Cybersecurity Safeguards – Essential
This course covers the fundamentals of cybersecurity and how to safeguard against security breaches.
All non-customer specific courses
This course covers the fundamentals of cybersecurity and how to safeguard against security breaches.
In this course, students will learn the ISSO role in the operational approach to implementing and managing effective cybersecurity in highly networked enterprises, government and commercial security management models, security program development, and risk assessment and mitigation threat and vulnerability analysis and risk remediation.
Title: Becoming a Cybersecurity Professional Description: This course provides information about possible cybersecurity work roles and the knowledge, skills, abilities and tasks associated with these work roles. Target Audience: Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 45 minutes Instructor Background and Course Overview – 2 minutes Cybersecurity Work Roles, Knowledge, Skills, Abilities, & …
Title: Creating a Risk-Based Budget for CybersecurityDescription: This course provides guidance on how to answer such questions as: how do I secure my organization with the current budget I have? How much money should I be budgeting for cybersecurity? If I want to move my organization to a greater level of cybersecurity, how much would …
Title: Protecting Your Organization from Insider Threats Description: This course equips students with information about various types of insider threats and approaches to protecting their organizations from such threats. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes …
Protecting Your Organization from Insider Threats Read More »
Title: Handling Cybersecurity Breaches Description: This course describes cybersecurity incidents and breaches and provides an understanding of how to respond in the event of a breach. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes Incident Response Process …
Title: Identifying the Right Cybersecurity Tools for Your Environment Description: This course provides guidance on identifying the right cybersecurity tools to use based upon the existing technology within the environment. Target Audience: Entrepreneurs, Small Business Owners, Executives, Purchasing staff, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview …
Identifying the Right Cybersecurity Tools for Your Environment Read More »
Title: Cybersecurity 101 Description: This course teaches common terminology used in cybersecurity and describes what constitutes the broad term “cybersecurity.” Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 45 min Instructor Background and Course Overview – 2 minutes The CIA Triad – 15 minutes Learning Resources – …
Title: Cybersecurity Risk Management for Federal Systems Description: This course provides a synopsis of the governance requirements associated with federal systems and the process for systems receiving an authorization to operate (ATO). Target Audience: Federal Government and Contractor Executives, Managers, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 1 hour Instructor Background and Course …
Cybersecurity Risk Management for Federal Systems Read More »
Title: Hiring Cybersecurity Professionals Description: This course provides insight into how to create position descriptions for cybersecurity roles, and how to identify candidates that meet the requirements for such roles. Target Audience: Hiring Managers, Human Resource Professionals Outline and Duration: Total time commitment: 45 minutes Instructor Background and Course Overview – 2 minutes Cybersecurity Workforce …