-
This item contains several different items. Purchasing this item includes all of the component items listed below.
Identity and Access Management: Advice and Best Practices
One of the more complex and challenging IT security issues for organizations today is authenticating user identity and managing access to business-critical networks, data and applications. Identity and Access Management, or IAM for short, has evolved at a rapid pace, spurred on by the rise of Cloud ... read more
Interactive course with lessons, pre-test, and post-test
Portability: A Key IT Security Requirement
With cyber threats evolving and the technology landscape changing so quickly it’s critically important that an organization’s information security be not only resilient, but also portable, in order to offer the maximum protection possible. In this program, we’ll discuss the concept of portability, a... read more
Interactive course with lessons, pre-test, and post-test
Cyber Risks & Trends You Must Be Aware Of!
Cybersecurity has escalated to one of the most critical issues facing the world today. It seems as though not a day goes by when we’re not hearing about another cyberattack, data breach, hack or scam. So, what can be done to defend against this cyber-onslaught? Well, one step that can be taken to he... read more
Interactive course with lessons, pre-test, and post-test
Cyberattacks: Trends, Threats and Prevention
The numbers have been tallied and just as expected, it was another record-breaking year for cyberattacks and breaches. In fact, the organization, Online Trust Alliance reports that “cyber incidents targeting businesses nearly doubled from 82,000 in 2016 to 159,700 in 2017, thanks to ransomware and o... read more
Interactive course with lessons, pre-test, and post-test
Top 5 Enterprise Security Projects
How big of a problem is identity theft today? Just listen to these startling statistics. According to an online Harris Poll, some sixty million people have now become victims of identity theft here in the U.S., with fifteen-million of these thefts occurring in just this past year. In this report, ex... read more
Interactive course with lessons, pre-test, and post-test
Your Email is Out to Get You How did this happen?
Malicious email is one of the leading security risks for enterprises today. Email attacks can cause a loss of business, damage corporate reputations and reduce customer confidence. Then, there are the fines and legal fees that follow when customer information or financial data is breached. Combating... read more
Interactive course with lessons, pre-test, and post-test
Strategies and Best Proactices For Securing a Multi-Cloud Architecture
Over the course of the past decade, Cloud Computing has evolved with lightning speed and has become an indispensable part of our day to day computing lives. Can you even imagine a world without the Cloud! Today Cloud innovation and evolution marches on, with more and more organizations now adopting ... read more
Interactive course with lessons, pre-test, and post-test