CySkills_Courses

All non-customer specific courses

Information Systems Security for ISSOs

Information Systems Security for ISSOs

In this course, students will learn the ISSO role in the operational approach to implementing and managing effective cybersecurity in highly networked enterprises, government and commercial security management models, security program development, and risk assessment and mitigation threat and vulnerability analysis and risk remediation.

Becoming A Cybersecurity Professional

Becoming a Cybersecurity Professional

Title: Becoming a Cybersecurity Professional Description:  This course provides information about possible cybersecurity work roles and the knowledge, skills, abilities and tasks associated with these work roles. Target Audience: Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 45 minutes Instructor Background and Course Overview – 2 minutes Cybersecurity Work Roles, Knowledge, Skills, Abilities, & …

Becoming a Cybersecurity Professional Read More »

Protecting your organization from insider threats

Protecting Your Organization from Insider Threats

Title: Protecting Your Organization from Insider Threats Description: This course equips students with information about various types of insider threats and approaches to protecting their organizations from such threats. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes …

Protecting Your Organization from Insider Threats Read More »

Handling Cybersecurity Breaches

Handling Cybersecurity Breaches

Title: Handling Cybersecurity Breaches Description: This course describes cybersecurity incidents and breaches and provides an understanding of how to respond in the event of a breach. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes Incident Response Process …

Handling Cybersecurity Breaches Read More »

Identifying the Right Cybersecurity Tools for Your Environment

Identifying the Right Cybersecurity Tools for Your Environment

Title: Identifying the Right Cybersecurity Tools for Your Environment Description: This course provides guidance on identifying the right cybersecurity tools to use based upon the existing technology within the environment. Target Audience: Entrepreneurs, Small Business Owners, Executives, Purchasing staff, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview …

Identifying the Right Cybersecurity Tools for Your Environment Read More »

cybersecurity 101

Cybersecurity 101

Title:  Cybersecurity 101 Description:  This course teaches common terminology used in cybersecurity and describes what constitutes the broad term “cybersecurity.” Target Audience:  Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 45 min Instructor Background and Course Overview – 2 minutes The CIA Triad  – 15 minutes Learning Resources – …

Cybersecurity 101 Read More »

Cybersecurity Risk Management for Federal sytems

Cybersecurity Risk Management for Federal Systems

Title:  Cybersecurity Risk Management for Federal Systems Description:  This course provides a synopsis of the governance requirements associated with federal systems and the process for systems receiving an authorization to operate (ATO). Target Audience: Federal Government and Contractor Executives, Managers, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 1 hour Instructor Background and Course …

Cybersecurity Risk Management for Federal Systems Read More »

Hiring Cybersecurity Professionals

Hiring Cybersecurity Professionals

Title:  Hiring Cybersecurity Professionals Description:  This course provides insight into how to create position descriptions for cybersecurity roles, and how to identify candidates that meet the requirements for such roles. Target Audience: Hiring Managers, Human Resource Professionals Outline and Duration: Total time commitment: 45 minutes Instructor Background and Course Overview – 2 minutes Cybersecurity Workforce …

Hiring Cybersecurity Professionals Read More »