Course Category: Paid

Preparing for CMMC Certification

Title: Preparing for CMMC Certification Description:  This course provides an overview of the Cybersecurity Maturity Model Certification (CMMC) and how companies can begin to prepare now for receiving certification. Target Audience: Defense Industrial Base (DIB) Company Owners, Executives, and IT/Cyber Staff, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 1 hour Instructor Background and …

Preparing for CMMC Certification Read More »

Protecting Your Organization from Insider Threats

Title: Protecting Your Organization from Insider Threats Description: This course equips students with information about various types of insider threats and approaches to protecting their organizations from such threats. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes …

Protecting Your Organization from Insider Threats Read More »

Handling Cybersecurity Breaches

Title: Handling Cybersecurity Breaches Description: This course describes cybersecurity incidents and breaches and provides an understanding of how to respond in the event of a breach. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes Incident Response Process …

Handling Cybersecurity Breaches Read More »

Identifying the Right Cybersecurity Tools for Your Environment

Title: Identifying the Right Cybersecurity Tools for Your Environment Description: This course provides guidance on identifying the right cybersecurity tools to use based upon the existing technology within the environment. Target Audience: Entrepreneurs, Small Business Owners, Executives, Purchasing staff, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview …

Identifying the Right Cybersecurity Tools for Your Environment Read More »

Federal framework or NIST compliance

Cybersecurity Risk Management for Federal Systems

Title:  Cybersecurity Risk Management for Federal Systems Description:  This course provides a synopsis of the governance requirements associated with federal systems and the process for systems receiving an authorization to operate (ATO). Target Audience: Federal Government and Contractor Executives, Managers, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 1 hour Instructor Background and Course …

Cybersecurity Risk Management for Federal Systems Read More »

Hiring Cybersecurity Professionals

Title:  Hiring Cybersecurity Professionals Description:  This course provides insight into how to create position descriptions for cybersecurity roles, and how to identify candidates that meet the requirements for such roles. Target Audience: Hiring Managers, Human Resource Professionals Outline and Duration: Total time commitment: 45 minutes Instructor Background and Course Overview – 2 minutes Cybersecurity Workforce …

Hiring Cybersecurity Professionals Read More »

BEcoming NIST Compliant

Becoming DFARS 252.204-7012/NIST 800-171 Compliant

Title:  Becoming DFARS 252.204-7012/NIST 800-171 Compliant Description:  This course provides an overview of the Defense Federal Acquisition Regulations (DFARS) 252.204-7012 / National Institute of Standards and Technology (NIST) 800-171 compliance requirements and a process for becoming compliant. Target Audience: Defense Industrial Base (DIB) company owners, operators, and staff Outline and Duration: Total time commitment: 1 …

Becoming DFARS 252.204-7012/NIST 800-171 Compliant Read More »