Solutions & Demo

Free Workshop Category Courses

Browse all Free Workshop category courses available for you on our SecuRetain platform.

Addressing Insider Threats and Case Studies

Objective

  • Course ID: FCOO101
  • Duration: 9 mins
  • CPE: 1 HR
  • Course Type: e-Learning
  • Price: $0
Course Details

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

     - What are threats?
     = Vulnerabilities on a Network
     = Sources of Vulnerabilities
     = Recommendation
     = Regulatory Requirements
     = Case studies

Advanced Persistent Threat or Intrusion

Objective

Cyber threat is the area every management must know. An Advanced Persistent threat (APT) is a broad term used to describe:
   - Attack strategy against specific targets by a cybercriminals
   - Involves long term presence in the targeted computer systems
   - Includes gaining access to the network to acquire highly sensitive data

The course provides a high-level introduction for the management to initiate the proper action in the strategic direction, protect information assets, highly sensitive data, and take vital steps to protect privacy data.

    • Course ID: ADVANCp6H2
    • Duration: 9 mins
    • CPE: 1 HR
    • Course Type: e-Learning
    • Price: $0
    Course Details

    What you will learn:


    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Advanced Persistent Threat
    Phases of an Advanced Persistent Threat
    Reconnaissance and Initial Access
    Expand Access
    Data Capture/Exfiltration or Manipulation
    Track-Covering and Exit
    The suggested e-Learning courses that would reduce the insurance cost

    Architectural Solutions

    Objective

    Securing ICS infrastructure involves building the systems architecture to be secure from the ground up ‘defense in depth.’ The attacker may pass one roadblock, only to be faced by another and another.
    By employing next-generation firewall, antivirus, intrusion detection, and prevention capabilities,  the security teams can build the best defense to stop cyberattacks.

    Depending on the nature of the business, the management needs to consider the risk associated with the underlying system infrastructure and use of the next-gen solutions, including Machine Learning (ML), Artificial Intelligence (AI), and behavioral analysis to increase prevention, efficacy, and speed.

      • Course ID: ARCHITvD8Q
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $1
      Course Details

      What you will learn:


      The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

      Securing ICS Infrastructure - Defense in Depth
      Next-Gen Tools and Techniques
      Zero Trust

      Asset Management

      Objective

      • Business Continuity Planning (BCP) is how an organization can prepare for and aid in Disaster Recovery (DR). The management and employees must understand their roles and responsibility. The organizations must meet various mandates regarding privacy, confidentiality, and availability of systems and data.
        The suggested e-Learning courses will assist every employee to enhance the basic knowledge about disasters, risks covered by DR, use cases, challenges, DR Plan, etc.
      • Course ID: FCOO102
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      • What you will learn:
        The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

        What is Asset Management?
        Asset Management and Cybersecurity
        Recommendations for Asset Management
        Case Study - Application/Program Vulnerabilities 

      Backup and Recovery

      Objective

      • Business Continuity Planning (BCP) is how an organization can prepare for and aid in Disaster Recovery (DR). The management and employees must understand their roles and responsibility. The organizations must meet various mandates regarding privacy, confidentiality, and availability of systems and data.
        The suggested e-Learning courses will assist every employee with the basic knowledge about disasters, risks covered by DR, use cases, challenges, DR Plan, etc.
      • Course ID: FCOO104
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      • What you will learn:
        The training promotes the objective of informed management for better decision-making. Traning provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

        What is a disaster?
        What is Disaster Recovery?
        Backup and Recovery
        Protecting Backup Data

      Breach Management

      Objective

      For many Startups, the breach could mean business closure or loss of money, or loss of intellectual property. The management and employees must also understand what steps they should take to suspect a breach has occurred. Not all disclosures will be breaches. So, what is the difference between event, alert, incident, and breach? The 10 minutes course is designed to provide an understanding for the management and employees about their role and knowledge they will need to protect the organization from a breach.

      • Course ID: FCOO105
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      What you will learn:

       

      The training promotes the objectiveof informed management for better decision-making. raining provides managementand employees with a basic understanding of underlying concepts and recommendationsfor managing challenges. Each section informed you about additional trainingrequirements and recommended courses. In the next 10minutes, you will learn:

      • What is the importance of abreach notification?
      • What is a data breach?
      • In what circumstances wouldnotification of a data breach be required and to whom?
      • Suggested e-Learning courses toenhance the knowledge.

      (Note - The suggested e-Learningprogram is a two-part series.)

      Bring Your Own Device

      Objective

      1. The management must understand the risks and liabilities of allowing users to bring in their own devices.

        The 10 minutes course is designed to provide an understanding of BYOD security challenges and how to secure a BYOD environment, followed by suggested eLearning courses to enhance your organization's security.
      • Course ID: FCOO106
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      1. What you will learn:
        The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

        What is Bring Your Own Device (BYOD)?
        What are the BYOD challenges?
        How can you secure your BYOD environment?
        Examples of BYOD device hack
        Suggested e-Learning courses to enhance the knowledge
        (Note - The suggested e-Learning program is a two-part series.)

      Free Course - Cybersecurity Training

      Objective

      1. Security is everyone's responsibility. The organization should plan and develop a compliance and cybersecurity training program.
        By making employees fully aware and responsible for their actions towards the scope of the threats and how high the cybercrime stakes are, cybersecurity and compliance courses are the best solutions for up-scaling and reskilling employees.
        The management must implement company-wide cybersecurity training on an ongoing basis to empower employees to learn by experience rather than by simply following a set of rules.
      • Course ID: FCOO107
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      1. What you will learn:
        The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

         - Cybersecurity Training Recommendations
         - Guidance for Users
         - Cybersecurity Threats Education
         - Case Studies

      Incident Response

      Objective

      1. Incident Management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore normal operations and services as quickly as possible after an unforeseen event.

        The FREE course is designed to educate the management and employees about the incident, incident response requirements, and the most important is timely action to protect assets. 
      • Course ID: FCOO108
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      1. What you will learn:
        The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

        Brief about Incident and Incident Management (IM)
        Incident Management Objectives and Protecting Information Assets
        What is a Security Incident Management?
        Incident Management Process Workflow
        Important Definitions
        Suggested e-Learning courses to enhance the knowledge
        (Note - The suggested e-Learning program is a three-part series.)

      Information System Protection

      Objective

      The University of Florida discovered an error in one of its systems that allowed outside access to the directory, which contained Social Security numbers for about 100 people.

      By making management and employees fully aware and responsible for their actions towards the scope of the threats and how high the cybercrime stakes are,  SecuRetain e-Learning courses are the best solutions for up-scaling the cyber knowledge of employees.

      As computing and networking resources such as servers, laptops, tablets, smartphones, networks, routers, switches have become an integral part of business, they have also become a target of cybercriminals. Organizations must be vigilant with the way they protect their resources. 
      • Course ID: FCOO109
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      1. What you will learn:
        The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

        Protect computer systems from malicious actors
        Learn about CIA Triad
        Achieving asset protection goals Confidentiality, Integrity, and Availability
        Lots of case studies
        Suggested e-Learning courses to enhance the knowledge

      Network Security

      Objective

      1. Network Security is any activity designed to protect the usability and integrity of an organization's network and data.

        The management needs to understand and approach cybersecurity as an enterprise-wide risk management issue, not just an IT issue. The management must appropriately prioritize cybersecurity and ensure cybersecurity policies and procedures are in place.

        The management should have adequate access to cybersecurity expertise and the ability to make informed decisions. 
      • Course ID: FCOO110
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      1. What you will learn:

        The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

        What is Network Security?
        How does Network Security Work?
        Types of Network Security
        Recommendations for Network Security
        Case Studies

      Personnel Screening and Insider Threat

      Objective

      1. Insider threats or threats coming from inside the organization are common and often involve employees accidentally, unknowingly, or maliciously mishandling, exposing, or losing sensitive data.
        Anyone with physical or remote access to the organization’s assets/network can cause cyber risk to the organization.

        This is the most critical area for small organizations. The informed management will need controls in place to control insider threat risk, including non-disclosure and robust employee agreement, acceptable use policies, onboarding and offboarding procedures, etc.

        The suggested e-Learning courses are designed to provide every employee with the basic knowledge about disasters, risks covered by DR, use cases, challenges, DR Plan, etc.
      • Course ID: FCOO111
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      1. What you will learn:

        The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

        What is Insider Threats Risk?
        Examples of Insider Threat Risk
        What are the Consequences of Risk?

      Physical and Environmental Security and Case Studies

      Objective

      1. Workplace safety and security are the responsibility of every employee. No workplace is immune to the threat of equipment theft, and loss of sensitive/private information, and intellectual property. Employees are often the target of these threats and the organization’s first line of defense against them.

        This 10 minutes course introduces management and employees on how they can contribute to an organization’s security. The effectiveness of the security program depends on communication and periodic training. The course includes suggested training courses that will further assist in reskilling and upskilling employees.
      • Course ID: FCOO112
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      1. The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

        • What is Physical and Environmental Security?
        • Physical Security
        • Securing Offices, Rooms, and Facilities
            - Badge Security
            - Visitors Security
            - Supervision
        • Workplace Security
        • Equipment Security
        •Case Studies
        Suggested e-Learning courses to reskill and upskill the cyber knowledge

      Remote Access

      Objective

      1. Attackers broke into Target’s Point of Sale (POS) systems via a remote access account belonging to an HVAC company.

        The management and employees need to know that securing remote access involves using a mix of security strategies and solutions and not necessarily one specific technology like a secure VPN.

        The suggested e-Learning courses will enhance the organization’s ability to implement a strategic plan and improve employee skills.
      • Course ID: FCOO113
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      1. What you will learn:
        The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

        What is remote access?
        Securing remote office locations
        Recommendations for secure remote access
        Reporting remote access issues
        Multiple case studies and hacks
        Suggested e-Learning courses to enhance the knowledge

      User Account Management and Access Control

      Objective

      1. Sixty-eight million Dropbox user accounts were compromised in 2016.  The attackers exploited an improperly secured employee password.

        The management or business owners should decide: Who should access your company’s data? How do you make sure that only authorized and authenticated users access the data?

        Cybersecurity starts with effective control over access to information systems. Access control is an important security issue for businesses of all sizes.
      • Course ID: FCOO116
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      1. What you will learn:
        The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

        Learning the access control basics
        Authenticate and authorize
        Recommendations for user account management and access control
        Suggested e-Learning courses to enhance the knowledge

      Wireless Network Security

      Objective

      1. For small businesses, wireless connectivity has many challenges. Lack of state-of-the-art security on devices often requires implementing controls like denying access to wireless. Another type of control involves the use of security protocols. There is a potential risk of using public Wi-Fi in places like coffee shops, malls, restaurants, etc.

        The management needs direction, and employees need to know that securing wireless access involves using a mix of security strategies and solutions and not necessarily one specific technology like a secure VPN.

        The suggested e-Learning courses will enhance the organization’s ability to implement a strategic plan and improve employee skills.
      • Course ID: FCOO114
      • Duration: 9 mins
      • CPE: 1 HR
      • Course Type: e-Learning
      • Price: $0
      Course Details

      What you will learn:

      1. What you will learn:
        The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

        Recommendations for Wireless Network Security
        Router Security Option to Choose
        Open Wi-Fi Network