Solutions & Demo

Disaster Management Category Courses

Browse all Disaster Management category courses available for you on our SecuRetain platform.

Breach Notification Part I - Awareness

Objective

Your employees must also understand what steps they should take if they suspect a breach has occurred. Not all disclosures will be breaches. So, what is the difference between event, alert, incident, and breach? A (reportable) breach is the unauthorized acquisition, access, use, or disclosure of sensitive/PII/PHI information in a manner not permitted by law or regulation and which compromises the security and privacy. The laws require timely notification to Federal and State government authorities about the breach.

The course is designed to ensure employees understand the importance of acting quickly, make sure they are aware of the basic notification rule requirements, and the penalties for failure to comply. 

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.

  • Course ID: CS00301
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • What is the importance of a breach notification?
  • What is a data breach?
  • In what circumstances would notification of a data breach be required and to whom?
  • When and how should notification of a data breach be provided?
  • Framework for Effective Data Breach Notification Legislation
  • Timing of Notification to Affected Individuals
  • Post Data Breach Immediate Action Items
  • Breach Notification to Authorities

Breach Notification Part II - Advanced

Objective

Your employees may be the first to identify a potential breach, so they must have adequate knowledge regarding how they should handle such a scenario. Your employees must also understand what steps they should take if they suspect a breach has occurred. The advanced course trains employees on the next steps instead of panicking. The training will educate employees to understand their roles and do’s and don’ts once the breach occurs. 

The course also educates employees on the process of breach communication internal to the organization and very importantly communicating with outsiders. The laws require timely notification to Federal and State government authorities about the breach. The course is designed to ensure employees understand the importance of acting quickly, make sure they are aware of the basic notification rule requirements, and
the penalties for failure to comply. 

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00302
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Breach Management
  • Effective Breach Response
  • Data Breach Checklist
  • Breach Notification Notice Content
  • Notification Timelines
  • Lifecycle of a Data Breach
  • Public Relations Strategy

Business Continuity & Disaster Recovery (BCP / DR) Part I - Awareness

Objective

Business Continuity Planning (BCP) is the way an organization can prepare for and aid in Disaster Recovery (DR). BCP and DR are the yin and yang of the IT world. BCP keeps systems running and data available despite interruptions or faults. DR brings systems back to normal operation after a disaster has occurred.

This Business Continuity Planning and Disaster Recovery certification course will provide every employee in the organization with the basic knowledge about disasters, risks covered by DR, use cases, challenges, DR Plan, etc. The course is essential for the corporations and organizations that must meet various mandates regarding privacy, confidentiality, and availability of systems and data. In order to promote sustainability and employee retainership we recommend the series BCP/DR Part I to BCP/DR Part V training programs for employee knowledge advancement and growth. 

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test. At the end of this course you will receive a business continuity and disaster recovery completion certificate.

  • Course ID: DR00101
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Disaster
  • Business Continuity and Disaster Recovery
  • Use Cases
  • Risks Covered by DR
  • Driving Factors
  • Challenges in Developing DR Plan
  • Technical Challenges
  • Key Factors in DR Plan

Business Continuity & Disaster Recovery (BCP / DR) Part II - Awareness

Objective

Business Continuity Planning (BCP) is the way an organization can prepare for and aid in Disaster Recovery (DR). BCP and DR are the yin and yang of the IT world. BCP keeps systems running and data available despite interruptions or faults. BCP keeps systems running and data available despite interruptions or faults. DR brings systems back to normal operation after a disaster has occurred. DR is one of the most important topics in computer security and comprehensive training in this field is needed to train all the IT operators in order to prepare themselves for any type of disaster.        
 
The series BCP/DR Part I to BCP/DR Part V help learners understand a variety of topics in BCP and DR such as introduction to DR, the concept of disasters, introduction to BCP, DR processing plans, risk management techniques, facility protection during the DR period, data/system recovery, incident response and public service effect in the disaster recovery plan, disaster communication, etc.

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.
  • Course ID: DR00102
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Business Continuity Plan (BCP) vs Disaster Recovery (DR)
  • Disaster Recovery Architecture
  • Drivers for DR Architecture
  • Architectural Elements
  • Disaster Recovery Plan
  • Backup Strategy
  • Disaster Recovery Emergency Procedures

Business Continuity & Disaster Recovery (BCP / DR) Part III

Objective

Business Continuity Planning (BCP) is the way an organization can prepare for and aid in Disaster Recovery (DR). BCP and DR are the yin and yang of the IT world. BCP keeps systems running and data available despite interruptions or faults. DR brings systems back to normal operation after a disaster has occurred. DR is one of the most important topics in computer security and comprehensive training in this field is needed to train all the IT operators in order to prepare themselves for any type of disaster.
 
The series BCP/DR Part I to BCP/DR Part V helps you understand a variety of topics in BCP and DR such as introduction to DR, the concept of disasters, introduction to BCP, DR processing plans, risk management techniques, facility protection during the DR period, data/system recovery, incident response and public service effect in a DR plan, disaster communication, etc.

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.
  • Course ID: DR00103
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • BCP DR Frameworks and Standards
  • What is the Framework?
  • What are the different BCP frameworks?
  • Frameworks Explained
  • ISO 22301
  • National Fire Protection Association (NFPA) 1600
  • FFIEC Business Continuity
  • NIST 800-34
  • ISO 27301
  • BCP
  • Good Practice Guidelines (GPG)
  • Ready Gov
  • COBIT

Business Continuity & Disaster Recovery (BCP / DR) Part IV

Objective

Business Continuity Planning (BCP) is the way an organization can prepare for and aid in Disaster Recovery (DR). BCP and DR are the yin and yang of the IT world. BCP keeps systems running and data available despite interruptions or faults. DR brings systems back to normal operation after a disaster has occurred. The series BCP/DR Part I to BCP/DR Part V helps you understand a variety of topics in BCP and DR such as introduction to DR, the concept of disasters, introduction to BCP, DR processing plans, risk management techniques, facility protection during the DR period, data/system recovery, incident response and public service effect in the DR plan, disaster communication, etc.

DR Part IV course explains the backup and recovery strategy development considerations, best practices for backup, different methods of backup, recovery methods, etc. The course includes knowledge questions as users progress through the training and final test.

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.
  • Course ID: DR00104
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Learn about what is a backup and recovery strategy
  • Understand and learn to apply best practices for backup
  • Learn eight different backup methods and backup hardware
  • Understand what recovery is and learn about methods of recovery
  • Learn about the challenges with recovery process and prioritization

Incident Management Part I - Awareness

Objective

Incident management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore the normal operations and services as quickly as possible after an unforeseen event. IM is the process of managing the lifecycle of all incidents with the objective to ensure smooth business operations with minimal to no downtime.

The IM programs are designed to train the employees and professionals to develop a better understanding of incidents and how they impact businesses. The program is in three parts. IM Part I is for all employees to help them understand their roles and how quickly an incident can escalate to become a major issue if not managed properly. The employees will learn key concepts, understand different terminologies, etc. The course is designed to ensure employees understand the importance of acting quickly and to make sure they are aware of the basic requirements.

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.

  • Course ID: CS00401
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Brief about Incident and Incident Management (IM)
  • Incident Management Objectives
  • What is a Security Incident Management?
  • Incident, Problem, and Service Request
  • Incident Management Key Concepts
  • Incident Management Process and ITIL
  • Incident Management Process Workflow Examples
  • Incident Management Process
  • Incident Management Process Steps Discussed in Detail

Incident Management Part II - Advanced

Objective

Incident Management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore the normal operations and services as quickly as possible after an unforeseen event. IM is the process of managing the lifecycle of all incidents to ensure smooth business operations with minimal to no downtime. 

Part II of the course will enhance your understanding of the incident management process. It starts with identifying incidents, critical success factors, and key performance indicators specific to IM. You will also learn about the ITIL framework based IM Process Workflow.

The course is designed to ensure practitioners understand the importance of acting quickly and to make sure they are aware of the basic requirements. The course includes knowledge tests as users progress through the training.
  • Course ID: CS00402
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Learn about Incident and Incident Management (IM)
  • Understand Critical Success Factors (CSF) 
  • Understand Key Performance Indicators (KPI) Specific to Incident Management
  • Understand Other Process Interfacing with Incident Management
  • Learn about ITIL Framework Based Incident Management Process Workflow
  • Implementing Incident Management - Detailed Guidance

Incident Management Part III - Cyber Security Incident Response Team (CSIRT)

Objective

Incident management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore the normal operations and services as quickly as possible after an unforeseen event. IM is the process of managing the lifecycle of all incidents to ensure smooth business operations with minimal to no downtime. The program is in three parts.

IM Part III is for all professionals and practitioners to help them understand their roles and how quickly an incident can escalate to become a major issue if not managed properly. Part III provides advanced knowledge in building a Cybersecurity Incident Response Team (CSIRT). The program is thorough about building a CSIRT, escalation, and adapting the CSIRT for different types of incidents. The training is supported by charts and flow diagrams along with detailed information on roles and responsibilities. This is highly recommended for organizations wanting to improve their incident management processes. The course includes knowledge questions as users progress through the training and the final assessment test.

The training is focused on information technology employee growth, retention, and sustainability. In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.

  • Course ID: CS00403
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Understand how to use code of practice ISO 27002
  • Learn about ISMS mandatory processes and documentation
  • Learn about risk assessment, risk treatment plans, statement of applicability
  • Learn about ISO 27001 Annex A controls and requirements

Information Technology General Controls (ITGC) Part III

Objective

The employees must understand the Sarbanes-Oxley Act (SOX) passed to protect shareholders and the general public from accounting errors and fraudulent practices in enterprises, and the role of information technology. Under section 302, the companies need to implement systems that protect against data manipulation, provide the ability to track timelines, and can determine who had access to data and when. Under section 409 compliance mandates the timely disclosure of any information and section 802 states the information technology team’s role in SOX compliance to preserve records. 

In ITGC Part III of the course you will learn about the Information Technology Governance considerations in SOX compliance and SOX requirements for application change controls, data backup and recovery, systems development life cycle, and outsourcing financial applications.

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.
  • Course ID: CS00703
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Understand IT Governance considerations in SOX compliance
  • Understand Activity/Process Level Considerations in General Control Issues
  • Learn about evaluating security administration controls
  • Understand the SOX requirement for:
  • Application change controls
  • Data Backup and Recovery
  • Systems Development Life Cycle (SDLC)
  • Outsourcing Financial Applications
  • Learn about the Role of Application and Data-Owner Processes
  • Understand the application level control considerations
  • Understand the process level control considerations

National Institute of Standards and Technology (NIST) Part I

Objective

National Institute of Standards and Technology (NIST) is responsible for measurement science, standards, and technology in a way that promotes safety and collaboration for industry and government alike. In this course, you will learn to apply the principles of the NIST Cybersecurity Framework (NIST CSF) to your organization.

A security program must keep pace with the evolving threat landscape. NIST CSF helps build and augment a security program that equips the enterprise to keep pace with evolving threats and technologies. The NIST training outlines how implementing a security program based on the CSF framework can help organizations mitigate these issues. The framework core contains cybersecurity activities and informative references that are organized around particular functions.

In this NIST training, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.

National Institute of Standards and Technology (NIST) Part II
  • Course ID: CS00501
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Learn about CSF fundamentals
  • Learn how to develop a risk-based cybersecurity framework
  • Understand the CSF framework core and design
  • In-depth knowledge on how to use functions, categories, and subcategories
  • Use of risk management principles, best practices, and methodologies
  • Understand the CSF implementation tiers and implementation
  • Learn about framework profile implementation
  • Learn about improving resilience

National Institute of Standards and Technology (NIST) Part II

Objective

National Institute of Standards and Technology (NIST) is responsible for measurement science, standards, and technology in a way that promotes safety and collaboration for industry and government alike. In this course, you will learn to implement the principles of the NIST Cyber Security Framework (NIST CSF) in your organization. You will study informative references associated with functions and categories in greater detail.

A security program must keep pace with the evolving threat landscape. NIST CSF helps build and augment a security program that equips the enterprise to keep pace with evolving threats and technologies. The course outlines how implementing a security program based on the CSF framework can help organizations mitigate these issues. The framework core contains cybersecurity activities and informative references that are organized around particular functions.

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00502
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Learn about CSF fundamentals
  • Learn how to establish or improve your cybersecurity program
  • Understand the NIST CSF concept and how to implement with the help of case study
  • Understand the practical application of CSF framework’s core, design, functions, categories, and subcategories
  • Detailed knowledge of functions, categories, and subcategories along with
  • informative references from COBIT, ISA, NIST SP 800-53, CIS CSC, ISO 27001, etc.

Problem Management Part I - Awareness

Objective

The objective of incident management is to restore the service as quickly as possible while problem management deals with solving the underlying root cause of one or more incidents. 

The Problem Management Awareness course will enable you to gain and apply the skills and techniques to your own organization to establish problem management best practices. You will learn when and how to implement a problem control process, understand the workarounds, develop policy and procedures, and define critical success factors as well as key performance indicators. 

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00601
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Understand incident vs. problems
  • Understand quick fix and permanent problem resolution
  • Key definitions and basic concepts for problem management
  • Decide whether you need to implement problem control
  • Key process activities of the problem management process
  • Understand workarounds and solutions
  • Developing problem management policy
  • Learn about problem management process interfaces
  • Critical success factors and key performance indicators

Problem Management Part II - Advanced

Objective

The objective of incident management is to restore the service as quickly as possible while problem management deals with solving the underlying root cause of one or more incidents. The Problem Management Advanced course will enable you to design and implement a problem management process in your organization. 

The course will train you on establishing problem management process roles and responsibilities, step by step approach in implementing key processes, defining process inputs/outputs, and reporting. You will also learn about drivers/inputs that trigger the problem management process. 

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00602
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Understand basic concepts of problem management
  • Learn about the roles and responsibilities associated with the problem
  • management process
  • Understand the input that triggers the problem management process
  • Planning for problem management process implementation and training
  • Understand the problem management process implementation guide (step by step approach)
  • Understand process inputs and outputs
  • Learn about problem management reporting
  • Understand the problem management checklist
  • Understand the activities and documentation

Social Engineering & Phishing Part II - Advanced

Objective

Hackers call data centers and pretend to be customers who have lost their passwords or show up at a site and simply wait for someone to hold a door open for them. Hackers have been known to create phony websites, sweepstakes, or questionnaires that ask users to enter a password. Phishing is a technique used to obtain sensitive information by impersonating oneself as a trustworthy entity in an electronic communication. 

In Part II of Phishing Awareness, you will learn about different types of phishing attacks, techniques in discovering attacks, characteristics of phishing emails, etc. providing employees with very deep knowledge in responding to the growing amount of phishing emails. The course is designed for the organizations that need to comply with the regulatory requirements, support phishing awareness campaigns, and educate employees about the impact of social engineering attacks, especially those having exposure to private data, financial data, highly sensitive, and confidential data. 

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00104
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $31.98
Course Details

What you will learn:

  • Learn about Ten Different Types of Phishing Attacks
  • Understand the Characteristics of Phishing Emails
  • Understand Common Methods of Phishing Attacks
  • Learn about Escalation and Containment
  • Learn about Eradication and Rebuilding
  • Learn about Recovery and Aftermath