Free online learning for government employees.

Cloud Security: Defending a Pillar of IT Modernization
The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics just won’t cut it.
In this brief course, you’ll explore the strategies, policies and technologies agencies need in place to prevent attacks in the modern era of cloud security.
This course was created in collaboration with Swish and Check Point.
For more information, please visit https://swishdata.com/ and https://www.checkpoint.com/
Related Videos
Mar-31-2022
There's no getting around it: Malicious cyber actors see state and local agencies as prime targets -- both because they manage ...
All Aboard! 6 Stops on the Journey to Better Security
Mar-09-2022
No, headaches do not have to be part of the package when managing Microsoft 365, but it's understandable if it seems that way. ...
It’s All Under Control: Best Practices for Managing Large-Scale Microsoft 365 Implementations
Feb-24-2022
Did you know only three out of 10 IT projects succeed today? The common culprit: a cookie-cutter approach to modernizing applic...
Top 10 Digital Transformation Considerations for Your Journey
Jan-21-2022
No one likes to think about it, but every time an employee uses a mobile device to access an agency's network, they might be op...
5 Steps for Stopping Mobile Threats Before Damage Is Done
Dec-28-2021
Today's network operations no longer follow the old rules where everything that was enclosed within the network boundaries was ...
Embracing the Zero Trust Framework
Dec-08-2021
It's not easy to hear, but every employee -- yes, every one of us -- is a potential weak link in our organization's cyber defen...
How to Spot and Handle a Phishing Attempt
Nov-24-2021
A mobile device can be a convenient and necessary communications tool as well as a missile heading for your critical data. Find...
Enabling Zero Trust for Your Mobile Devices
Nov-16-2021
Agencies need to get creative. They need to find new ways to connect with constituents, reduce backlogs and meet new demands fo...
Backlogs, Be Gone: Case Studies in Contact Center Transformation
Oct-19-2021
The adoption of hybrid cloud is becoming the norm for government IT operations. Unfortunately, ransomware and other cyber threa...
Your Playbook for Protecting Against Cyberattacks
Oct-06-2021
Everyone understands that identity and access management -- that is, knowing who is accessing your network and what they have p...
How Machine Identity Management Makes Your Network More Secure
Jan-06-2021
Web application security is too frequently handled by external controls and legacy tools not designed for securing more modern ...
Timing Is Everything for Web Application Security
Dec-22-2020
It's critically important for agencies to not only continually provide services in the face of unplanned emergencies, but to op...
Building Resilience Into Your Agency
Dec-09-2020
Containerization is rapidly changing how agencies develop software, providing a way to build applications that can move easily ...
Containerization: Don’t Get Blindsided by Hidden Security Threats
Dec-02-2020
In cybersecurity, do more solutions make for a merrier defense? Not necessarily. Too many tools can actually lead to infighting...
How to Unlock the Hidden Value of Your Cyber Defenses
Nov-18-2020
There’s good reason why ransomware and other types of malware continue to plague organizations: Cybercriminals keep coming up w...
How to Strengthen Cybersecurity (Beyond Buying New Tools)
Sep-15-2020
With cyberattacks, the last thing you want is one that spreads. But working with a variety of viruses and techniques, cyberatta...
The Need for Speed in Detecting and Responding to Cyberthreats
Jul-02-2020
Modern methodologies have accelerated the process of software development, but often at the cost of security. In fact, a recent...
How to Address Security Vulnerabilities in the Development Lifecycle
Jun-08-2020
In this course, you’ll learn how productivity and security go hand in hand in the remote environment. You’ll hear five best pra...
5 Strategies to Enhance Security for Productivity While Remote
Mar-27-2020
If you haven’t heard of ransomware yet, you will. Ransomware is more than just malicious software – it’s a dangerous cyberthrea...
Federal Ransomware: A Rising Threat
Mar-26-2020
The Continuous Diagnostics and Mitigation, managed by the Department of Homeland Security, is the cornerstone of the federal go...
Manage Cybersecurity Threats with the CDM Dashboard Ecosystem
Mar-13-2020
By taking this course, you will be enrolled in five lessons about DDoS attacks and how to prevent them. We will explore what DD...
Introduction to DDoS Attacks
Mar-12-2020
Information security may very well be the defining challenge of this era of government. How will government meet security deman...
Cybersecurity Crash Course
Mar-12-2020
In this six-lesson course, we’ll examine the components of an effective security strategy that addresses all necessary systems....
How to Build Connected Security
Mar-12-2020
The accelerated pace of modernization and innovation in the government IT enterprise has produced a wealth of new capabilities ...
Managing Risk in Today's Digital World
Mar-12-2020
As cyberattacks become more sophisticated, government agencies at all levels need to ensure that they’re following best practic...