Free online learning for government employees.

Strengthening Application Login Security With Data Analytics
This course will discuss how government agencies are challenged with keeping nefarious users out of their protected applications, and how a new approach to multi-factor authentication significantly increases security.
Related Videos
Oct-26-2022
Yes, a zero trust-based approach to cybersecurity is complicated. And yes, you need to understand what it is and why it's impor...
Why Zero Trust? Why Now?
Aug-05-2022
Trying to figure out what exactly is in your cloud environment can be a bit like trying to get through a maze while blindfolded...
Best Practices for Hardening Cloud Security
Mar-31-2022
There's no getting around it: Malicious cyber actors see state and local agencies as prime targets -- both because they manage ...
All Aboard! 6 Stops on the Journey to Better Security
Jan-21-2022
No one likes to think about it, but every time an employee uses a mobile device to access an agency's network, they might be op...
5 Steps for Stopping Mobile Threats Before Damage Is Done
Dec-28-2021
Today's network operations no longer follow the old rules where everything that was enclosed within the network boundaries was ...
Embracing the Zero Trust Framework
Dec-08-2021
It's not easy to hear, but every employee -- yes, every one of us -- is a potential weak link in our organization's cyber defen...
How to Spot and Handle a Phishing Attempt
Nov-24-2021
A mobile device can be a convenient and necessary communications tool as well as a missile heading for your critical data. Find...
Enabling Zero Trust for Your Mobile Devices
Oct-19-2021
The adoption of hybrid cloud is becoming the norm for government IT operations. Unfortunately, ransomware and other cyber threa...
Your Playbook for Protecting Against Cyberattacks
Oct-06-2021
Everyone understands that identity and access management -- that is, knowing who is accessing your network and what they have p...
How Machine Identity Management Makes Your Network More Secure
Sep-22-2021
Mobile security means more than device security. In fact, one of the biggest vulnerabilities is often overlooked: App security....