MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.
Take me to MyPage
I'm not curious
IT Career Development Platform
IT Courses & Reviews
IT Course & Reviews
Where IT Talents Shine
We built MyTechLogy for you
Help us to help you.
Share your expectations and experience to improve it.
Please enter your feedback.
Thank you for your feedback!
Thank you for your Feedback
Your feedback would help us in sending you the most relevant job opportunities
You are here:
IT Tag View
A type of security management system for computers and networks. An ID system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches.
This tag is listed under
IT Security & Architecture
Kali Linux - Backtrack Evolved
- Assuring Security by Penetration Testing
Software Defined Networking (SDN): The Big Picture
- Learn the basics of SDN and Network Virtualization, how they are sh...
SSCP®: Network and Communications Security
- Learn to secure networks and telecommunications technologies.
Exploitation: Evading Detection and Bypassing Countermeasures
- This course addresses one of the most commonly overlooked areas of ...
Ethical Hacking: Evading IDS, Firewalls, and Honeypots
- Protect your information from hackers using the most modern methods...
CISSP® - Physical (Environmental) Security
- Develop a greater understanding of how to protect people, facilitie...
View All IT Courses for Intrusion Detection
IT Security & Architecture
IT Blogs & Reviews
HPE and Citrix team up to make hybrid cloud-enabled wor... |
on 27 August 18
As businesses of every stripe seek to bring more virtual desktop infrastructure ...
Enterprise Blockchain Applications In Hyperledger Malay... |
on 24 August 18
Hyperledger blockchain technology is a new demand of the business world and every ...
How one MSP picked Bitdefender’s layered security app... |
on 22 August 18
Solving security concerns has risen to the top of the requirements list for just ...
Citrix and HPE team to bring simplicity to the hybrid c... |
on 21 August 18
One of the key elements of digital transformation is aligning core, cloud, and edge ...
Path to client workspace automation paved with hypercon... |
on 09 August 18
The next BriefingsDirect hyperconverged infrastructure (HCI) use case discussion ...
How HPE and Docker together accelerate and automate hyb... |
on 25 July 18
The next BriefingsDirect hybrid cloud strategies discussion examines how the use of ...
Lead Security Officer
We are looking for a Chief Information Security Officer (CISO) to provide the leadership to enhance...
Head - Cybersecurity
We are seeking a Section Head Cybersecurity to lead and drive the global cybersecurity coverage and...
Procurement Manager [Description] Key responsibilities:Act as the key stakeholder of the entire pur...
Compliance Manager [Description] Key responsibilities:Review guidelines/circulars/directives/observ...
Senior Procurement Manager
Senior Procurement Manager [Description] Key responsibilities:Plan, direct and control all activiti...
Head, Investment Governance
Head, Investment Governance [Description] Key responsibilities:Liaison person on investment governa...
IT Job Trend(s)
Thank You! Your e-mail has been sent
Please enter from email address.
Please enter to email address.
Please enter your message.
Awards & Accolades for MyTechLogy
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Align your IT career with your
Get the career coaching from IT experts and professional coaches around the world.
Book Your Appointment Now!