Cybersecurity Safeguards – Essential
This course covers the fundamentals of cybersecurity and how to safeguard against security breaches.
Cybersecurity Safeguards – Essential Read More »
This course covers the fundamentals of cybersecurity and how to safeguard against security breaches.
Cybersecurity Safeguards – Essential Read More »
In this course, students will learn the ISSO role in the operational approach to implementing and managing effective cybersecurity in highly networked enterprises, government and commercial security management models, security program development, and risk assessment and mitigation threat and vulnerability analysis and risk remediation.
Information Systems Security for ISSOs Read More »
Title: Blockchain 101 Description: This course covers the purpose, use, and components of blockchain. It also presents an overview of the evolution of blockchain through first, second, and third generation, and a glimpse into the future of blockchain. Outline and Duration: Total Time Commitment: 38 minutes Lesson 01 – Blockchain Components – 5 minutes Lesson
Title: Introduction to Philos Marketplace™ Description: This course covers the components of the Philos Marketplace™ blockchain and the interactions of blockchains. Students will compare other blockchains to Philos Marketplace™ blockchains as well as identify the components of the consensus model and the steps of the incentive model. Outline and Duration: Lesson 1 – First
Introduction to Philos Marketplace™ Read More »
Title: Becoming a Cybersecurity Professional Description: This course provides information about possible cybersecurity work roles and the knowledge, skills, abilities and tasks associated with these work roles. Target Audience: Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 45 minutes Instructor Background and Course Overview – 2 minutes Cybersecurity Work Roles, Knowledge, Skills, Abilities, &
Becoming a Cybersecurity Professional Read More »
Title: Creating a Risk-Based Budget for CybersecurityDescription: This course provides guidance on how to answer such questions as: how do I secure my organization with the current budget I have? How much money should I be budgeting for cybersecurity? If I want to move my organization to a greater level of cybersecurity, how much would
Creating a Risk-Based Budget for Cybersecurity Read More »
Title: Protecting Your Organization from Insider Threats Description: This course equips students with information about various types of insider threats and approaches to protecting their organizations from such threats. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes
Protecting Your Organization from Insider Threats Read More »
Title: Handling Cybersecurity Breaches Description: This course describes cybersecurity incidents and breaches and provides an understanding of how to respond in the event of a breach. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes Incident Response Process
Handling Cybersecurity Breaches Read More »
Title: Identifying the Right Cybersecurity Tools for Your Environment Description: This course provides guidance on identifying the right cybersecurity tools to use based upon the existing technology within the environment. Target Audience: Entrepreneurs, Small Business Owners, Executives, Purchasing staff, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview
Identifying the Right Cybersecurity Tools for Your Environment Read More »
Title: Cybersecurity 101 Description: This course teaches common terminology used in cybersecurity and describes what constitutes the broad term “cybersecurity.” Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 45 min Instructor Background and Course Overview – 2 minutes The CIA Triad – 15 minutes Learning Resources –