Free online learning for government employees.
Enhancing the Security of Cloud-Native Tools and Apps
Digital innovation throughout agencies increasingly relies on cloud-native tools and app containers. This course reviews security challenges that arise with containers and in cloud-native environments, and opportunities for applying security in better ways.
This course was created in collaboration with Palo Alto Networks.
Related Videos
Mar-04-2024
As agencies embark on their journey to zero trust, they'll find no lack of tools to help them on their way. The problem is that...
Deploying Zero Trust Network Access to Drive Improved Cybersecurity
Jul-31-2023
Next-Level Network Security: How to Detect Hidden Threats
Oct-26-2022
Yes, a zero trust-based approach to cybersecurity is complicated. And yes, you need to understand what it is and why it's impor...
Why Zero Trust? Why Now?
Aug-15-2022
For employees who frequently work outside the office, the technology can be aggravating. Switching from one location to another...
How to Overcome the Common Stumbling Blocks to Hybrid Work
Aug-05-2022
Trying to figure out what exactly is in your cloud environment can be a bit like trying to get through a maze while blindfolded...
Best Practices for Hardening Cloud Security
Mar-31-2022
There's no getting around it: Malicious cyber actors see state and local agencies as prime targets -- both because they manage ...
All Aboard! 6 Stops on the Journey to Better Security
Feb-11-2022
If you're nervous about moving mission-critical apps to the public cloud, you're not alone. And if your on-premises operations ...
How One Agency Transformed Vital Operations Without Losing Its Mind
Feb-02-2022
The idea of a hybrid cloud environment, integrating cloud and on-premises systems, looks great on paper but often seems dauntin...
Removing Roadblocks to a Hybrid Cloud Deployment
Jan-21-2022
No one likes to think about it, but every time an employee uses a mobile device to access an agency's network, they might be op...
5 Steps for Stopping Mobile Threats Before Damage Is Done
Dec-28-2021
Today's network operations no longer follow the old rules where everything that was enclosed within the network boundaries was ...
Embracing the Zero Trust Framework
Feb-11-2021
This course will discuss how federal agencies can leverage a secure access service edge (SASE) approach to maintain TIC 3.0 com...