
Sign up to save your podcasts
Or
Talk around key cyber security technologies. Detailed explanations on each with job descriptions and roles helping prospects decide how and where to apply these technologies in the cyber security field. In part 2, I talk about Proxy/NAT, Multi-Factor Authentication (MFA), Mobile Device Management (MDM), Asset Management and Patch Management. Cyber Security Job guidance for students, early professionals and experienced individuals looking for a new profession in Cyber Security or retraining.
Support the show
4.6
1111 ratings
Talk around key cyber security technologies. Detailed explanations on each with job descriptions and roles helping prospects decide how and where to apply these technologies in the cyber security field. In part 2, I talk about Proxy/NAT, Multi-Factor Authentication (MFA), Mobile Device Management (MDM), Asset Management and Patch Management. Cyber Security Job guidance for students, early professionals and experienced individuals looking for a new profession in Cyber Security or retraining.
Support the show