seminar of my Security Log Secrets course will be held in Los Angeles, January 25-27, 2010

To register and for pricing click here.

This will be a unique opportunity for fellow security log nerds to gather in person and plumb the depths of the cryptic but vital Windows security log!

For complete information on my Security Log Secrets course click here.  You may request a detailed course outline here.  Email me at rsmith@ultimatewindowssecurity.com with any questions.

I wish I could come to each of your cities but it just isn't feasible.  However, if you can't travel to LA, let me know if you would be interested in attending virtually.  Remember that it would be on Pacific time.

Terms: No refund for cancellation within 30 days of event.  Don't purchase unrefundable airfare until we send you final confirmation.

Please register now! 

email this digg reddit dzone
comments (0)references (0)

Related:
Auditing Privileged Operations and Mailbox Access in Office 365 Exchange Online
Severing the Horizontal Kill Chain: The Role of Micro-Segmentation in Your Virtualization Infrastructure
Anatomy of a Hack Disrupted: How one of SIEM’s out-of-the-box rules caught an intrusion and beyond
5 Indicators of Endpoint Evil

Comments disabled

powered by Bloget™

Search


Categories
Recent Blogs
Archive


 

Additional Resources