Public Sector Industry

Smart content curation to help demonstrate your expertise e-Learning Course Demos

Cybersecurity, Risk, and Compliance Training the SecuRetain Way

By creating an impactful e-learning environment to teach skills and develop employees, the public sector can benefit from lower costs, higher productivity, and innovation.
Public Sector Industry Based e-Learning Courses

Train personnel to solve challenges and deliver secure and compliant results for employers and the public

Fraud Management

Transform your organization's ability to learn through dynamic and versatile training to bring ultimate competitive advantage and knowledge

Education Risk Management Certification

User-friendly courses for employees and competent tracking system for the organization to monitor the progress

Cyber Security Courses

Customize your cybersecurity courses to reflect your policies, procedures, and guidelines

it risk management certification

Use the SecuRetain platform to distribute your training content along with SecuRetain courses in your own private space

Corporations can save more than 15% by developing in-house skills to implement SOC, ISO, NIST, CSF, & more. The series of courses aim to enhance end to end knowledge.

Preview e-Learning Courses

Comprehensive Public Sector Industry Based e-Learning Courses

Personal and professional growth beneficial for all organizations, irrespective of their size, industry, and geography.

SecuRetain’s Public Sector Industry Based e-Learning Courses

Employees can get certified on a flexible schedule. SecuRetain will help employees grow personally and professionally.

  • Fraud Management
  • Anti-money Laundering
  • Foreign Corrupt Practices Act
  • Data Privacy
  • Facility Workplace
  • Social Engineering
  • Phishing
  • Risk Management
  • Vendor Risk Management
  • The Federal Financial Institutions Examination Council (FFIEC)
  • Fraud and Audit Management Series
  • ISO 27001, 27701, 31000, 22301
  • HIPAA
  • FFIEC
  • GDPR
  • NIST
  • FedRAMP
  • Security Frameworks
  • NIST Cybersecurity Framework Fundamentals
  • SSAE 18 System & Organization Controls (SOC)
  • Payment Card Industry Awareness
  • Cloud Security
  • Access Control
  • Privileged Access Management
  • Incident Management
  • Problem Management
  • Breach Management
  • Information Technology General Controls (ITGC)
  • Malware Ransomware Security Frameworks
  • Fraud Risk Management
  • Business Continuity and Disaster Recovery

SecuRetain’s Public Sector Industry e-Learning Courses

Browse all Public Sector Industry e-learning courses available for you on the SecuRetain platform
To search all courses on our SecuRetain platform. Click here!

Access Control Awareness Part I

  • Course ID: CS00201
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learning the access control basics
  • Understanding the access control challenges
  • Understanding authentication factors and multi-factor authentication.
  • Developing access control policies and procedures
  • Learning about access control models
  • Learning about principles of access controls and types of access controls

Access Control Awareness Part II

  • Course ID: CS00202
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learning the Access Control Models and Concepts
  • Understanding the Types and Categories of Access Controls
  • Understanding the Testing of Access Controls
  • Learning about Access Control Attacks and Countermeasures
  • Learning about Multilevel Security Models
  • Learning about Authentication and Authentication Methods
  • Learning about common Authentication Protocols.

Anti Money Laundering (AML) Awareness

  • Course ID: CO00103
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What it is and how does it work?
  • Why people and organizations launder money?
  • How money laundering works: basic process
  • Legal consequences for money laundering, including state and federal (U.S.) penalties
  • Applicable laws and regulation
  • Insider trading

Breach Notification Part I - Awareness

  • Course ID: CS00301
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What is the importance of a breach notification?
  • What is a data breach?
  • In what circumstances would notification of a data breach be required and to whom?
  • When and how should notification of a data breach be provided?
  • Framework for Effective Data Breach Notification Legislation
  • Timing of Notification to Affected Individuals
  • Post Data Breach Immediate Action Items
  • Breach Notification to Authorities

Breach Notification Part II - Advanced

  • Course ID: CS00302
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Breach Management
  • Effective Breach Response
  • Data Breach Checklist
  • Breach Notification Notice Content
  • Notification Timelines
  • Lifecycle of a Data Breach
  • Public Relations Strategy

Business Continuity & Disaster Recovery (BCP / DR) Part I - Awareness

  • Course ID: DR00101
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Disaster
  • Business Continuity and Disaster Recovery
  • Use Cases
  • Risks Covered by DR
  • Driving Factors
  • Challenges in Developing DR Plan
  • Technical Challenges
  • Key Factors in DR Plan

Business Continuity & Disaster Recovery (BCP / DR) Part II - Awareness

  • Course ID: DR00102
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Business Continuity Plan (BCP) vs Disaster Recovery (DR)
  • Disaster Recovery Architecture
  • Drivers for DR Architecture
  • Architectural Elements
  • Disaster Recovery Plan
  • Backup Strategy
  • Disaster Recovery Emergency Procedures

Business Continuity & Disaster Recovery (BCP / DR) Part III

  • Course ID: DR00103
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • BCP DR Frameworks and Standards
  • What is the Framework?
  • What are the different BCP frameworks?
  • Frameworks Explained
  • ISO 22301
  • National Fire Protection Association (NFPA) 1600
  • FFIEC Business Continuity
  • NIST 800-34
  • ISO 27301
  • BCP
  • Good Practice Guidelines (GPG)
  • Ready Gov
  • COBIT

Business Continuity & Disaster Recovery (BCP / DR) Part IV

  • Course ID: DR00104
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about what is a backup and recovery strategy
  • Understand and learn to apply best practices for backup
  • Learn eight different backup methods and backup hardware
  • Understand what recovery is and learn about methods of recovery
  • Learn about the challenges with recovery process and prioritization

Cloud Security Awareness

  • Course ID: CS00102
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Cloud Security
  • Cloud Basics - Cloud Concepts, Architecture and Design
  • Cloud Service Models
  • Cloud Risk Landscape
  • Cloud Security Domains
  • Cloud Data Security
  • Cloud and AWS
  • Cloud and Azure
  • Cloud Application Security Basics

Code of Conduct Part I

  • Course ID: CODEOFW1Yk
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. Learn about the ethical principles, employees and executives should follow to reinforce professional behavior in the workplace
  2. Study the best practices for code of conduct and understand the difference between Code of Conduct vs. Code of Ethics
  3. Learn to create a positive working environment of equal opportunity and no retaliation
  4. Learn to protect the company’s reputation by behaving ethically and identifying, what is and is not ethical behavior by understanding harassment and bullying
  5. Understand how corporations can enforce ethical behavior by using penalties for breaches of the Code of Conduct
  6. Learn to recognize the actions that may harm the company, such as sharing confidential company, client, and customer information 
  7. Study the elements of insider trading and ask critical questions to help spot risks and avoid illegal insider trading  
  8. Learn about the corporate best practices and employee responsibilities
  9. Understand the corporate and employee responsibilities in maintaining company accounts and records integrity

Code of Conduct Part II

  • Course ID: CODEOFN9Kd
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. Learn to recognize conflict of interest and handle the conflicts 
  2. Learn how bribes, kickbacks, payments, gifts/entertainment, and money laundering harm employers
  3. Learn the Foreign Corrupt Practices Act (FCPA) Accounting and Anti Bribery provisions and key concepts related to prohibited payments
  4. Understand the ethical and legal issues involving the use of  company assets by employees
  5. Learn about the facility and physical security perimeter and how badge and visitor’s security works
  6. Learn the Do’s and Don’ts of the clear desk policy
  7. Study the ethical principles to be followed by the company officers while working with company customers, suppliers, competitors, third parties, and company associates
  8. Study the best practices for acceptable use of company information resources and social media

Data Privacy and Privacy Regulations (GDPR / CCPA) Part I

  • Course ID: CS00106
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Privacy Imperative
  • Understand Strategic and Tactical Drivers
  • Learn about Privacy Strategy and Privacy Impact
  • Understand the Private Identifiable Information (PII) and Private Health Information
  • (PHI) data
  • Learn about Privacy Impact Assessments
  • Learn about HIPAA and HITECH
  • Learn about GDPR and CCPA
  • Understand the Breach Notification Requirements

Data Privacy and Privacy Regulations (GDPR / CCPA) Part II

  • Course ID: CS00107
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Privacy Imperative
  • Understand Strategic and Tactical Drivers
  • Learn about Privacy Strategy and Privacy Impact
  • Understand the Private Identifiable Information (PII) and Private Health Information
  • (PHI) data
  • Learn about Privacy Impact Assessments
  • Learn about HIPAA and HITECH
  • Learn about GDPR and CCPA
  • Understand the Breach Notification Requirements

Facility Workplace Awareness Part I

  • Course ID: CS00109
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

Identify potential risks to workplace security
Measures for improving workplace security
Actions to take in response to a security situation
Facility and Physical Security Perimeter
Badge and Visitors Security
Do’s and Don’ts
Securing Devices and Data in Public
Public Networks and Security
Device Security
1.Laptop
2.Mobile Device Security
Clear Desk



Facility Workplace Awareness Part II

  • Course ID: CS00110
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Identify potential risk while working remotely
  • Corporate data and information systems security
  • Physical access control
  • Email Security and practical examples

FedRAMP Fundamentals Part I

  • Course ID: CO00801
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand FedRAMP
  • Learn about the importance of FedRAMP 
  • Learn the FedRAMP Strategy and Plan
  • Understand FedRAMP Preparations
  • Understand cloud security opportunities and FedRAMP Benefits
  • Study about FedRAMP certification process
  • Learn the program steps to become FedRAMP compliant
  • Study the Independent Verification and Validation Requirement
  • Learn about certification authorities, governance and stakeholders

FedRAMP Fundamentals Part II

  • Course ID: CO00802
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Overview of FedRAMP process
  • Study about FedRAMP certification process
  • Understand the FedRAMP from an agency’s perspective
  • Understand the FedRAMP Standard Operating Procedures
  • Learn about the initial review SOP/checklists
  • Learn about the detailed review checklists
  • Understand the review and approve procedure
  • Understand the authorization process

FedRAMP Fundamentals Part III

  • Course ID: CO00803
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand the FedRAMP
  • Study the FedRAMP Security Assessment Framework
  • Categorize
  • Select
  • Implement
  • Assess
  • Authorize
  • Monitor
  • Learn about NIST Special Publications history
  • Understand NIST 800-53, 800-18, 800-30, 800-37, 800-70, 800-60
  • Learn about implementing NIST 800-53 Special Publications

Foreign Corrupt Practices Act (FCPA) and UK Bribery Act 2010 Part II

  • Course ID: CO00302
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Overview of the FCPA
  • Study the implications of the FCPA
  • Learn about the enforcement and penalties
  • Study the U.S. Sentencing guidelines
  • Understand the SEC and DOJ FCPA guidance
  • Study the DOJ and SEC hallmarks of an effective compliance program
  • Learn about the DOJ’s evaluation of compliance programs
  • Learn about UK Bribery Act 2010
  • Study the UK Bribery Act 2010 provisions
  • Study the consequences of non-compliance with the Bribery Act 2020 – Case Study

Foreign Corrupt Practices Act (FCPA) Part I - Awareness

  • Course ID: CO00301
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Foreign Corrupt Practices Act (FCPA) Global Perspective
  • Overview of the FCPA and UK Bribery Act
  • FCPA Key Concepts
  • Anything of Value
  • Foreign Officials
  • Persons Subject to the FCPA
  • Implications of the FCPA
  • Consequences of Non-Compliance
  • Enforcement and Penalties
  • Effective Compliance Program & amp; Red Flags
  • DOJ’s Evaluation of Compliance Programs

Fraud Management Part I

  • Course ID: FR00101
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand Fraud and Examples of Fraud
  • Understand the Different Types of Fraud
  • The Scale of the Problem
  • Learn about Fraud Triangle Components
  • Understand the Fraud Tree
  • Learn about Factors Contributing to Fraudulent Behavior or Why People Commit Fraud
  • Learn about Who Commits Fraud
  • Knowledge of Common Fraud Schemes
  • Understand Fraud Response
  • Management Preventive Steps

Fraud Management Part II

  • Course ID: FR00102
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand Fraud Basics
  • Learn Fraud Risk Management Basics
  • Understand How to Document Roles and Responsibilities
  • Understand the Objectives of Fraud Risk Management Program
  • Learn How to Develop a Fraud Risk Management Program
  • Understand Fraud Risk Management Framework Basics
  • Understand the Importance of Fraud Risk Governance
  • Learn How to Plan for Fraud Risk Assessments
  • Learn About Effective Fraud Risk Assessment Requirements

Fraud Management Part III

  • Course ID: FR00103
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn How to Develop the Fraud Risk Management Program
  • Learn How to Plan for Fraud Risk Assessments
  • Learn How to Execute Fraud Risk Assessments
  • Section I - Fraud Risk Assessment Framework
  • Step 1 - Identify Potential Inherent Fraud Risks
  • Step 2 - Assess the Likelihood and Impact
  • Step 3 - Evaluate Department Likely to Commit Fraud
  • Section II - Analysis
  • Section III - Reporting the Results
  • Understand Fraud Risk Assessment with Practical Examples
  • Learn about Prevention, Detection, and Respond Programs for Fraud
  • Understand Antifraud Strategy Key Elements
  • Learn about Sound Internal Control System Requirements
  • Understand Typical Features of the Practical and User-Friendly Hotline and Whistleblower Program
  • Learn about Investigations Basics, Enforcement, and Corrective Actions

Fraud Management Part IV

  • Course ID: FR00104
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

Understandingthe importance of:

  • Culture
  • Toneat the top
  • Codeof ethics
  • Learnabout different fraud case laws associated with culture, tone at the top, andcode of ethics
  • Learnabout global regulations and fraud
  • Understandthe regulatory requirements

Fraud Management Part V

  • Course ID: FR00105
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand the fraud triangle, fraud diamond, and 10-80-10 rule
  • Gain knowledge of fraud tree, occupational fraud, and abuse categories
  • Learn about corruption, asset misappropriations, and fraudulent financial reporting schemes
  • Detailed knowledge of fraud classification categories, subcategories, fraud schemes, and methods used by perpetrators
  • Study check fraud, electronic payment tampering, credit card schemes, and financial institution fraud
  • To enhance the knowledge of how to catch the perpetrators study section Fraud Management Part VI. The Part VI explains the fraud tree with case law associated with each classification, category, subcategory, and fraud schemes.

Fraud Management Part VI A

  • Course ID: FR00106
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Fraud tree schemes explained step by step with the help of case studies and case laws associated with each classification, category, subcategory, and fraud schemes
  • Learn about fraud prevention programs for each classification
  • Understand fraud tree, occupational fraud, and abuse categories
  • Learn about corruption and financial statement fraud financial reporting schemes
  • Understand fraud classification categories, subcategories, fraud schemes, and methods used by perpetrators

Fraud Management Part VI B

  • Course ID: FR00107
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Fraud tree schemes explained step by step with the help of case studies and case laws associated with each classification, category, subcategory, and fraud schemes
  • Learn about fraud prevention programs for each classification
  • Understand fraud tree, occupational fraud, and abuse categories
  • Study the asset misappropriations caselaws, schemes and prevention guidance
  • Understand fraud classification categories, subcategories, fraud schemes, and methods used by perpetrators

Fraud Management Part VII

  • Course ID: FR00108
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand the fraud perpetrator characteristics
  • Understand how to identify fraud in an organization
  • Understand what are the red flags and how to identify them
  • Learn to categorize the red flags
  • Learn to rank red flags per fraud triangle components and fraud tree
  • Learn how to identify corruption red flags and detect corruption fraud
  • Learn how to identify financial statement fraud red flags and detect financial statement fraud

Fraud Management Part VIII

  • Course ID: FR00109
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Asset Misappropriation -->Cash -->Theft of Cash on Hand
  • Asset Misappropriation -->Cash -->Theft of Cash Receipts
  • Asset Misappropriation -->Cash -->Fraudulent and Disbursement -->Billing Schemes
  • Asset Misappropriation -->Cash -->Fraudulent and Disbursement -->Payroll Schemes
  • Asset Misappropriation -->Cash -->Fraudulent and Disbursement -->Expense Reimbursement Schemes
  • Asset Misappropriation -->Cash -->Fraudulent and Disbursement -->Check Tampering
  • Asset Misappropriation -->Cash -->Fraudulent and Disbursement -->Register Disbursements
  • Asset Misappropriation -->Inventory and All Other Assets -->Misuse 
  • Asset Misappropriation -->Inventory and All Other Assets -->Larceny

Health Insurance Portability and Accountability Act (HIPAA) Awareness

  • Course ID: CO00102
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about HITECH and HIPAA compliance
  • The Security Rule, The Privacy Rule, The Breach Notification Rule, Omnibus
  • Rule. Chapter 181, Texas Medical Records Privacy Act
  • Understand How Health Care Privacy Laws affect your organization
  • Understand HIPAA IT Security Risk Assessment
  • Learn about Administrative, Technical and Physical Safeguards
  • Learn about Covered Entities
  • Learn about Use and Disclosure of PHI
  • Understand How HIPAA and HITECH are Related
  • Learn about HITECH and Breach Notification

Incident Management Part I - Awareness

  • Course ID: CS00401
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Brief about Incident and Incident Management (IM)
  • Incident Management Objectives
  • What is a Security Incident Management?
  • Incident, Problem, and Service Request
  • Incident Management Key Concepts
  • Incident Management Process and ITIL
  • Incident Management Process Workflow Examples
  • Incident Management Process
  • Incident Management Process Steps Discussed in Detail

Incident Management Part II - Advanced

  • Course ID: CS00402
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Incident and Incident Management (IM)
  • Understand Critical Success Factors (CSF) 
  • Understand Key Performance Indicators (KPI) Specific to Incident Management
  • Understand Other Process Interfacing with Incident Management
  • Learn about ITIL Framework Based Incident Management Process Workflow
  • Implementing Incident Management - Detailed Guidance

Incident Management Part III - Cyber Security Incident Response Team (CSIRT)

  • Course ID: CS00403
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand how to use code of practice ISO 27002
  • Learn about ISMS mandatory processes and documentation
  • Learn about risk assessment, risk treatment plans, statement of applicability
  • Learn about ISO 27001 Annex A controls and requirements

Information Security and Privacy Awareness

  • Course ID: CS00101
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn How to Protect Information
  • Understand the Key Security Terms
  • Learn about Insider Risk
  • Learn about Privately Identifiable Information and Privately Healthcare Information
  • Learn about Physical Security, Facility Security and Clean Desk Policies
  • Learn about Social Engineering and Phishing
  • Learn about Acceptable Personal Use of Corporate Property and Email
  • Learn about Malicious Software and Incident Reporting
  • Learn about User Id and Password Protection
  • Understand Your Responsibility as a User

Information Technology General Controls (ITGC) Part I

  • Course ID: CS00701
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Study the Sarbanes-Oxley Act (SOX)
  • Learn about the COSO framework and its relationship with SOX
  • Learn about SOX and Corporate Governance requirements
  • Study the internal controls
  • Understand the relevance of IT controls for SOX compliance
  • Understand the fundamentals of ITGC
  • Study the types of IT controls
  • Study the general IT process controls and controls testing

Information Technology General Controls (ITGC) Part II - COSO Framework

  • Course ID: CS00702
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Information Technology General Controls (ITGCs) basics 
  • Study the IT and Risk Control Approach
  • Learn to evaluate IT General Controls
  • Learn about Auditing Security Administration Controls
  • Learn about Auditing Maintenance Controls
  • Learn about Auditing Computer Operations Controls
  • Learn about Auditing Systems Development Controls
  • Learn about Auditing Outsourced Services Controls
  • Study the Key Considerations for Effective SOX Testing

Information Technology General Controls (ITGC) Part III

  • Course ID: CS00703
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand IT Governance considerations in SOX compliance
  • Understand Activity/Process Level Considerations in General Control Issues
  • Learn about evaluating security administration controls
  • Understand the SOX requirement for:
  • Application change controls
  • Data Backup and Recovery
  • Systems Development Life Cycle (SDLC)
  • Outsourcing Financial Applications
  • Learn about the Role of Application and Data-Owner Processes
  • Understand the application level control considerations
  • Understand the process level control considerations

Malware Ransomware Awareness

  • Course ID: CS00105
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • How do you get malware?
  • What malware is and why it is dangerous
  • Become familiar with different types of malware and how users can identify them
  • How can you tell if you have a malware infection?
  • Understand how most malware requires human action to infect a computer
  • How to protect against malware?
  • How people can avoid malware and what to do (and not to do) if this ever happens

National Institute of Standards and Technology (NIST) Part I

  • Course ID: CS00501
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about CSF fundamentals
  • Learn how to develop a risk-based cybersecurity framework
  • Understand the CSF framework core and design
  • In-depth knowledge on how to use functions, categories, and subcategories
  • Use of risk management principles, best practices, and methodologies
  • Understand the CSF implementation tiers and implementation
  • Learn about framework profile implementation
  • Learn about improving resilience

National Institute of Standards and Technology (NIST) Part II

  • Course ID: CS00502
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about CSF fundamentals
  • Learn how to establish or improve your cybersecurity program
  • Understand the NIST CSF concept and how to implement with the help of case study
  • Understand the practical application of CSF framework’s core, design, functions, categories, and subcategories
  • Detailed knowledge of functions, categories, and subcategories along with
  • informative references from COBIT, ISA, NIST SP 800-53, CIS CSC, ISO 27001, etc.

Payment Card Industry (PCI) Awareness

  • Course ID: CO00201
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Need for PCI DSS training
  • PCI data security
  • Relationship between PCI DSS and PA DSS
  • PCI DSS scope
  • PCI DSS requirement explained with examples
  • Control costs and gain tangible, real-world insights on best practices
  • Understand PCI compliance before going through an assessment
  • Apply PCI DSS security principles across business

Privileged Access Management (PAM) Part I

  • Course ID: PA1
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Privileged Access Management Overview
  • Learn about privileges and how are they created, granted, etc.
  • Learn about privileged accounts
  • Understand the types of privileged accounts
  • Study the privileged service accounts
  • Learn about privilege related risks and challenges
  • Learn about privileged threat vectors – external and internal
  • Understand the benefits of privileged access management
  • Learn how hackers compromise the privileged accounts.
  • Study the privilege access management best practices

Privileged Access Management (PAM) Part II

  • Course ID: PA2
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about privileges and how are they created, granted, etc.
  • Learn about the capabilities of PAM software.
  • Study the PAM security controls.
  • Learn about the PAM solution partner considerations.
  • Study about the PAM baseline and ongoing Improvements.
  • Study the considerations for selection of PAM.
  • Learn hot to protect privileged accounts.

Privileged Access Management (PAM) Part III

  • Course ID: PA3
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • PAM as a Directive
  • Five Steps Toward a Successful PAM Implementation 
  • Governance
  • The Four Pillars of PAM
  • Pillar No. 1: Track and Secure Every Privileged Account
  • Pillar No. 2: Govern and Control Access
  • Pillar No. 3: Record and Audit Privileged Activity
  • Pillar No. 4: Operationalize Privileged Tasks
  • How PAM Is Implemented / Key Solutions

Problem Management Part I - Awareness

  • Course ID: CS00601
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand incident vs. problems
  • Understand quick fix and permanent problem resolution
  • Key definitions and basic concepts for problem management
  • Decide whether you need to implement problem control
  • Key process activities of the problem management process
  • Understand workarounds and solutions
  • Developing problem management policy
  • Learn about problem management process interfaces
  • Critical success factors and key performance indicators

Problem Management Part II - Advanced

  • Course ID: CS00602
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand basic concepts of problem management
  • Learn about the roles and responsibilities associated with the problem
  • management process
  • Understand the input that triggers the problem management process
  • Planning for problem management process implementation and training
  • Understand the problem management process implementation guide (step by step approach)
  • Understand process inputs and outputs
  • Learn about problem management reporting
  • Understand the problem management checklist
  • Understand the activities and documentation

Risk Assessment Awareness Part I

  • Course ID: RM00103
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Risk Identification – Learn to identify risk
  • Risk Assessment - How to assess risk?
  • Risk Analysis – How to analyze risk?
  • Controls – Learn to develop controls
  • Risk Treatment – How to treat risk?
  • Risk Management Elements – What are the risk management elements?
  • Risk Monitoring – How to monitor risk?
  • Risk Management Approach – Learn the process?
  • Issue Management Remediation

Security Framework Awareness

  • Course ID: CS00108
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Understand What is a Framework
  • Understand What is an Information Security Framework
  • Learn about Types of Security Frameworks
  • Learn about Compliance Regulations and Frameworks
  • Understand Factors Driving Security Frameworks
  • Learn about Various Security Frameworks - ISO, COBIT, NIST, ITIL, COSO, NERC, TY
  • CYBER, HITRUST, CSF
  • Understand the Business Benefits of Security Frameworks

Social Engineering & Phishing Part II - Advanced

  • Course ID: CS00104
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Ten Different Types of Phishing Attacks
  • Understand the Characteristics of Phishing Emails
  • Understand Common Methods of Phishing Attacks
  • Learn about Escalation and Containment
  • Learn about Eradication and Rebuilding
  • Learn about Recovery and Aftermath

Social Engineering & Phishing Part I - Awareness

  • Course ID: CS00103
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Learn about Social Engineering Attacks
  • Social engineering attack techniques
  • Steps in social engineering attack
  • Types of Social Engineering Attacks
  • Phishing attacks
  • Telltale signs of phishing attacks
  • Detection, Identification, and Tips to Keep You From Being Fooled
  • Spear Phishing• Detection telltale signs
  • Use cases and phihsing attack detection exercises

Vendor (Third Party) Risk Management Part I - Awareness

  • Course ID: RM00101
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What is vendor/third-party risk management (TPRM)?
  • What are third parties?
  • What are the common concerns of TPRM?
  • Why perform a third-party risk assessment?
  • What are the factors driving third-party risk assessment?
  • Why do I need a Third-party Risk Management Framework?
  • Why do I need a TPRM framework?

Vendor (Third Party) Risk Management Part II - Framework Development

  • Course ID: RM00102
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Why do Organizations need a TPRM framework?
  • What are the third-party risk categories and common third-party risks?
  • What are the Best Practices for a TPRM Framework?
  • What are the TPRM Framework Considerations?
  • How to build a TPRM framework?
  • How to implement a TPRM framework?
Copyrights © 2020 All Rights Reserved by SecuRetain.