Cybersecurity Safeguards – Essential
This course covers the fundamentals of cybersecurity and how to safeguard against security breaches.
This course covers the fundamentals of cybersecurity and how to safeguard against security breaches.
In this course, students will learn the ISSO role in the operational approach to implementing and managing effective cybersecurity in highly networked enterprises, government and commercial security management models, security program development, and risk assessment and mitigation threat and vulnerability analysis and risk remediation.
Title: Blockchain 101 Description: This course covers the purpose, use, and components of blockchain. It also presents an overview of the evolution of blockchain through first, second, and third generation, and a glimpse into the future of blockchain. Outline and Duration: Total Time Commitment: 38 minutes Lesson 01 – Blockchain Components – 5 minutes Lesson …
Title: Introduction to Philos Marketplace™ Description: This course covers the components of the Philos Marketplace™ blockchain and the interactions of blockchains. Students will compare other blockchains to Philos Marketplace™ blockchains as well as identify the components of the consensus model and the steps of the incentive model. Outline and Duration: Lesson 1 – First …
Title: Becoming a Cybersecurity Professional Description: This course provides information about possible cybersecurity work roles and the knowledge, skills, abilities and tasks associated with these work roles. Target Audience: Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 45 minutes Instructor Background and Course Overview – 2 minutes Cybersecurity Work Roles, Knowledge, Skills, Abilities, & …
Title: Creating a Risk-Based Budget for CybersecurityDescription: This course provides guidance on how to answer such questions as: how do I secure my organization with the current budget I have? How much money should I be budgeting for cybersecurity? If I want to move my organization to a greater level of cybersecurity, how much would …
Title: Protecting Your Organization from Insider Threats Description: This course equips students with information about various types of insider threats and approaches to protecting their organizations from such threats. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes …
Protecting Your Organization from Insider Threats Read More »
Title: Handling Cybersecurity Breaches Description: This course describes cybersecurity incidents and breaches and provides an understanding of how to respond in the event of a breach. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes Incident Response Process …
Title: Identifying the Right Cybersecurity Tools for Your Environment Description: This course provides guidance on identifying the right cybersecurity tools to use based upon the existing technology within the environment. Target Audience: Entrepreneurs, Small Business Owners, Executives, Purchasing staff, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview …
Identifying the Right Cybersecurity Tools for Your Environment Read More »
Title: Cybersecurity 101 Description: This course teaches common terminology used in cybersecurity and describes what constitutes the broad term “cybersecurity.” Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 45 min Instructor Background and Course Overview – 2 minutes The CIA Triad – 15 minutes Learning Resources – …
Title: Cybersecurity Risk Management for Federal Systems Description: This course provides a synopsis of the governance requirements associated with federal systems and the process for systems receiving an authorization to operate (ATO). Target Audience: Federal Government and Contractor Executives, Managers, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 1 hour Instructor Background and Course …
Cybersecurity Risk Management for Federal Systems Read More »
Title: Hiring Cybersecurity Professionals Description: This course provides insight into how to create position descriptions for cybersecurity roles, and how to identify candidates that meet the requirements for such roles. Target Audience: Hiring Managers, Human Resource Professionals Outline and Duration: Total time commitment: 45 minutes Instructor Background and Course Overview – 2 minutes Cybersecurity Workforce …
Title: Becoming DFARS 252.204-7012/NIST 800-171 Compliant Description: This course provides an overview of the Defense Federal Acquisition Regulations (DFARS) 252.204-7012 / National Institute of Standards and Technology (NIST) 800-171 compliance requirements and a process for becoming compliant. Target Audience: Defense Industrial Base (DIB) company owners, operators, and staff Outline and Duration: Total time commitment: 1 …
Becoming DFARS 252.204-7012/NIST 800-171 Compliant Read More »