Archives: Courses

Blockchain 101

Blockchain 101

Title: Blockchain 101 Description:  This course covers the purpose, use, and components of blockchain. It also presents an overview of the evolution of blockchain through first, second, and third generation, and a glimpse into the future of blockchain. Outline and Duration: Total Time Commitment: 38 minutes Lesson 01 – Blockchain Components – 5 minutes Lesson …

Blockchain 101 Read More »

Blockchain image

Introduction to Philos Marketplace™

Title: Introduction to Philos Marketplace™ Description:  This course covers the components of the Philos Marketplace™ blockchain and the interactions of blockchains. Students will compare other blockchains to Philos Marketplace™ blockchains as well as identify the components of the consensus model and the steps of the incentive model.   Outline and Duration: Lesson 1 – First …

Introduction to Philos Marketplace™ Read More »

Becoming A Cybersecurity Professional

Becoming a Cybersecurity Professional

Title: Becoming a Cybersecurity Professional Description:  This course provides information about possible cybersecurity work roles and the knowledge, skills, abilities and tasks associated with these work roles. Target Audience: Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 45 minutes Instructor Background and Course Overview – 2 minutes Cybersecurity Work Roles, Knowledge, Skills, Abilities, & …

Becoming a Cybersecurity Professional Read More »

Protecting your organization from insider threats

Protecting Your Organization from Insider Threats

Title: Protecting Your Organization from Insider Threats Description: This course equips students with information about various types of insider threats and approaches to protecting their organizations from such threats. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes …

Protecting Your Organization from Insider Threats Read More »

Handling Cybersecurity Breaches

Handling Cybersecurity Breaches

Title: Handling Cybersecurity Breaches Description: This course describes cybersecurity incidents and breaches and provides an understanding of how to respond in the event of a breach. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview – 2 minutes Incident Response Process …

Handling Cybersecurity Breaches Read More »

Identifying the Right Cybersecurity Tools for Your Environment

Identifying the Right Cybersecurity Tools for Your Environment

Title: Identifying the Right Cybersecurity Tools for Your Environment Description: This course provides guidance on identifying the right cybersecurity tools to use based upon the existing technology within the environment. Target Audience: Entrepreneurs, Small Business Owners, Executives, Purchasing staff, Aspiring Cybersecurity Professionals Total time commitment: 45 minutes Outline and Duration: Instructor Background and Course Overview …

Identifying the Right Cybersecurity Tools for Your Environment Read More »

cybersecurity 101

Cybersecurity 101

Title:  Cybersecurity 101 Description:  This course teaches common terminology used in cybersecurity and describes what constitutes the broad term “cybersecurity.” Target Audience:  Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 45 min Instructor Background and Course Overview – 2 minutes The CIA Triad  – 15 minutes Learning Resources – …

Cybersecurity 101 Read More »

Cybersecurity Risk Management for Federal sytems

Cybersecurity Risk Management for Federal Systems

Title:  Cybersecurity Risk Management for Federal Systems Description:  This course provides a synopsis of the governance requirements associated with federal systems and the process for systems receiving an authorization to operate (ATO). Target Audience: Federal Government and Contractor Executives, Managers, Aspiring Cybersecurity Professionals Outline and Duration: Total time commitment: 1 hour Instructor Background and Course …

Cybersecurity Risk Management for Federal Systems Read More »

Hiring Cybersecurity Professionals

Hiring Cybersecurity Professionals

Title:  Hiring Cybersecurity Professionals Description:  This course provides insight into how to create position descriptions for cybersecurity roles, and how to identify candidates that meet the requirements for such roles. Target Audience: Hiring Managers, Human Resource Professionals Outline and Duration: Total time commitment: 45 minutes Instructor Background and Course Overview – 2 minutes Cybersecurity Workforce …

Hiring Cybersecurity Professionals Read More »

Becoming DFARS 252.204-7012/NIST 800-171 Compliant

Becoming DFARS 252.204-7012/NIST 800-171 Compliant

Title:  Becoming DFARS 252.204-7012/NIST 800-171 Compliant Description:  This course provides an overview of the Defense Federal Acquisition Regulations (DFARS) 252.204-7012 / National Institute of Standards and Technology (NIST) 800-171 compliance requirements and a process for becoming compliant. Target Audience: Defense Industrial Base (DIB) company owners, operators, and staff Outline and Duration: Total time commitment: 1 …

Becoming DFARS 252.204-7012/NIST 800-171 Compliant Read More »