- 
		This item contains several different items. Purchasing this item includes all of the component items listed below. 
Identity and Access Management: Advice and Best Practices
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			One of the more complex and challenging IT security issues for organizations today is authenticating user identity and managing access to business-critical networks, data and applications. Identity and Access Management, or IAM for short, has evolved at a rapid pace, spurred on by the rise of Cloud ... read more
			
				
	
	
	
	
	
	
Interactive course with lessons, pre-test, and post-test
			
			
		Portability: A Key IT Security Requirement
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			With cyber threats evolving and the technology landscape changing so quickly it’s critically important that an organization’s information security be not only resilient, but also portable, in order to offer the maximum protection possible. In this program, we’ll discuss the concept of portability, a... read more
			
				
	
	
	
	
	
	
Interactive course with lessons, pre-test, and post-test
			
			
		Cyber Risks & Trends You Must Be Aware Of!
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			Cybersecurity has escalated to one of the most critical issues facing the world today. It seems as though not a day goes by when we’re not hearing about another cyberattack, data breach, hack or scam. So, what can be done to defend against this cyber-onslaught? Well, one step that can be taken to he... read more
			
				
	
	
	
	
	
	
Interactive course with lessons, pre-test, and post-test
			
			
		Cyberattacks: Trends, Threats and Prevention
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			The numbers have been tallied and just as expected, it was another record-breaking year for cyberattacks and breaches. In fact, the organization, Online Trust Alliance reports that “cyber incidents targeting businesses nearly doubled from 82,000 in 2016 to 159,700 in 2017, thanks to ransomware and o... read more
			
				
	
	
	
	
	
	
Interactive course with lessons, pre-test, and post-test
			
			
		Top 5 Enterprise Security Projects
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			How big of a problem is identity theft today? Just listen to these startling statistics. According to an online Harris Poll, some sixty million people have now become victims of identity theft here in the U.S., with fifteen-million of these thefts occurring in just this past year. In this report, ex... read more
			
				
	
	
	
	
	
	
Interactive course with lessons, pre-test, and post-test
			
			
		Your Email is Out to Get You  How did this happen?
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			Malicious email is one of the leading security risks for enterprises today. Email attacks can cause a loss of business, damage corporate reputations and reduce customer confidence. Then, there are the fines and legal fees that follow when customer information or financial data is breached. Combating... read more
			
				
	
	
	
	
	
	
Interactive course with lessons, pre-test, and post-test
			
			
		Strategies and Best Proactices For Securing a Multi-Cloud Architecture
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			
			Over the course of the past decade, Cloud Computing has evolved with lightning speed and has become an indispensable part of our day to day computing lives. Can you even imagine a world without the Cloud! Today Cloud innovation and evolution marches on, with more and more organizations now adopting ... read more
			
				
	
	
	
	
	
	
Interactive course with lessons, pre-test, and post-test
			
			
		