alysten: (Sad Panda)
alysten ([personal profile] alysten) wrote2010-10-12 04:46 pm

Security training.

 I have just learned that the social engineering janitor hackers are out to steal my lollipops and fun dips.  What is the world coming to.

[identity profile] math5.livejournal.com 2010-10-12 08:51 pm (UTC)(link)
In this week's horrible news: one of my annual training this week informed me that: "THERE IS NO BSL-4 RESEARCH AT PENN"
Well, damn...

sigh

[identity profile] bytchearse.livejournal.com 2010-10-12 10:18 pm (UTC)(link)
I hate it when I can't speak the language...

Re: sigh

[identity profile] math5.livejournal.com 2010-10-12 10:32 pm (UTC)(link)
We are not allowed to work with pathogens of Ebola level of risk, which might be due to the fact that we don't have the adequate facilities ;)
I was just very amused by the vehemence of the slide.

Re: sigh

[identity profile] beckishadow.livejournal.com 2010-10-12 11:27 pm (UTC)(link)
%#$@!! administrators taking all of the fun away...

Re: sigh

[identity profile] math5.livejournal.com 2010-10-13 01:07 am (UTC)(link)
Don't they?

[identity profile] marajade648.livejournal.com 2010-10-13 12:50 am (UTC)(link)
There's been so much hub-bub here in Boston about putting in a BSL-4 facility at Boston University Medical. All the residents think science is out to kill them. Not sure its worth the headache but the fight rages on.

[identity profile] math5.livejournal.com 2010-10-13 01:08 am (UTC)(link)
OK, I was wondering why they were so vehement about that on a yearly refresher training. I guess it makes more sense.

[identity profile] razerwilliam.livejournal.com 2010-11-18 04:55 am (UTC)(link)
An e-Learning course aimed at providing the most comprehensive knowledge and skills in the Network Security Courses (http://www.information-security-training.com/network-security-courses/) providing an opportunity to equip the Information Security Certification (http://www.information-security-training.com/) or Network System Administrators & Information Security Officers to understand the security concerns, vulnerabilities, attacks and to plan and implement the desired e-Security solutions.