Cybersecurity

It’s not knowing that’s the worst. All your cybersecurity training needs under one roof. e-Learning Course Demos

Cybersecurity the SecuRetain Way

Security is everyone’s responsibility. Every large organization with robust cybersecurity awareness training programs has to deal with sophisticated hacking. Now it’s time for more than awareness training. Explore roles and responsibility based multi-domain cybersecurity training. Learn to implement Incident Management, Problem Management, Breach Management, NIST CSF, ISO 27001, and more.
cloud security training

Implement company wide cybersecurity training on an ongoing basis to empower employees to learn by doing rather than by simply following a set of rules

cyber security course online free

The SecuRetain courses deliver the current and future workforce with the knowledge and skills to defend against cybercrime

cyber security certifications online

Reskill and upskill in cybersecurity, and track progress and course completion for yourself or an entire enterprise with SecuRetain Platform

cyber security awareness training

Customize any cybersecurity courses that reflect your organization’s policies, procedures, and cyber domains

cloud security certification

Use the SecuRetain platform to distribute your training content along with SecuRetain courses in your own private space

Corporations can save more than 15% by developing in-house skills. The series of courses aim to enhance end to end knowledge.

Preview e-Learning Courses

Comprehensive Cybersecurity Based e-Learning Courses

Beneficial for all organizations, irrespective of their size, industry, and geography. SecuRetain will help employees grow personally and professionally.

Learning Outcomes from SecuRetain’s Cybersecurity e-Learning Courses

Driving your organization’s success in cybersecurity through an immersive, compelling, and expert e-learning experience. Transform your cybersecurity talent pool with e-learning courses: Access Control, Cloud Security Training, Data Privacy, Security Framework, Malware Ransomware, Incident Management, Problem Management, Breach Management, IT General Controls, NIST, PCI, SOC, Data Privacy, etc. Learn to implement incident management, breach management, problem management processes using our multi-part series of courses.
  • Access control challenges, policies, procedures, models, types, categories, attacks, multi-level security models, and authentication
  • Application security, security domains, service models, AWS, AZURE, and cloud security training
  • Data privacy, privacy imperative, strategic and tactical drivers, PII, PHI, HIPAA, HITECH, CCPA, GDPR, and GLBA
  • Workplace facility, remote working security, physical security, badge, visitors, and devices security
  • Incident Management (IM), problem or service request, management key concepts, designing IM workflows, IM process, ITIL framework, CSIRT creation, roles and responsibilities, and more
  • Problem Management, incident vs. problems, quick fix vs. permanent solutions, basic concepts, implementing process. key concepts
  • Breach Management, effective breach response, notification, regulatory requirements, framework for effective data breach management
  • Fraud and Audit Management Series
  • Information security and privacy awareness, physical security, facility security, clean desk policies, acceptable use, etc.
  • Information Technology General Controls (ITGC), COSO, SOX, governance, auditing security administration, maintenance, operations, controls, SOX requirement for change controls, and DR
  • NIST Cybersecurity Framework Fundamentals, in-depth knowledge on implementing functions, categories and subcategories, use of risk management principles, and practical application of framework’s core
  • Payment Card Industry Awareness
  • System & Organization Controls (SOC)
  • Malware Ransomware Security Frameworks, types of malware, identify infection, and protection
  • Social engineering and phishing, attack techniques, steps in social engineering attack, types of attacks, phishing attacks, telltale signs of phishing attacks, detection, identification, tips to keep you from being fooled, spear phishing, and detection telltale signs

SecuRetain’s Cybersecurity e-Learning Courses

Browse all Cybersecurity category courses available for you on our SecuRetain platform
To search all courses on our SecuRetain platform. Click here!

Access Control Awareness Part I

  • Course ID: CS00201
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learning the access control basics
  • Understanding the access control challenges
  • Understanding authentication factors and multi-factor authentication.
  • Developing access control policies and procedures
  • Learning about access control models
  • Learning about principles of access controls and types of access controls

Access Control Awareness Part II

  • Course ID: CS00202
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learning the Access Control Models and Concepts
  • Understanding the Types and Categories of Access Controls
  • Understanding the Testing of Access Controls
  • Learning about Access Control Attacks and Countermeasures
  • Learning about Multilevel Security Models
  • Learning about Authentication and Authentication Methods
  • Learning about common Authentication Protocols.

Breach Notification Part I - Awareness

  • Course ID: CS00301
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What is the importance of a breach notification?
  • What is a data breach?
  • In what circumstances would notification of a data breach be required and to whom?
  • When and how should notification of a data breach be provided?
  • Framework for Effective Data Breach Notification Legislation
  • Timing of Notification to Affected Individuals
  • Post Data Breach Immediate Action Items
  • Breach Notification to Authorities

Breach Notification Part II - Advanced

  • Course ID: CS00302
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Breach Management
  • Effective Breach Response
  • Data Breach Checklist
  • Breach Notification Notice Content
  • Notification Timelines
  • Lifecycle of a Data Breach
  • Public Relations Strategy

Cloud Security Awareness

  • Course ID: CS00102
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Cloud Security
  • Cloud Basics - Cloud Concepts, Architecture and Design
  • Cloud Service Models
  • Cloud Risk Landscape
  • Cloud Security Domains
  • Cloud Data Security
  • Cloud and AWS
  • Cloud and Azure
  • Cloud Application Security Basics

Data Privacy and Privacy Regulations (GDPR / CCPA) Part I

  • Course ID: CS00106
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Privacy Imperative
  • Understand Strategic and Tactical Drivers
  • Learn about Privacy Strategy and Privacy Impact
  • Understand the Private Identifiable Information (PII) and Private Health Information
  • (PHI) data
  • Learn about Privacy Impact Assessments
  • Learn about HIPAA and HITECH
  • Learn about GDPR and CCPA
  • Understand the Breach Notification Requirements

Data Privacy and Privacy Regulations (GDPR / CCPA) Part II

  • Course ID: CS00107
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Privacy Imperative
  • Understand Strategic and Tactical Drivers
  • Learn about Privacy Strategy and Privacy Impact
  • Understand the Private Identifiable Information (PII) and Private Health Information
  • (PHI) data
  • Learn about Privacy Impact Assessments
  • Learn about HIPAA and HITECH
  • Learn about GDPR and CCPA
  • Understand the Breach Notification Requirements

Facility Workplace Awareness Part I

  • Course ID: CS00109
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

Identify potential risks to workplace security
Measures for improving workplace security
Actions to take in response to a security situation
Facility and Physical Security Perimeter
Badge and Visitors Security
Do’s and Don’ts
Securing Devices and Data in Public
Public Networks and Security
Device Security
1.Laptop
2.Mobile Device Security
Clear Desk



Facility Workplace Awareness Part II

  • Course ID: CS00110
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Identify potential risk while working remotely
  • Corporate data and information systems security
  • Physical access control
  • Email Security and practical examples

Incident Management Part I - Awareness

  • Course ID: CS00401
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Brief about Incident and Incident Management (IM)
  • Incident Management Objectives
  • What is a Security Incident Management?
  • Incident, Problem, and Service Request
  • Incident Management Key Concepts
  • Incident Management Process and ITIL
  • Incident Management Process Workflow Examples
  • Incident Management Process
  • Incident Management Process Steps Discussed in Detail

Incident Management Part II - Advanced

  • Course ID: CS00402
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Incident and Incident Management (IM)
  • Understand Critical Success Factors (CSF) 
  • Understand Key Performance Indicators (KPI) Specific to Incident Management
  • Understand Other Process Interfacing with Incident Management
  • Learn about ITIL Framework Based Incident Management Process Workflow
  • Implementing Incident Management - Detailed Guidance

Incident Management Part III - Cyber Security Incident Response Team (CSIRT)

  • Course ID: CS00403
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand how to use code of practice ISO 27002
  • Learn about ISMS mandatory processes and documentation
  • Learn about risk assessment, risk treatment plans, statement of applicability
  • Learn about ISO 27001 Annex A controls and requirements

Information Security and Privacy Awareness

  • Course ID: CS00101
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn How to Protect Information
  • Understand the Key Security Terms
  • Learn about Insider Risk
  • Learn about Privately Identifiable Information and Privately Healthcare Information
  • Learn about Physical Security, Facility Security and Clean Desk Policies
  • Learn about Social Engineering and Phishing
  • Learn about Acceptable Personal Use of Corporate Property and Email
  • Learn about Malicious Software and Incident Reporting
  • Learn about User Id and Password Protection
  • Understand Your Responsibility as a User

Information Technology General Controls (ITGC) Part I

  • Course ID: CS00701
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Study the Sarbanes-Oxley Act (SOX)
  • Learn about the COSO framework and its relationship with SOX
  • Learn about SOX and Corporate Governance requirements
  • Study the internal controls
  • Understand the relevance of IT controls for SOX compliance
  • Understand the fundamentals of ITGC
  • Study the types of IT controls
  • Study the general IT process controls and controls testing

Information Technology General Controls (ITGC) Part II - COSO Framework

  • Course ID: CS00702
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Information Technology General Controls (ITGCs) basics 
  • Study the IT and Risk Control Approach
  • Learn to evaluate IT General Controls
  • Learn about Auditing Security Administration Controls
  • Learn about Auditing Maintenance Controls
  • Learn about Auditing Computer Operations Controls
  • Learn about Auditing Systems Development Controls
  • Learn about Auditing Outsourced Services Controls
  • Study the Key Considerations for Effective SOX Testing

Information Technology General Controls (ITGC) Part III

  • Course ID: CS00703
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand IT Governance considerations in SOX compliance
  • Understand Activity/Process Level Considerations in General Control Issues
  • Learn about evaluating security administration controls
  • Understand the SOX requirement for:
  • Application change controls
  • Data Backup and Recovery
  • Systems Development Life Cycle (SDLC)
  • Outsourcing Financial Applications
  • Learn about the Role of Application and Data-Owner Processes
  • Understand the application level control considerations
  • Understand the process level control considerations

Malware Ransomware Awareness

  • Course ID: CS00105
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • How do you get malware?
  • What malware is and why it is dangerous
  • Become familiar with different types of malware and how users can identify them
  • How can you tell if you have a malware infection?
  • Understand how most malware requires human action to infect a computer
  • How to protect against malware?
  • How people can avoid malware and what to do (and not to do) if this ever happens

National Institute of Standards and Technology (NIST) Part I

  • Course ID: CS00501
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about CSF fundamentals
  • Learn how to develop a risk-based cybersecurity framework
  • Understand the CSF framework core and design
  • In-depth knowledge on how to use functions, categories, and subcategories
  • Use of risk management principles, best practices, and methodologies
  • Understand the CSF implementation tiers and implementation
  • Learn about framework profile implementation
  • Learn about improving resilience

National Institute of Standards and Technology (NIST) Part II

  • Course ID: CS00502
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about CSF fundamentals
  • Learn how to establish or improve your cybersecurity program
  • Understand the NIST CSF concept and how to implement with the help of case study
  • Understand the practical application of CSF framework’s core, design, functions, categories, and subcategories
  • Detailed knowledge of functions, categories, and subcategories along with
  • informative references from COBIT, ISA, NIST SP 800-53, CIS CSC, ISO 27001, etc.

Privileged Access Management (PAM) Part I

  • Course ID: PA1
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Privileged Access Management Overview
  • Learn about privileges and how are they created, granted, etc.
  • Learn about privileged accounts
  • Understand the types of privileged accounts
  • Study the privileged service accounts
  • Learn about privilege related risks and challenges
  • Learn about privileged threat vectors – external and internal
  • Understand the benefits of privileged access management
  • Learn how hackers compromise the privileged accounts.
  • Study the privilege access management best practices

Privileged Access Management (PAM) Part II

  • Course ID: PA2
  • Duration: 0 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about privileges and how are they created, granted, etc.
  • Learn about the capabilities of PAM software.
  • Study the PAM security controls.
  • Learn about the PAM solution partner considerations.
  • Study about the PAM baseline and ongoing Improvements.
  • Study the considerations for selection of PAM.
  • Learn hot to protect privileged accounts.

Privileged Access Management (PAM) Part III

  • Course ID: PA3
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • PAM as a Directive
  • Five Steps Toward a Successful PAM Implementation 
  • Governance
  • The Four Pillars of PAM
  • Pillar No. 1: Track and Secure Every Privileged Account
  • Pillar No. 2: Govern and Control Access
  • Pillar No. 3: Record and Audit Privileged Activity
  • Pillar No. 4: Operationalize Privileged Tasks
  • How PAM Is Implemented / Key Solutions

Problem Management Part I - Awareness

  • Course ID: CS00601
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand incident vs. problems
  • Understand quick fix and permanent problem resolution
  • Key definitions and basic concepts for problem management
  • Decide whether you need to implement problem control
  • Key process activities of the problem management process
  • Understand workarounds and solutions
  • Developing problem management policy
  • Learn about problem management process interfaces
  • Critical success factors and key performance indicators

Problem Management Part II - Advanced

  • Course ID: CS00602
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand basic concepts of problem management
  • Learn about the roles and responsibilities associated with the problem
  • management process
  • Understand the input that triggers the problem management process
  • Planning for problem management process implementation and training
  • Understand the problem management process implementation guide (step by step approach)
  • Understand process inputs and outputs
  • Learn about problem management reporting
  • Understand the problem management checklist
  • Understand the activities and documentation

Security Framework Awareness

  • Course ID: CS00108
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand What is a Framework
  • Understand What is an Information Security Framework
  • Learn about Types of Security Frameworks
  • Learn about Compliance Regulations and Frameworks
  • Understand Factors Driving Security Frameworks
  • Learn about Various Security Frameworks - ISO, COBIT, NIST, ITIL, COSO, NERC, TY
  • CYBER, HITRUST, CSF
  • Understand the Business Benefits of Security Frameworks

Social Engineering & Phishing Part II - Advanced

  • Course ID: CS00104
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Ten Different Types of Phishing Attacks
  • Understand the Characteristics of Phishing Emails
  • Understand Common Methods of Phishing Attacks
  • Learn about Escalation and Containment
  • Learn about Eradication and Rebuilding
  • Learn about Recovery and Aftermath

Social Engineering & Phishing Part I - Awareness

  • Course ID: CS00103
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Social Engineering Attacks
  • Social engineering attack techniques
  • Steps in social engineering attack
  • Types of Social Engineering Attacks
  • Phishing attacks
  • Telltale signs of phishing attacks
  • Detection, Identification, and Tips to Keep You From Being Fooled
  • Spear Phishing• Detection telltale signs
  • Use cases and phihsing attack detection exercises

System & Organization Controls (SOC) Part I

  • Course ID: CO00501
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about the System and Organization Controls (SOC) cybersecurity - SOC 1, SOC 2 and SOC3
  • Understand the businesses that should think about SOC 2
  • Learn about the driving factors for SOC compliance
  • Learn how SOC 2 is different from SOC 1 and other compliance frameworks
  • Understand the difference between a Type I and Type II audit
  • Learn to decide the type of SOC report the organizations needs to have
  • Learn about the factors driving the audit scope
  • Understand the foundation of SOC 1®, SOC 2®, and SOC 3® Reports
  • Learn about the SOC 2® and SOC 3® Trust Services Principles

System & Organization Controls (SOC) Part II

  • Course ID: CO00502
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • SOC evolution
  • Learn about SOC 2 audit and who can perform the audit
  • Learn how to apply relevant SSAE 18 AICPA Standards
  • SOC 1, SOC 2, SOC 3, SOC 2 +, SOC for Cyber Security and SOC for Supply Chain Reports
  • Understand scope and use 
  • Learn about the purpose and relevant standards 
  • Learn about the subject matter and components of the report 
  • Understand the use case for SOC for Cyber Security and SOC for Supply Chain
  • Learn about SOC 2 + Additional Subject Matter Reports
  • Learn the about TSC Mapping to Standards and Frameworks

System & Organization Controls (SOC) Part III

  • Course ID: CO00503
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • SOC evolution
  • Learn about SOC Report Options
  • In-depth knowledge of:
  • Trust Service Criteria
  • Common Criteria
  • Supplemental Criteria
  • Point of Focus
  • Learn to select the Trust Service Criteria for your organization
  • Understand the underlying expectations under each Trust Service Criteria
  • Understand the importance of Security criteria and why it is mandatory

System & Organization Controls (SOC) Part IV

  • Course ID: CO00504
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand SOC evolution
  • Practical implementation knowledge of:
  • Common Criteria
  • Supplemental Criteria
  • Learn about Generally Accepted Privacy Principles (GAPP)
  • Understand what’s included in SOC report
  • Understand what’s included in Management Assertions and Description of the System
  • Understand the AICPA new guidelines - Description Criteria 200 (DC 200)

System & Organization Controls (SOC) Part V

  • Course ID: CO00505
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand what a system description is
  • Understand the driving factors
  • Learn to write system description essentials
  • Learn to write:o System overview
  • Infrastructure details
  • Relevant Aspects of Controls
  • Complementary User-Entity Controls
  • Learn to describe the control environment, risk assessment process, information communication systems, and control monitoring process
  • Learn the step by step approach to the writing system description

System & Organization Controls (SOC) Part VI

  • Course ID: CO00506
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn how user organization can adopt SOC report
  • Learn to identify the relevant report user organization will need from a vendor
  • Vendor management, due diligence, and SOC report
  • Understand the report content 
  • Understand different types of SOC reports
  • Report fundamentals and report content
  • Trust service criteria
  • What’s included in the SOC report (explained with the report examples):
  • Independent Service Auditor Report
  • Management Assertions
  • Overview of Operations
  • Relevant Aspects of the Control Environment
  • Description of the System
  • Description of Control Objectives, Control, and Results of Testing
  • Complementary User Entity Controls
  • Other Information Provided by Management
  • Learn to identify the type of report vendor shared
  • Understand how to evaluate the report content

System & Organization Controls (SOC) Part VII

  • Course ID: CO00507
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about trust service criteria and SOC reports
  • Learn how trust service criteria is organized
  • Learn how to prepare SOC Trust Service Criteria Control Documentation 
  • Detailed understanding of requirements
  • Learn how to write controls using suggested controls for each service criteria and category
  • Security, Availability, Processing Integrity, Confidentiality, Privacy 
  • Control Environment, Communication and Information, Risk Assessment, Monitoring Activities, Control Activities, Logical and Physical Access Controls, System Operations, Change Management, Risk Mitigation, Additional Criteria for Availability, Additional Criteria for Confidentiality, Additional Criteria for Processing Integrity, Additional Criteria for Privacy
  • Study the real-life example on how to write controls
Copyrights © 2020 All Rights Reserved by SecuRetain.