Cybersecurity, Risk, and Compliance Training the SecuRetain Way
Through immersive and dynamic course content, you will develop the fundamental skills and ready to use knowledge in the workforce.![Energy Industry Risk Management Course](images/ind-icons/Box 01 Final.png)
Empower your organization with affordable e-learning courses on a flexible schedule
![Cybersecurity Certification](images/ind-icons/Box 02 Final.png)
Online compliance offers a secure way to get certified with no interruptions and less paperwork
![Fraud Management](images/ind-icons/Box 03 Final.png)
User-friendly courses for employees and competent tracking system for the organization to monitor the progress
![Education Risk Management Certification](images/ind-icons/Box 04 Final.png)
Customize your cybersecurity courses to reflect your policies, procedures, and guidelines
![Cyber Security Courses](images/ind-icons/Box 05 Final.png)
Use the SecuRetain platform to distribute your training content along with SecuRetain courses in your own private space.
Corporations can save more than 15% by developing in-house skills. The series of courses aim to enhance end to end knowledge.
Preview e-Learning Courses
Comprehensive Energy Industry Based e-Learning Courses
Learn to perform essential compliance and cybersecurity functions efficiently and effectively. Beneficial for all organizations, irrespective of their size, industry, and geography.
SecuRetain’s Energy Industry Based e-Learning Courses
Be successful in a new information security role. Demonstrate your expertise with auditors and examiners.
- SSAE 18 System & Organization Controls (SOC)
- Fraud Management
- Anti-money Laundering
- Foreign Corrupt Practices Act
- Data Privacy
- Facility Workplace
- Social Engineering
- Phishing
- Payment Card Industry Awareness
- Risk Management
- Vendor Risk Management
- Fraud and Audit Management Series
- ISO 27001, 27701, 31000, 22301
- HIPAA
- FFIEC
- GDPR
- NIST
- FedRAMP
- Security Frameworks
- NIST Cybersecurity Framework Fundamentals
- The Federal Financial Institutions Examination Council (FFIEC)
- Cloud Security
- Access Control
- Privileged Access Management
- Incident Management
- Problem Management
- Breach Management
- Information Technology General Controls (ITGC)
- Malware Ransomware Security Frameworks
- Fraud Risk Management
- Business Continuity and Disaster Recovery
SecuRetain’s Energy Industry e-Learning Courses
Browse all Energy Industry e-learning courses available for you on the SecuRetain platformAccess Control Awareness Part I - CS00201
What you will learn:
- Learning the access control basics
- Understanding the access control challenges
- Understanding authentication factors and multi factor authentication.
- Developing access control policies and procedures
- Learning about access control models
- Learning about principles of access controls and types of access controls
Social Engineering & Phishing Awareness Part I - CS00103
What you will learn:
- Learn about Ten Different Types of Phishing Attacks
- Understand the Characteristics of Phishing Emails
- Understand Common Methods of Phishing Attacks
- Learn about Escalation and Containment
- Learn about Eradication and Rebuilding
- Learn about Recovery and Aftermath
Social Engineering & Phishing Advanced Part II - CS00104
What you will learn:
- Learn about Ten Different Types of Phishing Attacks
- Understand the Characteristics of Phishing Emails
- Understand Common Methods of Phishing Attacks
- Learn about Escalation and Containment
- Learn about Eradication and Rebuilding
- Learn about Recovery and Aftermath
Information Security Management System (ISMS) Part III - CO00306
What you will learn:
- Understand the need for ISMS
- Learn about ISO 27001certification and ISMS Mandatory Process
- Introduction to implementing ISMS
- Learn how to implement ISO 27001 ISMS 11 Step Program
- Step by Step Guide on implementing ISMS program
- Learn the practical examples and study the documentation samples
- Learn about ISO 27001 Annex A Controls Checklist 14 Domains and 35 Control Objectives
- ISMS Part III includes implementation details for each control objective along guidance