MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.
Take me to MyPage
I'm not curious
IT Career Development Platform
IT Courses & Reviews
IT Course & Reviews
Where IT Talents Shine
We built MyTechLogy for you
Help us to help you.
Share your expectations and experience to improve it.
Please enter your feedback.
Thank you for your feedback!
Thank you for your Feedback
Your feedback would help us in sending you the most relevant job opportunities
You are here:
IT Tag View
A type of security management system for computers and networks. An ID system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches.
This tag is listed under
IT Security & Architecture
Kali Linux - Backtrack Evolved
- Assuring Security by Penetration Testing
Software Defined Networking (SDN): The Big Picture
- Learn the basics of SDN and Network Virtualization, how they are sh...
SSCP®: Network and Communications Security
- Learn to secure networks and telecommunications technologies.
Exploitation: Evading Detection and Bypassing Countermeasures
- This course addresses one of the most commonly overlooked areas of ...
Ethical Hacking: Evading IDS, Firewalls, and Honeypots
- Protect your information from hackers using the most modern methods...
CISSP® - Physical (Environmental) Security
- Develop a greater understanding of how to protect people, facilitie...
View All IT Courses for Intrusion Detection
IT Security & Architecture
IT Blogs & Reviews
The Open Group panel explores ways to help smart cities... |
on 01 November 18
The next BriefingsDirect thought leadership panel discussion focuses on how The Open ...
Crypto exchanges raking in millions of dollars daily- I... |
on 20 October 18
Digital asset exchanges and transactors are the biggest winners of the crypto boom ...
Latest Trends in the Technologies and their Upcoming Ca... |
on 11 October 18
We talk about technology trends and they seem to be outdated even before they get ...
Regional dental firm Great Expressions protects distrib... |
on 09 October 18
Modern dentistry depends on more than good care. It also demands rapid access to data and ...
5 SaaS Security Best Practices for Developers |
on 08 October 18
The majority of applications being used today are SaaS (Software as a Service) solutions ...
The Open Group digital practitioner effort eases the pe... |
on 04 October 18
The next BriefingsDirect panel discussion explores the creation of new guidance on how ...
Contract IT Project Administrator
Contract IT Project Administrator [Description] Our utility client is seeking for a potential candi...
Mechanical Site Supervisor
Mechanical Site Supervisor [Description] Responsibilities: Work on:* Supervision on external sites....
HR Manager [Description] Job Responsibilities: Implement Human Resource (HR) plans and strategies. ...
Fraud Risk Manager
Fraud Risk Manager [Description] An international bank is looking to hire a Fraud Risk Manager to b...
Compliance Analyst [Description] Compliance Officer This opportunity offers the chance to join an e...
COMPLIANCE AVP 5 YEARS
COMPLIANCE AVP | >5 YEARS [Description] Ideal candidate should have at least 3 years of regulato...
IT Job Trend(s)
Thank You! Your e-mail has been sent
Please enter from email address.
Please enter to email address.
Please enter your message.
Awards & Accolades for MyTechLogy
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Align your IT career with your
Get the career coaching from IT experts and professional coaches around the world.
Book Your Appointment Now!