Free Workshop Category Courses
Browse all Free Workshop category courses available for you on our SecuRetain platform.
Addressing Insider Threats and Case Studies
Objective
What you will learn:
|
Advanced Persistent Threat or Intrusion
ADVANCp6H2
Advanced Persistent Threat or Intrusion
Objective
What you will learn:
|
Architectural Solutions
ARCHITvD8Q
Architectural Solutions
Objective
What you will learn:
|
Asset Management
FCOO102
Asset Management
Objective
|
What you will learn:
|
Backup and Recovery
FCOO104
Backup and Recovery
Objective
|
What you will learn:
|
Breach Management
FCOO105
Breach Management
Objective
For many Startups, the breach could mean business closure or loss of money, or loss of intellectual property. The management and employees must also understand what steps they should take to suspect a breach has occurred. Not all disclosures will be breaches. So, what is the difference between event, alert, incident, and breach? The 10 minutes course is designed to provide an understanding for the management and employees about their role and knowledge they will need to protect the organization from a breach.
What you will learn:
What you will learn:
The training promotes the objectiveof informed management for better decision-making. raining provides managementand employees with a basic understanding of underlying concepts and recommendationsfor managing challenges. Each section informed you about additional trainingrequirements and recommended courses. In the next 10minutes, you will learn:
- What is the importance of abreach notification?
- What is a data breach?
- In what circumstances wouldnotification of a data breach be required and to whom?
- Suggested e-Learning courses toenhance the knowledge.
(Note - The suggested e-Learningprogram is a two-part series.)
Bring Your Own Device
FCOO106
Bring Your Own Device
Objective
|
What you will learn:
|
Free Course - Cybersecurity Training
Objective
|
What you will learn:
|
Incident Response
FCOO108
Incident Response
Objective
|
What you will learn:
|
Information System Protection
FCOO109
Information System Protection
Objective
The University of Florida discovered an error in one of its systems that allowed outside access to the directory, which contained Social Security numbers for about 100 people. By making management and employees fully aware and responsible for their actions towards the scope of the threats and how high the cybercrime stakes are, SecuRetain e-Learning courses are the best solutions for up-scaling the cyber knowledge of employees. As computing and networking resources such as servers, laptops, tablets, smartphones, networks, routers, switches have become an integral part of business, they have also become a target of cybercriminals. Organizations must be vigilant with the way they protect their resources. |
What you will learn:
|
Network Security
FCOO110
Network Security
Objective
|
What you will learn:
|
Personnel Screening and Insider Threat
Objective
|
What you will learn:
|
Physical and Environmental Security and Case Studies
Objective
|
What you will learn:
|
Remote Access
FCOO113
Remote Access
Objective
|
What you will learn:
|
User Account Management and Access Control
Objective
|
What you will learn:
|
Wireless Network Security
FCOO114
Wireless Network Security
Objective
|
What you will learn:
|