IT Professionals Cyber-Security Awareness Course (2018)

IT Professionals Cyber-Security Awareness Course (2018)

 

privileged root and administrator access comes with responsibilities

 

This is a role-based course designed specifically for IT professionals.

  • Developers
  • System administrators
  • Networking gurus
  • Database administrators
  • Testers
  • Systems engineers
  • Other privileged admin users

 

We cover topics relevant to IT professionals.

 

While still using easy to understand language, we discuss scenarios and security countermeasures that administrators can use in their day-to-day jobs.

Scenarios and examples are throughout the course. Role-specific security awareness program
 

Actionable information which will improve day-to-day security and the quality of your products:

  • Systems design to reduce network threats
  • The 4 biggest security threats to enterprises in 2018
  • Special compliance requirements for protected data
  • Security in the Systems Development Life Cycle
    • What security features should be included in your requirements?
    • When decommissioning a system, what security mistake do IT departments make?
    • 3 ways to improve security in your product during the testing phase
  • 7 best practices for keeping your privileged accounts safe
  • Conduct guidelines for IT pros - with great power comes great responsibility!

 

Online and web-based training course discusses code of conduct for developers and admins

 

Written by IT professionals, for IT professionals.   We've made (and learned from) mistakes so that you don't have to.

 

This online course covers credentials and monitoring access to systems
Real world examples of security problems with code and design
Software life-cycle tips for reducing risk and avoiding security problems

About this course

  • The 2018 IT Professionals Cyber-Security Awareness course is 30 minutes long and includes stories and examples about security challenges that IT professionals face in the real world. 
  • End of chapter quizzes increase learning retention and the final test ensures that your staff understand the key concepts.
  • We can package the course for you to host internally on your LMS or we can host the course for you.
  • Contact information for your organization's security department is customized.  We can also customize other sections if requested - for example, to add information about specific processes within your organization.

5 reasons we are different

  • Our courses are FUN and ENGAGING!  Seriously, they are!  Ask to view a demo if you want to see for yourself.

  • Your users will watch the courses from start to finish.  Because we use fast paced animation and few pauses, students don't have time to get distracted.  

  • Each year, we research industry trends and the latest threats.  This means our courses evolve over time.  We don't endlessly repeat the same information.

  • We will customize our courses for YOUR workplace.  A key part of security awareness is knowing how to get help.  We put specific contact information for your security manager, IT department, or compliance officer into the body of the course. 

  • We are proven educators!  Native Intelligence security awareness materials have received multiple awards from the Federal Information System Security Educators Association (FISSEA), which is organized by NIST.

 

Our security awareness training courses are SCORM-compliant. 

Sharable Content Object Reference Model (SCORM) is a set of technical standards for eLearning software products, such as online courses and Learning Management Systems (LMSs). SCORM tells programmers how to write their code so that it can be used with other eLearning software. SCORM ensures that online learning content and LMSs communicate with each other.  SCORM also defines how content (courses) may be packaged into a transferable ZIP file. 

Basically, SCORM compliance means that our courses will work on any popular LMS.

 

Our Federal Government courses are Section 508-compliant

Section 508 was made part of the Rehabilitation Act of 1973 in 1998. Its purpose is to require Federal agencies to make their electronic and information technology (EIT) accessible to people with disabilities.

508 compliance means that our courses are designed to be audio friendly for learners with hearing impairments AND vision friendly for disabled or colorblind learners.

Incorporating NIST SP 800-50 and SP 800-16 best practices

The two publications are complementary – SP 800-50 works at a higher strategic level, discussing how to build an IT security awareness and training program, while SP 800-16 is at a lower tactical level, describing an approach to role-based IT security training.

Our courses cover topics and use techniques described in SP 800-50 and 800-16 so that you don't need to reinvent the wheel.

 

Are you working on FISMA compliance for your 2019 federal training program? 

The Federal Information Security Management Act (FISMA) is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program. 

If you're building a training program, you should demo our courses, ask for sample newsletters, or read through our more in-depth educational material.  Please let us know what you are interested in - we love to share what we've been working on!  

Native Intelligence has been providing security awareness courses and role-based training to the government and private sector for more than twenty years.