Cybersecurity Workshop - Startups, Executives

Click Workshop of Your Choice, Add to Cart, Register, and Check Out with ZERO Price
The workshops below are for guidance and exclusively designed to educate Startups, Executives, and Non-technology persons about the cybersecurity domains. Each free workshop is 5-7 minutes and they do not represent our course curriculum or hour-long courses.

Addressing Insider Threats and Case Studies

  • Course ID: FCOO101
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

     - What are threats?
     = Vulnerabilities on a Network
     = Sources of Vulnerabilities
     = Recommendation
     = Regulatory Requirements
     = Case studies

Advanced Persistent Threat or Intrusion

  • Course ID: ADVANCp6H2
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:


The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

What is Advanced Persistent Threat
Phases of an Advanced Persistent Threat
Reconnaissance and Initial Access
Expand Access
Data Capture/Exfiltration or Manipulation
Track-Covering and Exit
The suggested e-Learning courses that would reduce the insurance cost

Architectural Solutions

  • Course ID: ARCHITvD8Q
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:


The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

Securing ICS Infrastructure - Defense in Depth
Next-Gen Tools and Techniques
Zero Trust

Asset Management

  • Course ID: FCOO102
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Asset Management?
    Asset Management and Cybersecurity
    Recommendations for Asset Management
    Case Study - Application/Program Vulnerabilities 

Backup and Recovery

  • Course ID: FCOO104
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What you will learn:
    The training promotes the objective of informed management for better decision-making. Traning provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is a disaster?
    What is Disaster Recovery?
    Backup and Recovery
    Protecting Backup Data

Breach Management

  • Course ID: FCOO105
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

What you will learn:

 

The training promotes the objectiveof informed management for better decision-making. raining provides managementand employees with a basic understanding of underlying concepts and recommendationsfor managing challenges. Each section informed you about additional trainingrequirements and recommended courses. In the next 10minutes, you will learn:

  • What is the importance of abreach notification?
  • What is a data breach?
  • In what circumstances wouldnotification of a data breach be required and to whom?
  • Suggested e-Learning courses toenhance the knowledge.

(Note - The suggested e-Learningprogram is a two-part series.)

Bring Your Own Device

  • Course ID: FCOO106
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Bring Your Own Device (BYOD)?
    What are the BYOD challenges?
    How can you secure your BYOD environment?
    Examples of BYOD device hack
    Suggested e-Learning courses to enhance the knowledge
    (Note - The suggested e-Learning program is a two-part series.)

Free Course - Cybersecurity Training

  • Course ID: FCOO107
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

     - Cybersecurity Training Recommendations
     - Guidance for Users
     - Cybersecurity Threats Education
     - Case Studies

Incident Response

  • Course ID: FCOO108
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    Brief about Incident and Incident Management (IM)
    Incident Management Objectives and Protecting Information Assets
    What is a Security Incident Management?
    Incident Management Process Workflow
    Important Definitions
    Suggested e-Learning courses to enhance the knowledge
    (Note - The suggested e-Learning program is a three-part series.)

Information System Protection

  • Course ID: FCOO109
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    Protect computer systems from malicious actors
    Learn about CIA Triad
    Achieving asset protection goals Confidentiality, Integrity, and Availability
    Lots of case studies
    Suggested e-Learning courses to enhance the knowledge

Network Security

  • Course ID: FCOO110
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:

    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Network Security?
    How does Network Security Work?
    Types of Network Security
    Recommendations for Network Security
    Case Studies

Personnel Screening and Insider Threat

  • Course ID: FCOO111
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:

    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Insider Threats Risk?
    Examples of Insider Threat Risk
    What are the Consequences of Risk?

Physical and Environmental Security and Case Studies

  • Course ID: FCOO112
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    • What is Physical and Environmental Security?
    • Physical Security
    • Securing Offices, Rooms, and Facilities
        - Badge Security
        - Visitors Security
        - Supervision
    • Workplace Security
    • Equipment Security
    •Case Studies
    Suggested e-Learning courses to reskill and upskill the cyber knowledge

Remote Access

  • Course ID: FCOO113
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is remote access?
    Securing remote office locations
    Recommendations for secure remote access
    Reporting remote access issues
    Multiple case studies and hacks
    Suggested e-Learning courses to enhance the knowledge

User Account Management and Access Control

  • Course ID: FCOO116
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    Learning the access control basics
    Authenticate and authorize
    Recommendations for user account management and access control
    Suggested e-Learning courses to enhance the knowledge

Wireless Network Security

  • Course ID: FCOO114
  • Duration: 9 mins
  • CPE: 0 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    Recommendations for Wireless Network Security
    Router Security Option to Choose
    Open Wi-Fi Network

Corporations can save more than 15% by developing in-house skills to implement SOC, ISO, NIST, CSF, & more. The series of courses aim to enhance end to end knowledge

Preview e-Learning Courses

Comprehensive Cybersecurity Based e-Learning Courses

Beneficial for all organizations, irrespective of their size, industry, and geography. SecuRetain will help employees grow personally and professionally.

Copyrights © 2020 All Rights Reserved by SecuRetain.