Click Workshop of Your Choice, Add to Cart, Register, and Check Out with ZERO Price
The workshops below are for guidance and exclusively designed to educate Startups, Executives, and Non-technology persons about the cybersecurity domains. Each free workshop is 5-7 minutes and they do not represent our course curriculum or hour-long courses.
Addressing Insider Threats And Case Studies - CBP101
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:
- What are threats?
- Vulnerabilities on a Network
- Sources of Vulnerabilities
- Recommendation
- Regulatory Requirements
- Case studies
Advanced Persistent Threat Or Intrusion - CBP102
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:
- What is Advanced Persistent Threat?
- Phases of an Advanced Persistent Threat
- Reconnaissance and Initial Access Expand Access
- Data Capture/Exfiltration or Manipulation Track-Covering
- Exit the suggested e-Learning courses that would reduce the insurance cost
Architectural Solutions - CBP103
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
- In the next 10 minutes, you will learn:
- Securing ICS Infrastructure
- Defense in Depth
- Next-Gen Tools and Techniques
- Zero Trust
Asset Management - CBP104
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
- In the next 10 minutes, you will learn:
- What is Asset Management?
- Asset Management and Cyber security Recommendations for Asset Management Case Study
- Application/Program Vulnerabilities
Backup And Recovery - CBP105
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Traning provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
- In the next 10 minutes, you will learn:
- What is a disaster?
- What is Disaster Recovery?
- Backup and Recovery
- Protecting Backup Data
Breach Management - CBP106
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
- In the next 10minutes, you will learn:
- What is the importance of a breach notification?
- What is a data breach?
- In what circumstances would notification of a data breach be required and to whom?
- Suggested e-Learning courses to enhance the knowledge.
- (Note - The suggested e-Learning program is a two-part series.)
Bring Your Own Device - CBP107
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
- In the next 10 minutes, you will learn:
- What is Bring Your Own Device (BYOD)?
- What are the BYOD challenges?
- How can you secure your BYOD environment?
- Examples of BYOD device hack Suggested e-Learning courses to enhance the knowledge
- (Note - The suggested e-Learning program is a two-part series.)
Free Course - Cybersecurity Training - CBP108
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
- In the next 10 minutes, you will learn: -
- Cyber security Training Recommendations
- Guidance for Users
- Cyber security Threats Education
- Case Studies
Incident Response - CBP109
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses.
- In the next 10 minutes, you will learn:
- Brief about Incident and Incident Management (IM)
- Incident Management Objectives and Protecting Information Assets
- What is a Security Incident Management?
- Incident Management Process Workflow
- Important Definitions Suggested e-Learning courses to enhance the knowledge
- (Note - The suggested e-Learning program is a three-part series.)
Information System Protection - CBP110
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:
- Protect computer systems from malicious attacks
- Learn about CIA Triad
- Achieving asset protection goals Confidentiality, Integrity, and Availability
- Lots of case studies Suggested e-Learning courses to enhance the knowledge
Network Security - CBP111
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:
- What is Network Security?
- How does Network Security Work?
- Types of Network Security Recommendations for Network Security
- Case studies
Personnel Screening And Insider Threat - CBP112
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:
- What is Insider Threats Risk?
- Examples of Insider Threat Risk
- What are the Consequences of Risk?
- Case studies
Physical And Environmental Security And Case Studies - CBP113
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:
- What is Physical and Environmental Security?
- Physical Security
- Securing Offices, Rooms, and Facilities - Badge Security - Visitors Security – Supervision
- Workplace Security
- Equipment Security
- Case Studies Suggested e-Learning courses to reskill and upskill the cyber knowledge
Remote Access - CBP114
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:
- What is remote access?
- Securing remote office locations
- Recommendations for secure remote access
- Reporting remote access issues
- Multiple case studies and hacks
- Suggested e-Learning courses to enhance the knowledge
User Account Management And Access Control - CBP115
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:
- Learning the access control basics
- Authenticate and authorize Recommendations for user account management and access control
- Suggested e-Learning courses to enhance the knowledge
Wireless Network Security - CBP116
Book the course
Course Objective
What you will learn:
- The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges. Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:
- Recommendations for Wireless Network Security
- Router Security Option to Choose
- Open Wi-Fi Network