Remote Access - CBP114

Objective

Attackers broke into Target & rsquo's Point of Sale (POS) systems via a remote access account belonging to an HVAC company.

The management and employees need to know that securing remote access involves using a mix of security strategies and solutions and not necessarily one specific technology like a secure VPN. The suggested e-Learning courses will enhance the organization’s ability to implement a strategic plan and improve employee skills.

Price: 39
Add to Cart For Corporate Request Demo →
  • Duration: 60 Mins
  • CPE: 1.00 HR
  • Type: e-learning

What you will learn:

    The training promotes the objective of informed management for better decision-making. Each section informed you about additional training requirements and recommended courses.
    In the next 10 minutes, you will learn:
    • What is remote access?
    • Securing remote office locations
    • Recommendations for secure remote access
    • Reporting remote access issues
    • Multiple case studies and hacks
    • Suggested e-Learning courses to enhance the knowledge

Addressing Insider Threats And Case Studies - CBP101

  • Course ID:431521
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

• What are threats?
• Vulnerabilities on a Network
• Sources of Vulnerabilities
• Recommendation
• Regulatory Requirements
• Case studies

Advanced Persistent Threat Or Intrusion - CBP102

  • Course ID:431522
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:
• What is Advanced Persistent Threat?
• Phases of an Advanced Persistent Threat
• Reconnaissance and Initial Access Expand Access
• Data Capture/Exfiltration or Manipulation Track-Covering
• Exit the suggested e-Learning courses that would reduce the insurance cost

Architectural Solutions - CBP103

  • Course ID:431523
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
In the next 10 minutes, you will learn:
• Securing ICS Infrastructure
• Defense in Depth
• Next-Gen Tools and Techniques
• Zero Trust

Asset Management - CBP104

  • Course ID:431524
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
In the next 10 minutes, you will learn:
• What is Asset Management?
• Asset Management and Cyber security Recommendations for Asset Management Case Study
• Application/Program Vulnerabilities

Backup And Recovery - CBP105

  • Course ID:431525
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Traning provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
In the next 10 minutes, you will learn:
• What is a disaster?
• What is Disaster Recovery?
• Backup and Recovery
• Protecting Backup Data

Breach Management - CBP106

  • Course ID:431526
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
In the next 10minutes, you will learn:
• What is the importance of a breach notification?
• What is a data breach?
• In what circumstances would notification of a data breach be required and to whom?
• Suggested e-Learning courses to enhance the knowledge.
(Note - The suggested e-Learning program is a two-part series.)

Bring Your Own Device - CBP107

  • Course ID:431527
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
In the next 10 minutes, you will learn:
• What is Bring Your Own Device (BYOD)?
• What are the BYOD challenges?
• How can you secure your BYOD environment?
• Examples of BYOD device hack Suggested e-Learning courses to enhance the knowledge
(Note - The suggested e-Learning program is a two-part series.)

Free Course - Cybersecurity Training - CBP108

  • Course ID:431528
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
In the next 10 minutes, you will learn: -
• Cyber security Training Recommendations
• Guidance for Users
• Cyber security Threats Education
• Case Studies

Incident Response - CBP109

  • Course ID:431529
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
• In the next 10 minutes, you will learn:
• Brief about Incident and Incident Management (IM)
• Incident Management Objectives and Protecting Information Assets
• What is a Security Incident Management?
• Incident Management Process Workflow
• Important Definitions Suggested e-Learning courses to enhance the knowledge
(Note - The suggested e-Learning program is a three-part series.)

Information System Protection - CBP110

  • Course ID:431530
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
• In the next 10 minutes, you will learn:
• Protect computer systems from malicious attacks
• Learn about CIA Triad
• Achieving asset protection goals Confidentiality, Integrity, and Availability
• Lots of case studies Suggested e-Learning courses to enhance the knowledge

Network Security - CBP111

  • Course ID:431531
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
In the next 10 minutes, you will learn:
• What is Network Security?
• How does Network Security Work?
• Types of Network Security Recommendations for Network Security
• Case Studies

Personnel Screening And Insider Threat - CBP112

  • Course ID:431532
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making.
Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.
Each section informed you about additional training requirements and recommended courses.
In the next 10 minutes, you will learn:
What is Insider Threats Risk?
Examples of Insider Threat Risk
What are the Consequences of Risk?

Physical And Environmental Security And Case Studies - CBP113

  • Course ID:431533
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
In the next 10 minutes, you will learn:
• What is Physical and Environmental Security?
• Physical Security
• Securing Offices, Rooms, and Facilities - Badge Security - Visitors Security - Supervision
• Workplace Security
• Equipment Security
•Case Studies Suggested e-Learning courses to reskill and upskill the cyber knowledge

Remote Access - CBP114

  • Course ID:431534
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Each section informed you about additional training requirements and recommended courses.
In the next 10 minutes, you will learn:
• What is remote access?
• Securing remote office locations
• Recommendations for secure remote access
• Reporting remote access issues
• Multiple case studies and hacks
• Suggested e-Learning courses to enhance the knowledge

User Account Management And Access Control - CBP115

  • Course ID:431535
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
In the next 10 minutes, you will learn:
• Learning the access control basics
• Authenticate and authorize Recommendations for user account management and access control
• Suggested e-Learning courses to enhance the knowledge

Wireless Network Security - CBP116

  • Course ID:431536
  • CPE:1.00 HR
  • Course Type:e-learning
Book the course Course Objective

What you will learn:

The training promotes the objective of informed management for better decision-making.

Each section informed you about additional training requirements and recommended courses.

In the next 10 minutes, you will learn:
• Recommendations for Wireless Network Security
• Router Security Option to Choose
• Open Wi-Fi Network

Need us to design a course for you? Contact Now
Copyrights © 2020 All Rights Reserved by SecuRetain.