WordPress database error: [Unknown column 'd4fg_postmeta.meta_value' in 'field list']
SELECT DISTINCT d4fg_posts.*, MIN(d4fg_postmeta.meta_value) as EventStartDate, MIN(tribe_event_end_date.meta_value) as EventEndDate FROM d4fg_posts LEFT JOIN d4fg_postmeta as tribe_event_end_date ON ( d4fg_posts.ID = tribe_event_end_date.post_id AND tribe_event_end_date.meta_key = '_EventEndDate' ) WHERE 1=1 AND d4fg_posts.post_type = 'tribe_events' AND (d4fg_posts.post_status = 'publish' OR d4fg_posts.post_status = 'hidden' OR d4fg_posts.post_status = 'expired' OR d4fg_posts.post_status = 'refunded' OR d4fg_posts.post_status = 'failed' OR d4fg_posts.post_status = 'revoked' OR d4fg_posts.post_status = 'cancelled' OR d4fg_posts.post_status = 'abandoned' OR d4fg_posts.post_status = 'processing' OR d4fg_posts.post_status = 'preapproval' OR d4fg_posts.post_status = 'tribe-ea-success' OR d4fg_posts.post_status = 'tribe-ea-failed' OR d4fg_posts.post_status = 'tribe-ea-schedule' OR d4fg_posts.post_status = 'tribe-ea-pending' OR d4fg_posts.post_status = 'tribe-ea-draft' OR d4fg_posts.post_status = 'new' OR d4fg_posts.post_status = 'interviewed' OR d4fg_posts.post_status = 'offer' OR d4fg_posts.post_status = 'hired' OR d4fg_posts.post_status = 'rejected' OR d4fg_posts.post_status = 'archived') ORDER BY EventStartDate DESC, d4fg_posts.post_date DESC LIMIT 0, 1

BEGIN:VCALENDAR VERSION:2.0 PRODID:-//VetsinTech - ECPv5.9.1//NONSGML v1.0//EN CALSCALE:GREGORIAN METHOD:PUBLISH X-WR-CALNAME:VetsinTech X-ORIGINAL-URL:https://vetsintech.co X-WR-CALDESC:Events for VetsinTech BEGIN:VTIMEZONE TZID:America/Los_Angeles BEGIN:DAYLIGHT TZOFFSETFROM:-0800 TZOFFSETTO:-0700 TZNAME:PDT DTSTART:20210314T100000 END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:-0700 TZOFFSETTO:-0800 TZNAME:PST DTSTART:20211107T090000 END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTART;TZID=America/Los_Angeles:20210901T080000 DTEND;TZID=America/Los_Angeles:20210910T210000 DTSTAMP:20210917T130438 CREATED:20210812T110230Z LAST-MODIFIED:20210812T110230Z UID:38740-1630483200-1631307600@vetsintech.co SUMMARY:VetsinTech Cisco Certified CyberOps Associate Scholarship! DESCRIPTION:In order to enroll and get started in the class\, you must follow these steps!\nRegister with VetsinTech via this Eventbrite\n\n\nIn order to enroll and get started in the class\, you must follow these steps! \n\nLink is sent in confirmation email immediately after registration \nVerify your Eligibility status with ID.me at the following link: https://vetsintech.co/idme/\nSubmit your application HERE\nSubmit Resume online at the following link vetsintech.co/submit-resume/\nPlease allow 3-5 days for the registration/verification process.\nRead and follow email instructions upon completion of registration.\n\nUnderstanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 \nWhat you’ll learn in this course \nThe Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts\, common network and application operations and attacks\, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches\, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture\, hands-on labs\, and self-study\, you will learn the essential skills\, concepts\, and technologies to be a contributing member of a Cybersecurity Operations Center (SOC) including understanding the IT infrastructure\, operations\, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. \nCourse duration \n\nInstructor-led training: 5 days in the classroom with hands-on practice\, plus the equivalent of 3 days of self-study material\nVirtual instructor-led training: 5 days of virtual instructor lead classes with hands-on practice\, plus the equivalent of 3 days of self-study material\nE-learning: Equivalent of 5 days of content with videos\, practice\, and challenge plus 3 days of self-study material\n\nHow you’ll benefit \nThis course will help you: \n \n\nLearn the fundamental skills\, techniques\, technologies\, and hands-on practice necessary to prevent and defend against cyberattacks as part of a SOC team\nPrepare for the 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam which earns the Cisco Certified CyberOps Associate certification\nEarn 30 Continuing Education Credits toward recertification \n\nWho should enroll \nThis course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including: \n \n\nStudents pursuing a technical degree\nCurrent IT professionals\nRecent college graduates with a technical degree\n\nThis is available to Veterans\, Transitioning Service Members\, National Guard\, Reservists & Military Spouses \n\nEnroll in online Cisco cybersecurity training: Cisco Certified Cyber Operations\nTap into a community of learners\, educators\, and employers\nLeverage mentoring and career resources to assist with job placement\n\nAccording to the Department of Homeland Security\, the number of cybersecurity-related jobs outpaces the number of people qualified to fill them\, and that demand is growing rapidly.  \n\n\nCourse details \nObjectives \nAfter taking this course\, you should be able to: \n \n\nExplain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.\nExplain Network Security Monitoring (NSM) tools that are available to the network security analyst.\nExplain the data that is available to the network security analyst.\nDescribe the basic concepts and uses of cryptography.\nDescribe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.\nUnderstand common endpoint security technologies.\nUnderstand the kill chain and the diamond models for incident investigations\, and the use of exploit kits by threat actors.\nIdentify resources for hunting cyber threats.\nExplain the need for event data normalization and event correlation.\nIdentify the common attack vectors.\nIdentify malicious activities.\nIdentify patterns of suspicious behaviors.\nConduct security incident investigations.\nExplain the use of a typical playbook in the SOC.\nExplain the use of SOC metrics to measure the effectiveness of the SOC.\nExplain the use of a workflow management system and automation to improve the effectiveness of the SOC.\nDescribe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT).\nExplain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format.\n\nPrerequisites \nBefore taking this course\, you should have the following knowledge and skills: \n \n\nFamiliarity with Ethernet and TCP/IP networking\nWorking knowledge of the Windows and Linux operating systems\nFamiliarity with basics of networking security concepts\nThe following Cisco course can help you gain the knowledge you need to prepare for this course:\nImplementing and Administering Cisco Solutions (CCNA®)\n\nOutline \n\nDefining the Security Operations Center\nUnderstanding Network Infrastructure and Network Security Monitoring Tools\nExploring Data Type Categories\nUnderstanding Basic Cryptography Concepts\nUnderstanding Common TCP/IP Attacks\nUnderstanding Endpoint Security Technologies\nUnderstanding Incident Analysis in a Threat-Centric SOC\nIdentifying Resources for Hunting Cyber Threats\nUnderstanding Event Correlation and Normalization\nIdentifying Common Attack Vectors\nIdentifying Malicious Activity\nIdentifying Patterns of Suspicious Behavior\nConducting Security Incident Investigations\nUsing a Playbook Model to Organize Security Monitoring\nUnderstanding SOC Metrics\nUnderstanding SOC Workflow and Automation\nDescribing Incident Response\nUnderstanding the Use of VERIS\nUnderstanding Windows Operating System Basics\nUnderstanding Linux Operating System Basics\n\nLab outline \n\nUse NSM Tools to Analyze Data Categories\nExplore Cryptographic Technologies\nExplore TCP/IP Attacks\nExplore Endpoint Security\nInvestigate Hacker Methodology\nHunt Malicious Traffic\nCorrelate Event Logs\, Packet Captures (PCAPs)\, and Alerts of an Attack\nInvestigate Browser-Based Attacks\nAnalyze Suspicious Domain Name System (DNS) Activity\nExplore Security Data for Analysis\nInvestigate Suspicious Activity Using Security Onion\nInvestigate Advanced Persistent Threats\nExplore SOC Playbooks\nExplore the Windows Operating System\nExplore the Linux Operating System URL:https://vetsintech.co/event/vetsintech-cisco-certified-cyberops-associate-scholarship/ ATTACH;FMTTYPE=image/jpeg:https://vetsintech.co/wp-content/uploads/2021/08/bf69d3ba190e7fd595daa727cb135000-COpCUB.tmp_.jpg END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/Los_Angeles:20210908T090000 DTEND;TZID=America/Los_Angeles:20210908T130000 DTSTAMP:20210917T130438 CREATED:20210812T110230Z LAST-MODIFIED:20210812T110230Z UID:38741-1631091600-1631106000@vetsintech.co SUMMARY:VetsinTech MilSpouse Tech Summit DESCRIPTION:VetsinTech is hosting a MilSpouse Tech Summit to Empower\, Educate\, and Employ military spouses.\n\n\nVetsinTech is hosting a MilSpouse Tech Summit to Empower\, Educate and Employ military spouses. We are excited to have a powerhouse of military spouses leading the education\, employment\, and entrepreneurship tracks. \nDate: Wed\, Sep 8\, 2021 \nAgenda: \n9:00am- 9:15am PST: Keynote speakers- Welcome \n9:15am – 10:15am PST: Education moderated by Laura Schmiegel – Booz Allen Hamilton \n10:15 – 11:15am PST: Employment moderated by Beth Conlin – Amazon \n11:15 – 12:15 am PST: Entrepreneurship moderated by Jaime Chapman – Milspouse Chamber of Commerce \n12:15 – 13:00 PST: Breakout Sessions with employers and panelists – Q&A \nLocation: Online \n \n\n\n\nLaura Schmiegl is Head of Military and Veteran Affairs at Booz Allen Hamilton\, where she is responsible for all aspects of the firm’s military partnership strategy and for advising the firm’s military recruiting\, diversity and government relations teams. Prior to Booz Allen\, Laura had a career in military nonprofits. She was a founding member and later Chairman of the Board at Blue Star Families\, she created and directed the military spouse program at Hiring Our Heroes and served as a regional director for The Mission Continues. Her writing has been published in the Washington Post and the Christian Science Monitor. Laura lives in Arlington with her husband Kevin Schmiegel (USMA Ret.) and children. \n\n\n\nBeth Conlin is an army spouse\, she has been working to improve employment opportunities for military spouses since an overseas move in 2013 forced her to quit her job\, putting both her professional development and family stability at risk. Initially\, Beth started working on the unemployment crisis for military spouses alone from Germany. From educating employers\, recruiting spouses\, and directly placing spouses into long-term careers\, Beth has an intimate working knowledge of the obstacles and has developed solutions to help reduce employment challenges. Recognized as a subject matter expert she has contributed to panel discussions\, authored op-eds\, and been called on to support various members of Congress with military spouse initiatives. Now at Amazon\, Beth is working to connect this untapped talent pool to the workforce inside Amazon as well as build strategic partnerships that will elevate the impacts this group has and ultimately end the recession our military spouses face. Outside of her work for Amazon\, she is an advisor to MilitarySpouseJobs.org and the Military Officers Association of America is the Chairwoman of the board for the newly founded Military Spouse Chamber of Commerce and sits on several DoD and White House working groups focused on reducing employment challenges. \n\n\n\nJaime Chapman is the Co-Founder and Chief Operating Officer of the Military Spouse Chamber of Commerce. Her professional background is in human resources and recruitment where she has placed over 1\,600 jobseekers in careers\, creating an economic impact totaling over $112 million. Jaime has achieved recognition for: \n#1 Military Spouse Owned Business Overall Award by Military and Veteran’s Choice in September 2019 at the Military Influencer Conference in DC.\n2020-2021 Armed Forces Insurance US Army Garrison Wiesbaden Military Spouse of the Year Award.\nScholar\, George W. Bush Stand-To Veteran Leadership Program\, Class of 2021.\nJaime served in the Army Reserves for 6-years and is currently an active-duty Army spouse with her family stationed in Texas. She is a proud advocate for the military community\, actively working to reduce military spouse unemployment and under-employment. In addition to her work at the Military Spouse Chamber\, Jaime provides professional speaking and consulting services for organizations that are looking to hire\, retain\, and promote military spouse and veteran talent. URL:https://vetsintech.co/event/vetsintech-milspouse-tech-summit/ END:VEVENT END:VCALENDAR