Providing Award-Winning Cybersecurity Solutions For More Than 20 Years
Training
Training Courses
Course Catalog
*Courses may vary.
Search Courses
Data Backup And Recovery (Video)
This module emphasizes the importance of data backup and recovery. 1:13 minutes
Locked Down (Lock Screens)
This micro-learning module emphasizes the importance of locking your screens. 0:35 minutes
Tailgating (Video)
This video explains the risks of tailgating, or when hackers gain physical access to restricted areas. It also details physical security best practices for your office or campus. 1:43 minutes
Dumpster Diving (Video)
This short, one-minute video outlines the risks improperly disposed printed material, technology and removable media can pose to an organization. 1:03 minutes
A Few Extra Seconds (Lock Screens)
Why you should use lock screens on your devices. 1:00 minutes
Loose Lips Sink Ships (Physical Security)
This video covers the risks of carrying out business outside of your facility. 1:00 minutes
One Person’s Trash... (Dumpster Diving)
This mini movie covers the consequences of failing to shred, burn, or properly dispose of sensitive physical documents. 1:00 minutes
IoT Security
This interactive module discusses security risks related to Internet of Things (IoT), how connected devices may be attacked, and steps for safe use of IoT.
Incident Response
This module will explore the basics of incident response and the first rules of keeping people and data safe. 4:49 minutes
Introduction to C-TPAT
The United States imports and exports trillions of dollars’ worth of goods and services every year. This module covers the Customs-Trade Partnership Against Terrorism, or C-TPAT. 7:33 minutes
Introduction to DFARS
This security and awareness training is an introduction to DFARS, or the Defense Federal Acquisition Regulation Supplement. 10:48 minutes
Protecting CUI
There are fourteen families of controls listed under NIST 800-171, for a total of 110 controls to examine and implement. This module will review those families, covering what they entail and what controls are included in each one. 16:09 minutes
FAR Code of Conduct
Learners will explore the FAR Code of Conduct and the requirements for staying in compliance as a contractor for the federal government. 5:36 minutes
CJIS Policy: Dissemination & Destruction
This module outlines how to properly dispose of criminal justice information (CJI), how to locate and remove CJI securely, when CJI should be destroyed and best practices for destroying CJI. 7:05 minutes
CJIS Policy: Physical Security
This module covers the necessary defenses against unauthorized access to your facility and any paper copies of criminal justice information in your possession. 9:25 minutes
Introduction to NIST 800-171
NIST 800-171 is just one of many federal publications that contractors and companies working with the government are required to comply with. This module will introduce you to NIST 800-171: what it is, and what to do about it. 13:33 minutes
Physical Security And Student Records
This module will review best practices for physical security as it relates to protecting printed student educational and personal information and electronic record transmission. 9:32 minutes
Complying with NIST 800-171
This security and awareness module will explore the issue of organizational compliance with NIST 800-171 guidelines. 10:39 minutes
Physical Security for Financial Institutions
This module will review best practices for physical security as it relates to protecting printed financial and personal information and electronic record transmission. 9:33 minutes
Physical Security and PHI for Healthcare Managers
This module reviews best practices for physical security as it relates to HIPAA compliance, including facility access, device storage, physical record management and electronic record transmission. 12:14 minutes
Physical Security and PHI for Healthcare Executives
This module reviews best practices for physical security as it relates to HIPAA compliance, including facility access, device storage, physical record management and electronic record transmission. 11:42 minutes
Physical Security for Managers
Managers have a responsibility to reinforce the importance of physical security in the office to keep data secure, and how to avoid theft and misuse of printed materials and unattended technology. 9:28 minutes
Physical Security and PHI
HIPAA includes specific requirements for physical safeguards that every organization should have in place to secure protected health information (PHI). 10:19 minutes
Physical Security for Executives
This module for executives covers methods for keeping physical records secure, secure record destruction, encryption and building access. 10:17 minutes
Data Retention
This module walks learners through common data retention plans, data types typically subject to data retention policies and secure data disposal considerations. 4:32 minutes
Data Destruction
This module reinforces the importance of secure data-disposal methods and shares best practices for disposal of sensitive data. 2:17 minutes