Free online learning for government employees.

Enhancing the Security of Cloud-Native Tools and Apps
Digital innovation throughout agencies increasingly relies on cloud-native tools and app containers. This course reviews security challenges that arise with containers and in cloud-native environments, and opportunities for applying security in better ways.
This course was created in collaboration with Palo Alto Networks.
Related Videos
Apr-07-2025
Many federal agencies rely on outdated network infrastructure that is ill-equipped to handle the surge in bandwidth and securit...
How to Modernize the Network, Strengthen Security and Cut Costs
Mar-14-2025
Government agencies have a mandate to protect citizen data, but vulnerable code, faulty design and an insecure supply chain can...
The App Security Imperative: Closing the Cyber Gap
Aug-19-2024
Federal agencies spend a significant portion of their IT budgets just maintaining decaying legacy systems, rather than investin...
How to Navigate Technical Debt and Improve Agency Networks
Jul-16-2024
Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise,...
The Hidden Dangers: A Guide to Mobile Security Threats
Jul-03-2024
Hybrid work has put state and local government agencies in a fix: They need to strengthen security for hybrid workers but not a...
Secure the Hybrid Workplace Without Compromising Performance
May-29-2024
Agencies love how cloud makes it easy for any office or program team to spin up a new service whenever they need it. But that a...
Better Visibility, Better Budgeting: How to Manage Your Cloud Spend
Mar-04-2024
As agencies embark on their journey to zero trust, they'll find no lack of tools to help them on their way. The problem is that...
Deploying Zero Trust Network Access to Drive Improved Cybersecurity
Jul-31-2023
Despite new technologies and new policies, cyber criminals continue to find ways to infiltrate government networks.
That’s why...
Next-Level Network Security: How to Detect Hidden Threats
Oct-26-2022
Yes, a zero trust-based approach to cybersecurity is complicated. And yes, you need to understand what it is and why it's impor...
Why Zero Trust? Why Now?
Aug-15-2022
For employees who frequently work outside the office, the technology can be aggravating. Switching from one location to another...
How to Overcome the Common Stumbling Blocks to Hybrid Work
Dec-19-2024
State and local agencies and educational institutions face numerous challenges in responding to the threat landscape, including...
How State and Local Agencies Are Strengthening Their Cyber Posture
Dec-19-2024
Even as malicious actors grow more sophisticated and lethal, agencies continue to face significant obstacles in their efforts t...
State, Local Agencies Find Strength in Whole-of-State Cyber Strategy
Feb-11-2021
This course will discuss how federal agencies can leverage a secure access service edge (SASE) approach to maintain TIC 3.0 com...