The following courses are offered through an associate company:
Download the pdf of the course to get more information on each course.
Information Security Awareness (pdf)
User Awareness Training is critical to the proper dissemination of an Information Security Policy. The most comprehensive Information Security Policy can be defeated by a single end-user mistake. Organizations today have already invested in computer security technologies such as firewalls and intrusion detection systems, yet the most significant security risk remains the human factor, which is often seen as being too difficult a challenge to address. This e-learning solution makes addressing the issue of security awareness fast, on time and effective. This course will provide employees and contractors with an overview of information security issues and increase general security awareness.
Payment Card Information (“PCI”) Awareness
The protection of credit card information is regulated by the Payment Card Industry (PCI) Data Security Standard
(DSS). Section 12.6 of the PCI Standard requires us to implement a formal security awareness program to make all employees aware of the importance of cardholder data security. This training program is designed to meet this requirement.
NERC CIP Standards Training (pdf)
NERC CIP Standard CIP-004-1 R2 requires that personnel having authorized cyber access or unescorted physical access to critical cyber assets must have annual cyber security training that addresses policies, access controls, and procedures appropriate to personnel roles and responsibilities. This course address these issues as well as best practices as it relates to computer usage in a utility company environment.
Chemical Terrorism Vulnerability Information (CVI) Training
This training provides an overview of a sensitive, but unclassified designation titled “Chemical-terrorism Vulnerability Information” (CVI). It defines what CVI is, what information is no CVI, who is subject to this regulation, access and disclosure of CVI, safeguarding CVI and reporting potential CVI violations.
Information Security Management (pdf)
This course is designed to help mangers understand the risks associated with the organization’s information infrastructure. It also highlights the importance of an Information Security Policy, including the enforcement of the policy. In addition to identifying security management protocols, it also addresses risk management and breach management principles.
Physical Security Training (pdf)
Physical Security refers to the protection of buildings sites, personnel, equipment, information and software
contained within from theft, vandalism, natural and man-made disasters and accidental damages. The uncertainties and demands of modern society have transformed the physical security profession. Organizations and businesses need physical security practitioners to handle a wide variety of challenges, from access control to threat analysis. The training program allows you to pinpoint the areas of knowledge you need to stay on top of the physical security field. The program covers essential aspects of physical security assessment, selection of integrated physical security measures, and implementation of physical security measures.
Incident Response and Computer Forensics (pdf)
This course will take the security practitioner and investigator through each of the areas of incident response,
computer crime investigation and computer forensics, so that they are better prepared to respond to both internal and external attacks. This includes a detailed description of the following topics: the law, digital evidence, technology primer for investigators, incident response planning, preliminary investigation, breach notification requirements, search and seizure, computer forensics, forensic challenges, network forensics, and legal proceedings. This course is design for law enforcement personal, information security practitioners and anyone that has to handle, collect, preserve and analyze digital evidence.
Secure Coding Practices (pdf)
The purpose of this course is to help software developers improve the security of web-based application software.
The content of this course is based upon the OWASP guidelines and addresses best coding practices as it relates to the protection against SQL Injection, Cross Site scripting, buffer overflow attacks and more. It also addresses techniques for proper authentication, access control, session management and data validation.
Identity Theft Training
This course is designed to educate the learner on the risks and threats associated with Identity Theft, Phishing and
Social Engineering. This is a 15-minute primer that describes the methods used by an attacker and the prevention techniques that you can use to avoid becoming a victim of ID Theft.
Red Flag Rule (pdf)
This course is designed to educate the learner on the risks and threats associated with with the Red Flag Rule and
addresses all of the topics in the Identity Theft course, in greater detail.
Internet Safety (Parents Edition) (pdf)
This course is designed to assist parents in protecting their children from Internet-related threats. This safety course
will help the parent to monitor their child’s on-line activities, as well as describing ways to block certain types of content and deploying safe computing practices.
Internet Safety (Kids Edition) (pdf)
This course is designed to help children understand the dangers of the Internet. It uses animated characters to
present important topics in a non-frightening way. The course covers issues of on-line predators, chat, piracy, Internet bullying, etc.
Pandemics and the H1N1 Flu
This course is designed to help the public understand what a pandemic is, what the H1N1 flu is, how to protect
themselves and their family from this lethal threat. It helps them to stay informed and stay healthy.