Free online learning for government employees.

All Aboard! 6 Stops on the Journey to Better Security
There's no getting around it: Malicious cyber actors see state and local agencies as prime targets -- both because they manage so much sensitive information (i.e., ripe for ransomware attacks) and because they often and because they generally don't have enough cyber resources. But don't give up hope! In this video, we will review six tactics that can help your agency strengthen its cyber posture.
Related Videos
Apr-07-2025
Many federal agencies rely on outdated network infrastructure that is ill-equipped to handle the surge in bandwidth and securit...
How to Modernize the Network, Strengthen Security and Cut Costs
Mar-14-2025
Government agencies have a mandate to protect citizen data, but vulnerable code, faulty design and an insecure supply chain can...
The App Security Imperative: Closing the Cyber Gap
Jul-16-2024
Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise,...
The Hidden Dangers: A Guide to Mobile Security Threats
Jul-03-2024
Hybrid work has put state and local government agencies in a fix: They need to strengthen security for hybrid workers but not a...
Secure the Hybrid Workplace Without Compromising Performance
Mar-04-2024
As agencies embark on their journey to zero trust, they'll find no lack of tools to help them on their way. The problem is that...
Deploying Zero Trust Network Access to Drive Improved Cybersecurity
Jul-31-2023
Despite new technologies and new policies, cyber criminals continue to find ways to infiltrate government networks.
That’s why...
Next-Level Network Security: How to Detect Hidden Threats
Oct-26-2022
Yes, a zero trust-based approach to cybersecurity is complicated. And yes, you need to understand what it is and why it's impor...
Why Zero Trust? Why Now?
Aug-05-2022
Trying to figure out what exactly is in your cloud environment can be a bit like trying to get through a maze while blindfolded...
Best Practices for Hardening Cloud Security
Jan-21-2022
No one likes to think about it, but every time an employee uses a mobile device to access an agency's network, they might be op...
5 Steps for Stopping Mobile Threats Before Damage Is Done
Dec-28-2021
Today's network operations no longer follow the old rules where everything that was enclosed within the network boundaries was ...
Embracing the Zero Trust Framework
Apr-11-2025
Between return-to-office mandates and an evolving threat landscape, network and security modernization initiatives have taken o...
New Modernization Priorities Put Focus on Converged Solutions
Apr-11-2025
For years, many federal agencies have looked at networking and cybersecurity as separate functions. But that approach has run i...
How to Bring Greater Efficiency to Network and Cyber Operations
Dec-08-2021
It's not easy to hear, but every employee -- yes, every one of us -- is a potential weak link in our organization's cyber defen...
How to Spot and Handle a Phishing Attempt
May-14-2021
It’s safe to assume that most of us don’t like to fail. But we live in an imperfect – and often surprising – world, where failu...
Uh-Oh: Leadership Strategies for Plans Gone Awry
Feb-18-2021
By 2018, IT leaders at an independent federal agency had had enough. With offices and workplaces spread across the country, age...