General Cybersecurity courses that are not linked to a specific LevelBlue product.

This course will be updated regularly with threat Intelligence news and noteworthy items to help prevent and fight cybersecurity threats targeting your  organization.

Audience: This material is targeted at cybersecurity professionals and IT professionals who wish to keep current on all the latest threats.

This course will be updated regularly with threat Intelligence news and noteworthy items to help prevent and fight cybersecurity threats targeting your  organization.

Audience: This material is targeted at cybersecurity professionals and IT professionals who wish to keep current on all the latest threats.

Are you just starting out with IT Security, trying to become familiar with some of the core terms? Well if the concepts and terminology surrounding security are “alien” to you this course may help provide some of the information you need.

This material is not a replacement for a full Information Security course and is provided as a value add to students that have an IT background but may not be familiar with IT Security.

Audience: Everyone

Topics:

  • Look at the reasons attackers attempt to exploit networks and systems.
  • Review some of the most common system vulnerabilities.
  • Examine the methods by which attacks are delivered.
  • Consider attack types and how they are implemented at a high level.

Course Duration: 65 Minutes

This will focus on effectively managing the security and compliance of public cloud deployments.

Audience: Anyone who works in a organization responsible for deploying and maintaining cloud environments.

Topics

  • Real World Risks
  • Cloud Security Basics

Course Duration: 10 Minutes

This course reviews how a ransomware attack can happen, what to be aware of and how to prepare so you are ready in the event of an attack.

Audience: Anyone interested in how ransomware attacks occur in an organization

Topics

  • How Threat Actors target organizations.
  • How a foothold is gained and data is exfiltrated.
  • Steps to follow in the event of a ransomware attack.
  • How to be prepared for a ransomware attack.

Course Duration: 40 Minutes