My Account
Our Most Popular Courses

Becoming a Cybersecurity Professional
This course provides information about possible cybersecurity work roles and the knowledge, skills, abilities and tasks associated with these work roles.

Becoming DFARS 252.204-7012/NIST 800-171 Compliant
Description: This course provides an overview of the Defense Federal Acquisition Regulations (DFARS) 252.204-7012 / National Institute of Standards and Technology (NIST) 800-171 compliance requirements and a process for becoming compliant.

Cybersecurity Risk Management for Federal Systems
This course provides a synopsis of the governance requirements associated with federal systems and the process for systems receiving an authorization to operate (ATO).

Hiring Cybersecurity Professionals
This course provides insight into how to create position descriptions for cybersecurity roles, and how to identify candidates that meet the requirements for such roles.

Cybersecurity 101
This course teaches common terminology used in cybersecurity and describes what constitutes the broad term “cybersecurity.”

Identifying the Right Cybersecurity Tools for Your Environment
This course provides guidance on identifying the right cybersecurity tools to use based upon the existing technology within the environment.

Handling Cybersecurity Breaches
This course describes cybersecurity incidents and breaches and provides an understanding how to respond in the event of a breach. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals

Protecting Your Organization from Insider Threats
This course equips students with information about various types of insider threats and approaches to protecting their organizations from such threats.

Creating a Risk-Based Budget for Cybersecurity
This course provides guidance on how to answer such questions as: how to I secure my organization with the current budget I have? How much money should I be budgeting for cybersecurity? If I want to move my organization to a greater level of cybersecurity, how much would that cost?