Thank you for registering on CySkills! Choose a course below to start learning.
Cybersecurity Safeguards – Essential
This course covers the fundamentals of cybersecurity and how to safeguard against security breaches.
Information Systems Security for ISSOs
In this course, students will learn the ISSO role in the operational approach to implementing and managing effective cybersecurity processes in highly networked government and commercial enterprises; security management models, security program development, and risk assessment, mitigation and remediation techniques.
Creating a Risk-Based Budget for Cybersecurity
This course provides guidance on how to answer such questions as: how to I secure my organization with the current budget I have? How much money should I be budgeting for cybersecurity? If I want to move my organization to a greater level of cybersecurity, how much would that cost?
Protecting Your Organization from Insider Threats
This course equips students with information about various types of insider threats and approaches to protecting their organizations from such threats.
Handling Cybersecurity Breaches
This course describes cybersecurity incidents and breaches and provides an understanding how to respond in the event of a breach. Target Audience: Entrepreneurs, Small Business Owners, Executives, Aspiring Cybersecurity Professionals
Identifying the Right Cybersecurity Tools for Your Environment
This course provides guidance on identifying the right cybersecurity tools to use based upon the existing technology within the environment.
This course teaches common terminology used in cybersecurity and describes what constitutes the broad term “cybersecurity.”
Hiring Cybersecurity Professionals
This course provides insight into how to create position descriptions for cybersecurity roles, and how to identify candidates that meet the requirements for such roles.
Cybersecurity Risk Management for Federal Systems
This course provides a synopsis of the governance requirements associated with federal systems and the process for systems receiving an authorization to operate (ATO).
Becoming DFARS 252.204-7012/NIST 800-171 Compliant
Description: This course provides an overview of the Defense Federal Acquisition Regulations (DFARS) 252.204-7012 / National Institute of Standards and Technology (NIST) 800-171 compliance requirements and a process for becoming compliant.
Becoming a Cybersecurity Professional
This course provides information about possible cybersecurity work roles and the knowledge, skills, abilities and tasks associated with these work roles.
If you have any problems, please email us at email@example.com.