Your browser is not supported. Please download Mozilla Firefox or Google Chrome browser.

: 0 items
Cart Total
Filters Applied
  • Category: Security
  • Sub Category: Information Security
Reset All
Cyber Awarenss Training

Cyber Awarenss Training

Our New Cyber Awareness Training is an interactive online learning course that will help you in identifying and avoiding the most common types of Cyberattacks. We will introduce you to the Most Wanted Cyber Criminals and arm you with best practices to avoid them and their attacks!

Visited 87 times
Cybersecurity for Employees Course

Cybersecurity for Employees Course

This brand new 2018 video course focuses on stopping the ever-growing threat of cyber theft. The program, designed for all employees, teaches the subject in language that even a non-technical person can understand. Cybersecurity is in the hands of employees. Despite billions of dollars spent protecting organizational networks, the real threat comes from within. Hackers focus their energies on tricking naive employees into giving up passwords and other confidential data. This is much easier than attacking a technologically advanced firewall. Just one mistake from one employee can give them the keys to an entire network. This cybersecurity course covers: The cost of data theft Passwords How hackers uncover passwords How hackers use passwords E-mail Phishing Social engineering WiFi security Home networks USB drives Websites Security updates Protecting social media accounts

Visited 305 times
Employee Security Awareness Training (Course)

Employee Security Awareness Training (Course)

No Server Patch, Firewall, or Antivirus Software will fix the most overlooked weakness within Information Security. The human element is to blame for the majority of company breaches – Making a companies most valuable asset their greatest liability. This Online Security Awareness Training Lowers Corporate Risk by Increasing Employee Awareness. Course Outline: Importance of Security Awareness Where Breaches can occur Security Awareness is for Everyone Social Engineering Awareness Types of Social Engineering Phishing Vishing Baiting Social Engineering Prevention Physical Security Importance of Physical Security Types of Physical Breaches: Entrances Secure Areas Improper Waste Disposal Report Suspicious Activity! Computing Safety Importance of Computer Security Types of Computer Breaches: Unknown Software Unsafe Web Browsing Unknown Storage Devices Email Security Social Media Mobile Computing Breach Prevention Strong Passwords Antivirus Updates and Patches

Visited 304 times
File Encryption Basics and Practices with CrococryptFile

File Encryption Basics and Practices with CrococryptFile

In this course, you will learn how to use CrococryptFile, the open-source file encryption solution. Learn what encryption means on the technical level – as a background information to choose the right file encryption method for your case. If you care about privacy and if you are willing to do something about it, you are already on the right track. This applies for enterprise and private users alike.

Visited 232 times
Cyber Security of the SPIDERS Microgrid Network & How it Applies to the Industry at Large (Course)

Cyber Security of the SPIDERS Microgrid Network & How it Applies to the Industry at Large (Course)

Originally Presented: July 16, 2015 Course Length: 1.5 Hours Course Credit Hours: 1.5 PDHs Moderator: Robert Bradford, Director of Technical Consulting, Burns & McDonnell Speakers: Fred Terry, Federal Cybersecurity Practice Lead, Burns & McDonnell Ross Roley, SPIDERS Operational Manager, US Pacific Command Course Overview: SPIDERS, not the creepy, crawling, eight-legged insects we fear, but Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS), is the acronym connecting clean energy and cyber security. SPIDERS is a Department of Defense (DoD) and the Department of Energy (DoE) partnership project designed to keep critical military facilities in operation in the event of grid outages while making use of clean, locally sourced energy. A major challenge of the project is averting military bases away from over-reliance on diesel-powered backup generators and re-directing them toward hybrid systems integrating solar power, hydrogen fuel cells and local energy sources. Learn which cyber security threats affect the grid, supervisory control and data acquisition (SCADA) and Industrial Control Systems during the July 16th webinar, Cyber security of the SPIDERS Microgrid Network & How It Applies to the Industry at Large, and earn 1.5 PDHs. This webinar explores an overview of cyber security threats, the SPIDERS microgrid, Red Team exercises against the microgrid network. SCADA managers in the Energy Transmission & Distribution sectors, individuals involved in Industrial Control System networks, as well as DoD personnel and contractors responsible for DoD security, will be learning directly from industry experts, Fred Terry, Federal Cyber Security Practice Lead at Burns & McDonnell and Ross Roley, SPIDERS Operational Manager at the US Pacific Command.

Visited 425 times