Wireless Network Security

Workshop ID: FCOO114

Objective

  1. For small businesses, wireless connectivity has many challenges. Lack of state-of-the-art security on devices often requires implementing controls like denying access to wireless. Another type of control involves the use of security protocols. There is a potential risk of using public Wi-Fi in places like coffee shops, malls, restaurants, etc.

    The management needs direction, and employees need to know that securing wireless access involves using a mix of security strategies and solutions and not necessarily one specific technology like a secure VPN.

    The suggested e-Learning courses will enhance the organization’s ability to implement a strategic plan and improve employee skills.
Price: $0 $74.99
Add to Cart For Corporate Request Demo →
  • Category: Free Workshop
  • Duration: 9 Mins
  • CPE: 1 HR
  • Workshop Type: e-Learning

What you will learn:

    1. What you will learn:
      The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

      Recommendations for Wireless Network Security
      Router Security Option to Choose
      Open Wi-Fi Network

Advanced Persistent Threat or Intrusion

  • Course ID: ADVANCp6H2
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:


The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

What is Advanced Persistent Threat
Phases of an Advanced Persistent Threat
Reconnaissance and Initial Access
Expand Access
Data Capture/Exfiltration or Manipulation
Track-Covering and Exit
The suggested e-Learning courses that would reduce the insurance cost

Anti Money Laundering (AML) Awareness

  • Course ID: CO00103
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What it is and how does it work?
  • Why people and organizations launder money?
  • How money laundering works: basic process
  • Legal consequences for money laundering, including state and federal (U.S.) penalties
  • Applicable laws and regulation
  • Insider trading

Architectural Solutions

  • Course ID: ARCHITvD8Q
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:


The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

Securing ICS Infrastructure - Defense in Depth
Next-Gen Tools and Techniques
Zero Trust

Asset Management

  • Course ID: FCOO102
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Asset Management?
    Asset Management and Cybersecurity
    Recommendations for Asset Management
    Case Study - Application/Program Vulnerabilities 

Backup and Recovery

  • Course ID: FCOO104
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What you will learn:
    The training promotes the objective of informed management for better decision-making. Traning provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is a disaster?
    What is Disaster Recovery?
    Backup and Recovery
    Protecting Backup Data

Breach Management

  • Course ID: FCOO105
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

What you will learn:

 

The training promotes the objectiveof informed management for better decision-making. raining provides managementand employees with a basic understanding of underlying concepts and recommendationsfor managing challenges. Each section informed you about additional trainingrequirements and recommended courses. In the next 10minutes, you will learn:

  • What is the importance of abreach notification?
  • What is a data breach?
  • In what circumstances wouldnotification of a data breach be required and to whom?
  • Suggested e-Learning courses toenhance the knowledge.

(Note - The suggested e-Learningprogram is a two-part series.)

Breach Notification Part I - Awareness

  • Course ID: CS00301
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What is the importance of a breach notification?
  • What is a data breach?
  • In what circumstances would notification of a data breach be required and to whom?
  • When and how should notification of a data breach be provided?
  • Framework for Effective Data Breach Notification Legislation
  • Timing of Notification to Affected Individuals
  • Post Data Breach Immediate Action Items
  • Breach Notification to Authorities

Breach Notification Part II - Advanced

  • Course ID: CS00302
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Breach Management
  • Effective Breach Response
  • Data Breach Checklist
  • Breach Notification Notice Content
  • Notification Timelines
  • Lifecycle of a Data Breach
  • Public Relations Strategy

Bring Your Own Device

  • Course ID: FCOO106
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Bring Your Own Device (BYOD)?
    What are the BYOD challenges?
    How can you secure your BYOD environment?
    Examples of BYOD device hack
    Suggested e-Learning courses to enhance the knowledge
    (Note - The suggested e-Learning program is a two-part series.)

Business Continuity & Disaster Recovery (BCP / DR) Part I - Awareness

  • Course ID: DR00101
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Disaster
  • Business Continuity and Disaster Recovery
  • Use Cases
  • Risks Covered by DR
  • Driving Factors
  • Challenges in Developing DR Plan
  • Technical Challenges
  • Key Factors in DR Plan
Need us to design a course for you? Contact Now
Copyrights © 2020 All Rights Reserved by SecuRetain.