Cybersecurity Foundations
Cybersecurity Foundations, Certified by the Texas Department of Information Resources (DIR)—FY 21-22 (#125).
This is a foundation-level course for individuals looking to get up to speed on Cybersecurity. For compliance reasons, as well as to get a general idea of the concepts, practices, and tools involved in practicing Cybersecurity, this course is an ideal starting point for you.
This cybersecurity training program focuses on forming information security habits and procedures that protect information resources; and teaches best practices for detecting, assessing, reporting, and addressing information security threats.
Compelling value propositions
In addition to the really well-structured yet not-too-overwhelming content structure, this course aims to alleviate some of the most common issues encountered in taking up online self-paced courses by
a) leveraging our pool of subject matter experts and instructors to answer every course-related question within one business day, and
b) committing to a course update frequency of at least 1 update every six months.
Please also note that this is a Texas Department of Information Resources (DIR) certified course – FY 21-22 (#125). This basically means that if you are a Texas state and local government employee or contractor and Section 2054.5191 requires you to complete a certified training program, this course will help you fulfill that requirement.
***Important note***
As of date, this course is available for free registrations with a limited amount of content available. The intention here is to solicit feedback from users to ensure that we do not leave anything out that impacts the learners’ experience. Free registrations will stop soon – we will add the remaining content then and make it a paid course. However, anyone who registers during this free preview phase will retain access to the full course as a gesture of appreciation for helping us with their review and feedback.
Course coverage
This course covers the basics of Cybersecurity as applied in an enterprise setting. Among other things, it aims to make you cognizant of the following
- Best practices for cyber hygiene.
- Best practices for back-ups, including types, locations, frequency, testing, and protection.
- The Traffic Light Protocol (TLP) levels and how to follow TLP sharing guidance.
Included in the course
- 1 business day’s turn-around-time to resolve all your queries by our experts
- Updates to our course content every 6 months
- 2+ hours of video lectures
- A set of 50 questions to help you assess your knowledge gained from the course
- A downloadable slide deck