Privacy Advanced - PAB313

No product information available

Objective

1. Awareness – Refer to Awareness Bundle 1

2. Awareness + – Refer to Awareness + Bundle 2

3. The protection of US residents’ personal data is regulated by laws enacted on both the national and the state levels. Federal laws include GLBA, HIPAA, FTC, DPPA, FCRA, COPPA, TCPA, etc. States have their own privacy laws, e.g., the California Consumer Privacy Act (CCPA), Protections for Consumer Data Privacy, Florida Regulation of Trade, Commerce, Investments, and Solicitations, Biometric Information Privacy Act, etc.

4. The GDPR applies to the process carried out by organizations operating within the EU. It also applies to organizations outside the EU that offer goods or services to individuals in the EU. The course content in Part II provides an understanding of the data subject rights, GDPR accountability and governance principles, and the data protection officer role. It explains the very important concepts of privacy by design, code of conduct principle, and data protection impact assessment. 

Price: No product information available
Add to Cart
For Corporate Request Demo →
  • Duration: No product information available
  • CPE: No product information available
  • Type: No product information available

What you will learn:

    No product information available

Related Courses

Access Control Awareness Part I - CS00201

  • Course ID:425959
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learning the access control basics
  • Understanding the access control challenges
  • Understanding authentication factors and multi factor authentication.
  • Developing access control policies and procedures
  • Learning about access control models
  • Learning about principles of access controls and types of access controls

Information Security Management System (ISMS) Part I - CO00304

  • Course ID:427251
  • CPE:1 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Understand what information and information security is
  • Understand how to secure information
  • Know about ISO 27000 compliance family
  • Learn about ISO 27001and ISO 27002 and benefits of compliance
  • Learn about ISO 27001standard and certification
  • Introduction to implementing ISMS and ISO 27001
  • Learn about ISMS mandatory processes and documentation
  • Introduction to ISO 27001 Annex A controls Checklist

Social Engineering & Phishing Awareness Part I - CS00103

  • Course ID:427252
  • CPE:1 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Social Engineering Attacks
  • Social engineering attack techniques
  • Steps in social engineering attack
  • Types of Social Engineering Attacks
  • Phishing attacks
  • Telltale signs of phishing attacks
  • Detection, Identification, and Tips to Keep You From Being Fooled
  • Spear Phishing
  • Detection telltale signs
  • Use cases and phihsing attack detection exercises

Social Engineering & Phishing Advanced Part II - CS00104

  • Course ID:427253
  • CPE:1 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Ten Different Types of Phishing Attacks
  • Understand the Characteristics of Phishing Emails
  • Understand Common Methods of Phishing Attacks
  • Learn about Escalation and Containment
  • Learn about Eradication and Rebuilding
  • Learn about Recovery and Aftermath

Information Security and Privacy Awareness - CS00101

  • Course ID:427310
  • CPE:1 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learn How to Protect Information
  • Understand the Key Security Terms
  • Learn about Insider Risk
  • Learn about Privately Identifiable Information and Privately Healthcare Information
  • Learn about Physical Security, Facility Security and Clean Desk Policies
  • Learn about Social Engineering and Phishing
  • Learn about Acceptable Personal Use of Corporate Property and Email
  • Learn about Malicious Software and Incident Reporting
  • Learn about User Id and Password Protection
  • Understand Your Responsibility as a User

Breach Notification Advanced Part II - CS00302

  • Course ID:429326
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • What is the importance of a breach notification?
  • What is a data breach?
  • In what circumstances would notification of a data breach be required and to
  • whom?
  • When and how should notification of a data breach be provided?
  • Framework for Effective Data Breach Notification Legislation
  • Timing of Notification to Affected Individuals
  • Post Data Breach Immediate Action Items
  • Breach Notification to Authorities

Breach Notification Awareness Part I - CS00301

  • Course ID:429327
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Breach Management
  • Effective Breach Response
  • Data Breach Checklist
  • Breach Notification Notice Content
  • Notification Timelines
  • Lifecycle of a Data Breach
  • Public Relations Strategy.

Access Control Awareness Part II - CS00202

  • Course ID:429328
  • CPE:1.30 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learning the Access Control Models and Concepts
  • Understanding the Types and Categories of Access Controls
  • Understanding the Testing of Access Controls
  • Learning about Access Control Attacks and Countermeasures
  • Learning about Multilevel Security Models
  • Learning about Authentication and Authentication Methods
  • Learning about common Authentication Protocols.

Cloud Security Awareness - CS00102

  • Course ID:429334
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Cloud Security
  • Cloud Basics - Cloud Concepts, Architecture and Design
  • Cloud Service Models
  • Cloud Risk Landscape
  • Cloud Security Domains
  • Cloud Data Security
  • Cloud and AWS
  • Cloud and Azure
  • Cloud Application Security Basics

Cybersecurity Maturity Model Certification (CMMC) Awareness Part I - CS00801

  • Course ID:429335
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

• Understand the need for Cybersecurity Maturity Model Certification
• Why the third-party contractors are the weakest cyber link?
• Interpret the NIST SP 800-171 Controls
• Understand Federal Acquisition Regulation (FAR) Clause 52.204.21 for protecting
• Federal Contract Information (FCI)
• Understand Defense Federal Acquisition Regulation Supplement (DFARS) Clause
• 252.204-7012 for protecting Controlled Unclassified Information (CUI)
• Understand NIST SP 800-171 Protecting Controlled Unclassified Information in Non-Federal Systems and Organizations
• Learn about the essential differences between CMMC vs. NIST 800-171
• Learn how CMMC Model Works: Domains, Capabilities, Practices, and Processes

Cybersecurity Maturity Model Certification (CMMC) Awareness Part II - CS00802

  • Course ID:429336
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

• Learn how CMMC Model Works: Domains, Capabilities, Practices, and Processes
• Understand the CMMC five Process Maturity levels and five Technical Practices levels
• Understand Federal Acquisition Regulation (FAR) Clause 52.204.21 for protecting Federal Contract Information (FCI)
• Learn about the control compliance and certification requirements for level 1 to level 5
• Learn about the CMMC capabilities
• Understand the 14 points of NIST 800-171 and create security protocols for 14 key areas.
• Learn about the CMMC Levels 2 and 3 Practices Beyond NIST 800-171
• Learn about the implementation challenges
• Learn about becoming a CMMC Certified Supplier
• Understand the CMMC Scoring methodology
• Knowledge Check

Cybersecurity Maturity Model Certification (CMMC) Awareness Part III - CS00803

  • Course ID:429337
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

• Learn how CMMC Model Works: Domains, Capabilities, Practices, and Processes
• Learn how to Prepare CMMC for Assessment
• Understand the 20 non-NIST 800-171 Controls to complied at level 3
• Understand CMMC Level 4 requirements
• Understand CMMC Level 5 requirements
• Learn about the CMMC Certification process
• Knowledge Check Knowledge Check

Cybersecurity Maturity Model Certification (CMMC) Controls Part IV - CS00804

  • Course ID:429338
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

• Learn how CMMC Model Works: Domains, Capabilities, Practices, and Processes
• Understand the CMMC five Process Maturity levels and five Technical Practices levels
• Understand Federal Acquisition Regulation (FAR) Clause 52.204.21 for protecting Federal Contract Information (FCI)
• Learn about the control compliance and certification requirements for level 1 to level 5
• Learn about the CMMC capabilities
• Understand the 14 points of NIST 800-171 and create security protocols for 14 key areas.
• Learn about the CMMC Levels 5 and 6 Practices Beyond NIST 800-171
• Learn about the implementation challenges
• Learn about becoming a CMMC Certified Supplier
• Understand the CMMC Scoring methodology
• Knowledge Check

Cybersecurity Maturity Model Certification (CMMC) Controls Part V - CS00805

  • Course ID:429339
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

By the end of this course, students will be able to:
• Understand the CMMC Model and controls
• Interpret the NIST SP 800-171 Controls and apply the control guidance in gap analysis, remediation, and implementation controls
• CMMC Model
• NIST SP 800-171 Controls
• Understand the specific domains:
• Audit & Accounting
• Configuration Management
• Identification and Authentication
• Incident Response
• Maintenance
• Media Protection

Cybersecurity Maturity Model Certification (CMMC) Controls Part VI - CS00806

  • Course ID:429340
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

By the end of this course, students will be able to:
• Understand the CMMC Model and controls
• Interpret the NIST SP 800-171 Controls and apply the control guidance in gap analysis, remediating and implementing controls
• Understand the specific domains:
• Personnel Security - Personnel Security requires organizations to screen individuals before authorizing access to systems containing CUI.
• Physical Protection - Limit physical access to organizational information systems.
• Risk Management - Assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals.
• Security Assessment - Evaluate the security posture of the organization, based on the ability to manage its cyber risk profile, identify its inherent risks, and assess the effectiveness of its controls environment.
• System & Communications Protection - Monitor, control and protect organizational communications
• System & Information Integrity - Adopt a broad range of security practices to protect information integrity.

Data Privacy And Privacy Regulations Part I - CS00106

  • Course ID:429341
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

  • Learn about Privacy Imperative
  • Understand Strategic and Tactical Drivers
  • Learn about Privacy Strategy and Privacy Impact
  • Understand the Private Identifiable Information (PII) and Private Health Information
  • (PHI) data
  • Learn about Privacy Impact Assessments
  • Learn about HIPAA and HITECH
  • Learn about GDPR and CCPA
  • Understand the Breach Notification Requirements 

Data Privacy And Privacy Regulations Part II - CS00107

  • Course ID:429342
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Privacy Imperative
  • Understand Strategic and Tactical Drivers
  • Learn about Privacy Strategy and Privacy Impact
  • Understand the Private Identifiable Information (PII) and Private Health Information
  • (PHI) data
  • Learn about Privacy Impact Assessments
  • Learn about HIPAA and HITECH
  • Learn about GDPR and CCPA
  • Understand the Breach Notification Requirements

Facility Workplace Awareness Part I - CS00109

  • Course ID:429343
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Identify potential risk while working remotely
  • Corporate data and information systems security
  • Physical access control
  • Email Security and practical examples

Facility Workplace Awareness Part II - CS00110

  • Course ID:429344
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Identify potential risk while working remotely
  • Corporate data and information systems security
  • Physical access control
  • Email Security and practical examples

Health Insurance Portability And Accountability Act (HIPAA) Awareness - CO00102

  • Course ID:429364
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learn about HIPAA and HITECH
  • The Security Rule, The Privacy Rule, The Breach Notification Rule, Omnibus
  • Chapter 181, Texas Medical Records Privacy Act
  • Understand How Health Care Privacy Laws affect your organization
  • Understand HIPAA IT Security Risk Assessment
  • Learn about Administrative, Technical and Physical Safeguards
  • Learn about Covered Entities
  • Learn about Use and Disclosure of PHI
  • Understand How HIPAA and HITECH are Related
  • Learn about HITECH and Breach Notification

Incident Management Advanced Part II - CS00402

  • Course ID:429369
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Incident and Incident Management (IM)
  • Understand Critical Success Factors (CSF)
  • Understand Key Performance Indicators (KPI) Specific to Incident Management
  • Understand Other Process Interfacing with Incident Management
  • Learn about ITIL Framework Based Incident Management Process Workflow
  • Implementing Incident Management - Detailed Guidance

Incident Management Awareness Part I - CS00401

  • Course ID:429370
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Brief about Incident and Incident Management (IM)
  • Incident Management Objectives
  • What is a Security Incident Management?
  • Incident, Problem, and Service Request
  • Incident Management Key Concepts
  • Incident Management Process and ITIL
  • Incident Management Process Workflow Examples
  • Incident Management Process
  • Incident Management Process Steps Discussed in Detail

Incident Management Cyber Security Response Team (CSIRT) Part III - CS00403

  • Course ID:429371
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Incident Management VS Problem Management
  • Cybersecurity Incident Response or Major Incident Response
  • Cybersecurity Incident Response Team (CSIRT)
    • CSIRT Basics
    • CSIRT stages
  • CSIRT Roles and Responsibilities
  • Your Role in CSIRT
    • CSIRT Response Flow - Level 1 incident
    • CSIRT Response Flow - Level 2 and 3 incidents
  • Use Cases - Scenarios

Information Technology General Controls (ITGC) Awareness Part I - CS00701

  • Course ID:429372
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learn How to Protect Information
  • Understand the Key Security Terms
  • Learn about Insider Risk
  • Learn about Privately Identifiable Information and Privately Healthcare Information
  • Learn about Physical Security, Facility Security and Clean Desk Policies
  • Learn about Social Engineering and Phishing
  • Learn about Acceptable Personal Use of Corporate Property and Email
  • Learn about Malicious Software and Incident Reporting
  • Learn about User Id and Password Protection
  • Understand Your Responsibility as a User

Information Technology General Controls (ITGC) Part III - CS00703

  • Course ID:429373
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Understand IT Governance considerations in SOX compliance
  • Understand Activity/Process Level Considerations in General Control Issues
  • Learn about evaluating security administration controls
  • Understand the SOX requirement for:
  • Application change controls
  • Data Backup and Recovery
  • Systems Development Life Cycle (SDLC)
  • Outsourcing Financial Applications
  • Learn about the Role of Application and Data-Owner Processes
  • Understand the application-level control considerations
  • Understand the process level control considerations

Information Technology General Controls (ITGC) COSO Framework Part II - CS00702

  • Course ID:429374
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Understand IT Governance considerations in SOX compliance
  • Understand Activity/Process Level Considerations in General Control Issues
  • Learn about evaluating security administration controls
  • Understand the SOX requirement for:
  • Application change controls
  • Data Backup and Recovery
  • Systems Development Life Cycle (SDLC)
  • Outsourcing Financial Applications
  • Learn about the Role of Application and Data-Owner Processes
  • Understand the application-level control considerations
  • Understand the process level control considerations

Malware Ransomware Awareness - CS00105

  • Course ID:429377
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • How do you get malware?
  • What malware is and why it is dangerous
  • Become familiar with different types of malware and how users can identify them
  • How can you tell if you have a malware infection?
  • Understand how most malware requires human action to infect a computer
  • How to protect against malware?
  • How people can avoid malware and what to do (and not to do) if this ever happens

National Institute Of Standard And Technology (NIST) Cyber Security Framework (CSF) Fundamentals Part I - CS00501

  • Course ID:429378
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learn about CSF fundamentals
  • Learn how to establish or improve your cybersecurity program
  • Understand the NIST CSF concept and how to implement with the help of case study
  • Understand the practical application of CSF framework’s core, design, functions,
  • categories, and subcategories
  • Detailed knowledge of functions, categories, and subcategories along with
  • informative references from COBIT, ISA, NIST SP 800-53, CIS CSC, ISO 27001, etc.

National Institute Of Standard And Technology (NIST) Cyber Security Framework (CSF) Fundamentals Part II - CS00502

  • Course ID:429379
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

  • Learn about CSF fundamentals
  • Learn how to establish or improve your cybersecurity program
  • Understand the NIST CSF concept and how to implement with the help of case study
  • Understand the practical application of CSF framework’s core, design, functions,
  • categories, and subcategories
  • Detailed knowledge of functions, categories, and subcategories along with
  • informative references from COBIT, ISA, NIST SP 800-53, CIS CSC, ISO 27001, etc.

Payment Card Industry Awareness - CO00201

  • Course ID:429380
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Need for PCI DSS training
  • PCI data security
  • Relationship between PCI DSS and PA DSS
  • PCI DSS scope
  • PCI DSS requirement explained with examples
  • Control costs and gain tangible, real-world insights on best practices
  • Understand PCI compliance before going through an assessment
  • Apply PCI DSS security principles across business

Privileged Access Management (PAM) Part I - CS00203

  • Course ID:429381
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

• Privileged Access Management Overview
• Learn about privileges and how are they created, granted, etc.
• Learn about privileged accounts
• Understand the types of privileged accounts
• Study the privileged service accounts
• Learn about privilege related risks and challenges
• Learn about privileged threat vectors – external and internal
• Understand the benefits of privileged access management
• Learn how hackers compromise the privileged accounts.
• Study the privilege access management best practices

Privileged Access Management (PAM) Part II - CS00204

  • Course ID:429382
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

• Learn about privileges and how are they created, granted, etc.
• Learn about the capabilities of PAM software
• Study the PAM security controls
• Learn about the PAM solution partner considerations
• Study about the PAM baseline and ongoing Improvements
• Study the considerations for selection of PAM
• Learn how to protect privileged accounts

Privileged Access Management (PAM) Part III - CS00205

  • Course ID:429383
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

• Study the FCPA recent cases and takeaways
• Learn about the effective FCPA compliance program
• Study the FCPA program best practices Third Parties Review Transactions Gifts, Meals, Travel and Entertainment
Training Due Diligence Reporting Risk Areas
• Learn about the FCPA enforcement actions and monitory resolutions

Problem Management Advanced Part II - CS00602

  • Course ID:429384
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Understand basic concepts of problem management
  • Learn about the roles and responsibilities associated with the problem
  • management process
  • Understand the input that triggers the problem management process
  • Planning for problem management process implementation and training
  • Understand the problem management process implementation guide (step by step
  • approach)
  • Understand process inputs and outputs
  • Learn about problem management reporting
  • Understand the problem management checklist
  • Understand the activities and documentation

Problem Management Awareness Part I - CS00601

  • Course ID:429385
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Understand basic concepts of problem management
  • Learn about the roles and responsibilities associated with the problem
  • management process
  • Understand the input that triggers the problem management process
  • Planning for problem management process implementation and training
  • Understand the problem management process implementation guide (step by step
  • approach)
  • Understand process inputs and outputs
  • Learn about problem management reporting
  • Understand the problem management checklist
  • Understand the activities and documentation

Risk Assessment Awareness Part I - RM00103

  • Course ID:429386
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Risk Identification – Learn to identify risk
  • Risk Assessment - How to assess risk?
  • Risk Analysis – How to analyze risk?
  • Controls – Learn to develop controls
  • Risk Treatment – How to treat risk?
  • Risk Management Elements – What are the risk management elements?
  • Risk Monitoring – How to monitor risk?
  • Risk Management Approach – Learn the process?
  • Issue Management Remediation

Security Framework Awareness - CS00108

  • Course ID:429389
  • CPE:1 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

  • Understand What is a Framework
  • Understand What is an Information Security Framework
  • Learn about Types of Security Frameworks
  • Learn about Compliance Regulations and Frameworks
  • Understand Factors Driving Security Frameworks
  • Learn about Various Security Frameworks - ISO, COBIT, NIST, ITIL, COSO, NERC, TY, CYBER, HITRUST, CSF
  • Understand the Business Benefits of Security Frameworks?

Vendor Risk Management Awareness Part I - RM00101

  • Course ID:429392
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • What is vendor/third-party risk management (TPRM)?
  • What are third parties?
  • What are the common concerns of TPRM?
  • Why perform a third-party risk assessment?
  • What are the factors driving third-party risk assessment?
  • Why do I need a Third-party Risk Management Framework?
  • Why do I need a TPRM framework?

Vendor Risk Management Framework Development Part II - RM00102

  • Course ID:429393
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Why do Organizations need a TPRM framework?
  • What are the third-party risk categories and common third-party risks?
  • What are the Best Practices for a TPRM Framework?
  • What are the TPRM Framework Considerations?
  • How to build a TPRM framework?
  • How to implement a TPRM framework?

Cybersecurity Best Practices For Startups And Small Businesses Part I - CS00901

  • Course ID:429394
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

Part I of the series “Cybersecurity Best Practices for Startups and Small Business” you will:
• Know the factors driving cybersecurity and compliance for startups and small businesses
• Study the weaknesses leading to cyberattacks
• Know what cybersecurity and compliance means to your organization
• Understand the concept of capability maturity and scale yours over a period
• Learn what cybersecurity controls mean
• Study Information Security Management System (ISMS), ISMS governance, and risk management
• Understand the cybersecurity best practices for Startups and Small Businesses and Case Studies

Cybersecurity Best Practices For Startups And Small Businesses Part II - CS00902

  • Course ID:429395
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

In Part II of the series, you will:
• Understand how insider threat knowledge is an essential component of a comprehensive security program
• Know the insider threat risk and impact and learn how to mitigate those risks
• Study the concept of physical security and how it relates to information security
• Learn how to secure offices, rooms, workplaces, and office equipment
• Understand the importance of cybersecurity training
• Know the sources of security threats and vulnerabilities and many more

Cybersecurity Best Practices For Startups And Small Businesses Part III - CS00903

  • Course ID:429396
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

In Part III of the series, you will:
• Learn about the essential considerations when computers leave the corporate security perimeter and people work remotely
• Learn that new risks arise for the company due to remote work
• Learn about the security risks are associated with Bring Your Own Devices (BYOD)
• Learn how to secure the BYOD environment
• Learn about the IT Asset Managment and Backup and Recovery industry best practices Each topic contains case studies. The case studies explain how the suggested security considerations will help protect from cyberattacks.

Cybersecurity Best Practices For Startups And Small Businesses Part IV - CS00904

  • Course ID:429397
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

Part IV will assist executives to:
• Understand the relevant contextual factors
• Decide the type of insurance policy
• Understand factors driving third-party risk management
• Understand disaster recovery plans, factors driving Disaster Recovery (DR), and DR programs implementation steps
• Learn about Advanced Persistent Threat (APT)

Code Of Conduct Part I - CC00101

  • Course ID:429398
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

• Learn about the ethical principles, employees and executives should follow to reinforce professional behavior in the workplace
• Study the best practices for code of conduct
• Understand the difference between Code of Conduct vs. Code of Ethics
• Learn to create a positive working environment of equal opportunity and no retaliation
• Understand how corporations can enforce ethical behavior by using penalties for breaches of the Code of Conduct
• Learn to recognize the actions that may harm the company, such as sharing confidential company, client, and customer information
• Learn about the corporate best practices and employee responsibilities

Code Of Conduct Part II - CC00102

  • Course ID:429399
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

• Learn to recognize conflict of interest and handle the conflicts
• Learn how bribes, kickbacks, payments, gifts/entertainment, and money laundering harm employers
• Learn the Foreign Corrupt Practices Act (FCPA) Accounting and Anti Bribery provisions
• Understand the ethical and legal issues involving the use of company assets by employees
• Learn about the facility and physical security perimeter and how badge and visitor’s security works
• Study the best practices for acceptable use of company information resources and social media

.

Shadow IT Part I User Developed Applications - CS01105

  • Course ID:429401
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

• After the end of this course, you will:
• Understand what Shadow IT is
• Factors driving Shadow IT
• Risks associated with Shadow IT and how to manage the risk?
• Manage the Shadow IT threats
• Establish policies around Shadow IT and the CIO office
• Understand how organizations will benefit from Shadow IT

System & Organization Controls (SOC) Part I - CO005011

  • Course ID:429402
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learn about the System and Organization Controls (SOC) - SOC 1, SOC 2 and SOC3
  • Understand the businesses that should think about SOC 2
  • Learn about the driving factors for SOC compliance
  • Learn how SOC 2 is different from SOC 1 and other compliance frameworks
  • Understand the difference between a Type I and Type II audit
  • Learn to decide the type of SOC report the organizations needs to have
  • Learn about the factors driving the audit scope
  • Understand the foundation of SOC 1®, SOC 2®, and SOC 3® Reports
  • Learn about the SOC 2® and SOC 3® Trust Services Principles

System & Organization Controls (SOC) Part II - CO005012

  • Course ID:429403
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • SOC evolution
  • Learn about SOC 2 audit and who can perform the audit
  • Learn how to apply relevant SSAE 18 AICPA Standards
  • SOC 1, SOC 2, SOC 3, SOC 2 +, SOC for Cyber Security and SOC for Supply Chain Reports
  • Understand scope and use
  • Learn about the purpose and relevant standards
  • Learn about the subject matter and components of the report
  • Understand the use case for SOC for Cyber Security and SOC for Supply Chain
  • Learn about SOC 2 + Additional Subject Matter Reports
  • Learn the about TSC Mapping to Standards and Frameworks

System & Organization Controls (SOC) Part III - CO005013

  • Course ID:429404
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • SOC evolution
  • Learn about SOC 2 audit and who can perform the audit
  • Learn how to apply relevant SSAE 18 AICPA Standards
  • SOC 1, SOC 2, SOC 3, SOC 2 +, SOC for Cyber Security and SOC for Supply Chain Reports
  • Understand scope and use
  • Learn about the purpose and relevant standards
  • Learn about the subject matter and components of the report
  • Understand the use case for SOC for Cyber Security and SOC for Supply Chain
  • Learn about SOC 2 + Additional Subject Matter Reports
  • Learn the about TSC Mapping to Standards and Frameworks

System & Organization Controls (SOC) Part IV - CO005014

  • Course ID:429405
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Learn about the System and Organization Controls (SOC) - SOC 1, SOC 2 and SOC3
  • Understand the businesses that should think about SOC 2
  • Learn about the driving factors for SOC compliance
  • Learn how SOC 2 is different from SOC 1 and other compliance frameworks
  • Understand the difference between a Type I and Type II audit
  • Learn to decide the type of SOC report the organizations needs to have
  • Learn about the factors driving the audit scope
  • Understand the foundation of SOC 1®, SOC 2®, and SOC 3® Reports
  • Learn about the SOC 2® and SOC 3® Trust Services Principles

System & Organization Controls (SOC) Part V - CO005015

  • Course ID:429406
  • CPE:1.00 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • SOC evolution
  • Learn about SOC 2 audit and who can perform the audit
  • Learn how to apply relevant SSAE 18 AICPA Standards
  • SOC 1, SOC 2, SOC 3, SOC 2 +, SOC for Cyber Security and SOC for Supply Chain Reports
  • Understand scope and use
  • Learn about the purpose and relevant standards
  • Learn about the subject matter and components of the report
  • Understand the use case for SOC for Cyber Security and SOC for Supply Chain
  • Learn about SOC 2 + Additional Subject Matter Reports
  • Learn the about TSC Mapping to Standards and Frameworks

System & Organization Controls (SOC) Part VI - CO005016

  • Course ID:429407
  • CPE:1.30 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • SOC evolution
  • Learn about SOC 2 audit and who can perform the audit
  • Learn how to apply relevant SSAE 18 AICPA Standards
  • SOC 1, SOC 2, SOC 3, SOC 2 +, SOC for Cyber Security and SOC for Supply Chain Reports
  • Understand scope and use
  • Learn about the purpose and relevant standards
  • Learn about the subject matter and components of the report
  • Understand the use case for SOC for Cyber Security and SOC for Supply Chain
  • Learn about SOC 2 + Additional Subject Matter Reports
  • Learn the about TSC Mapping to Standards and Frameworks

System & Organization Controls (SOC) Part VII - CO005017

  • Course ID:429408
  • CPE:1.30 HR
  • Course Type:e-Learning
Book the course Course Objective

What you will learn:

  • Understand SOC evolution
  • Practical implementation knowledge of:
  • Common Criteria
  • Supplemental Criteria
  • Learn about Generally Accepted Privacy Principles (GAPP)
  • Understand what’s included in SOC report
  • Understand what’s included in Management Assertions and Description of the System
  • Understand the AICPA new guidelines - Description Criteria 200 (DC 200)

Prevention, Detection, and Recovery from Cyberattacks Part I - CS01101

  • Course ID:429410
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

• The myths and reality of cyberattacks
• The different types of cyberattacks
• What it means for business?
• The information technology, information security, and business management weaknesses • Organization and governance process to manage cyberattacks
• Computer Emergency Response Team (CERT)
• Crisis Management Team (CMT)

Prevention, Detection, and Recovery from Cyberattacks Part II - CS01102

  • Course ID:429411
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

• Understand Cyberattack Examples
• Study Cyberattack Techniques and Vulnerabilities
• Study the Process of Building a CSIRT
• Understand the Models for Institutionalizing Incident Management Capability
• Understand the CSIRT Constituency
• Learn about the Supporting Policies, Procedures, and Guidance
• Learn about CSIRT Formation Process, Stages, and Categories
• Study the CSIRT Workflow Examples, CSIRT Response Flow - Level 1 Incident, and CSIRT Response Flow - Level 2 and 3 Incident

Prevention, Detection, and Recovery from Cyberattacks Part III - CS01103

  • Course ID:429412
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

• Organizations need to know exactly what to look for regarding the network’s security and stability. The course content is divided into five parts that train you on how to fight off sophisticated cyberattacks.
• Cyberattack Prevention Basics
• System Weaknesses that can Cause Cyberattacks
• Methods of Cyberattacks
• Different Causes that can Lead to Cyberattacks
• Architectural Solutions, Next-Gen Techniques, and Zero Trust Principle to Prevent Attacks
• Cyberattacks Detection

Prevention, Detection, and Recovery from Cyberattacks Part IV - CS01104

  • Course ID:429413
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

• The organizations need to know what to look for regarding the network's security and stability.The course content divided into five parts will train you on how to fight off sophisticated cyber attacks.
• Study about the cyberattacks detection
• Learn to identify effective techniques and tools for dealing with the threats
• Learn about human factors, training, etc.
• Learn to identify and recognize an attack is underway
• Study about different detection methods – signature recognition, anomaly detection, and heuristic detection
• Learn about managing an unusual volume of alerts, response time, etc.
• Distinguish between the various tools and their properties
• Know what to look for when it comes to the security and stability of the network
• Learn about advanced and next-gen tools and techniques for securing a network
• Learn about cybersecurity tools selection considerations

Incident, Problem & Breach Mgt Awareness - IPBM111

  • Course ID:435319
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Incident, Problem & Breach Mgt Awareness+ - IPBM112

  • Course ID:435385
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Incident, Problem & Breach Mgt Advanced - IPBM113

  • Course ID:435486
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Incident, Problem & Breach Mgt Professional - IPBM114

  • Course ID:435606
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Privacy Awareness - PAB311

  • Course ID:435706
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Privacy Awareness+ - PAB312

  • Course ID:435808
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Privacy Advanced - PAB313

  • Course ID:435867
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Privacy Professional - PAB314

  • Course ID:435971
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Cybersecurity Maturity Model Certification Awareness - CMMC411

  • Course ID:436084
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Cybersecurity Maturity Model Certification Awareness+ - CMMC412

  • Course ID:436187
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Cybersecurity Maturity Model Certification Advanced - CMMC413

  • Course ID:436250
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Cybersecurity Maturity Model Certification Professional - CMMC414

  • Course ID:436355
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

FedRAMP NIST FFIEC Awareness - FNFB511

  • Course ID:436562
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

FedRAMP NIST FFIEC Awareness+ - FNFB512

  • Course ID:436564
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

FedRAMP NIST FFIEC Advanced - FNFB513

  • Course ID:436672
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

FedRAMP NIST FFIEC Professional - FNFB514

  • Course ID:436740
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Healthcare Awareness - HAB711

  • Course ID:436944
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Healthcare Awareness+ - HAB712

  • Course ID:437054
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Healthcare Advanced - HAB713

  • Course ID:437165
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Healthcare Professional - HAB714

  • Course ID:437277
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

System & Organization Controls Awareness - SOCB811

  • Course ID:437390
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

System & Organization Controls Awareness+ - SOCB812

  • Course ID:437503
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

System & Organization Controls Advanced - SOCB813

  • Course ID:437617
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

System & Organization Controls Professional - SOCB814

  • Course ID:437732
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Access Control PAM Awareness Bundle - ACPAM911

  • Course ID:437848
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Access Control PAM Awareness+ - ACPAM912

  • Course ID:437965
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Access Control PAM Advanced - ACPAM913

  • Course ID:438083
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Access Control PAM Professional - ACPAM914

  • Course ID:438202
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Onboarding 1 Awareness - OB1011

  • Course ID:438322
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Onboarding 1 Awareness+ - OB1012

  • Course ID:438441
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Onboarding 1 Advanced - OB1013

  • Course ID:438561
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Onboarding 1 Professional - OB1014

  • Course ID:438642
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Onboarding 2 Awareness - OB2011

  • Course ID:438764
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Onboarding 2 Awareness+ - OB2012

  • Course ID:438847
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Onboarding 2 Advanced - OB2013

  • Course ID:438971
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Onboarding 2 Professional - OB2014

  • Course ID:439096
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

ITGC Process Controls Security FR Awareness - IPCS3011

  • Course ID:439222
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

ITGC Process Controls Security FR Awareness+ - IPCS3012

  • Course ID:439349
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

ITGC Process Controls Security FR Advanced - IPCS3013

  • Course ID:439477
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

ITGC Process Controls Security FR Professional - IPCS3014

  • Course ID:439610
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

ISMS_ISO_SOX Awareness - IISB4011

  • Course ID:439630
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

ISMS_ISO_SOX Awareness+ - IISB4012

  • Course ID:439761
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

ISMS_ISO_SOX Advanced - IISB4013

  • Course ID:439893
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

ISMS_ISO_SOX Professional - IISB4014

  • Course ID:440026
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Vulnerability Mgt Recovery TPRM Awareness - VMPD5011

  • Course ID:440160
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Vulnerability Mgt Recovery TPRM Awareness+ - VMPD5012

  • Course ID:440295
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Vulnerability Mgt Recovery TPRM Advanced - VMPD5013

  • Course ID:440431
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Vulnerability Mgt Recovery TPRM Professional - VMPD5014

  • Course ID:440568
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Cybersecurity Best Practices for Startups and Small Businesses Awareness - CBPS6011

  • Course ID:440706
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Cybersecurity Best Practices for Startups and Small Businesses Awareness+ - CBPS6012

  • Course ID:440845
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Cybersecurity Best Practices for Startups and Small Businesses Advanced - CBPS6013

  • Course ID:440985
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Cybersecurity Best Practices for Startups and Small Businesses Professional - CBPS6014

  • Course ID:441126
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Project Management Awareness - PM7011

  • Course ID:441271
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Project Management Awareness+ - PM7012

  • Course ID:441409
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Project Management Advanced - PM7013

  • Course ID:441411
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Project Management Professional - PM7014

  • Course ID:441413
  • CPE:
  • Course Type:
Book the course Course Objective

What you will learn:

Need us to design a course for you? Contact Now
Copyrights © 2020 All Rights Reserved by SecuRetain.