Course Category: Paid

Blockchain 101

Blockchain 101

Title: Blockchain 101 Description:  This course covers the purpose, use, and components of blockchain. It also presents an overview of the evolution of blockchain through first, second, and third generation, and a glimpse into the future of blockchain. Outline and Duration: Total Time Commitment: 38 minutes Lesson 01 – Blockchain Components – 5 minutes Lesson …

Blockchain 101 Read More »

Blockchain image

Introduction to Philos Marketplace™

Title: Introduction to Philos Marketplace™ Description:  This course covers the components of the Philos Marketplace™ blockchain and the interactions of blockchains. Students will compare other blockchains to Philos Marketplace™ blockchains as well as identify the components of the consensus model and the steps of the incentive model.   Outline and Duration: Lesson 1 – First …

Introduction to Philos Marketplace™ Read More »

Protecting your organization from insider threats

Protecting Your Organization from Insider Threats

Title: Protecting Your Organization from Insider Threats Description: This course equips students with information about various types of insider threats and approaches to protecting their organizations from such threats. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes …

Protecting Your Organization from Insider Threats Read More »

Identifying the Right Cybersecurity Tools for Your Environment

Identifying the Right Cybersecurity Tools for Your Environment

Title: Identifying the Right Cybersecurity Tools for Your Environment Description: This course provides guidance on identifying the right cybersecurity tools to use based upon the existing technology within the environment. Target Audience: Entrepreneurs, Small Business Owners, Executives, Purchasing staff, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview …

Identifying the Right Cybersecurity Tools for Your Environment Read More »

Cybersecurity Risk Management for Federal sytems

Cybersecurity Risk Management for Federal Systems

Title:  Cybersecurity Risk Management for Federal Systems Description:  This course provides a synopsis of the governance requirements associated with federal systems and the process for systems receiving an authorization to operate (ATO). Target Audience: Federal Government and Contractor Executives, Managers, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 1 hour Instructor Background and Course …

Cybersecurity Risk Management for Federal Systems Read More »

Hiring Cybersecurity Professionals

Hiring Cybersecurity Professionals

Title:  Hiring Cybersecurity Professionals Description:  This course provides insight into how to create position descriptions for cybersecurity roles, and how to identify candidates that meet the requirements for such roles. Target Audience: Hiring Managers, Human Resource Professionals Outline and Duration: Total time commitment: 45 minutes Instructor Background and Course Overview – 2 minutes Cybersecurity Workforce …

Hiring Cybersecurity Professionals Read More »

Becoming DFARS 252.204-7012/NIST 800-171 Compliant

Becoming DFARS 252.204-7012/NIST 800-171 Compliant

Title:  Becoming DFARS 252.204-7012/NIST 800-171 Compliant Description:  This course provides an overview of the Defense Federal Acquisition Regulations (DFARS) 252.204-7012 / National Institute of Standards and Technology (NIST) 800-171 compliance requirements and a process for becoming compliant. Target Audience: Defense Industrial Base (DIB) company owners, operators, and staff Outline and Duration: Total time commitment: 1 …

Becoming DFARS 252.204-7012/NIST 800-171 Compliant Read More »