Free online learning for government employees.
Enhancing the Security of Cloud-Native Tools and Apps
Digital innovation throughout agencies increasingly relies on cloud-native tools and app containers. This course reviews security challenges that arise with containers and in cloud-native environments, and opportunities for applying security in better ways.
This course was created in collaboration with Palo Alto Networks.
Related Videos
Aug-19-2024
Federal agencies spend a significant portion of their IT budgets just maintaining decaying legacy systems, rather than investin...
How to Navigate Technical Debt and Improve Agency Networks
Jul-16-2024
Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise,...
The Hidden Dangers: A Guide to Mobile Security Threats
Jul-03-2024
Hybrid work has put state and local government agencies in a fix: They need to strengthen security for hybrid workers but not a...
Secure the Hybrid Workplace Without Compromising Performance
May-29-2024
Agencies love how cloud makes it easy for any office or program team to spin up a new service whenever they need it. But that a...
Better Visibility, Better Budgeting: How to Manage Your Cloud Spend
Mar-04-2024
As agencies embark on their journey to zero trust, they'll find no lack of tools to help them on their way. The problem is that...
Deploying Zero Trust Network Access to Drive Improved Cybersecurity
Jul-31-2023
Despite new technologies and new policies, cyber criminals continue to find ways to infiltrate government networks.
That’s why...
Next-Level Network Security: How to Detect Hidden Threats
Oct-26-2022
Yes, a zero trust-based approach to cybersecurity is complicated. And yes, you need to understand what it is and why it's impor...
Why Zero Trust? Why Now?
Aug-15-2022
For employees who frequently work outside the office, the technology can be aggravating. Switching from one location to another...
How to Overcome the Common Stumbling Blocks to Hybrid Work
Aug-05-2022
Trying to figure out what exactly is in your cloud environment can be a bit like trying to get through a maze while blindfolded...
Best Practices for Hardening Cloud Security
Mar-31-2022
There's no getting around it: Malicious cyber actors see state and local agencies as prime targets -- both because they manage ...
All Aboard! 6 Stops on the Journey to Better Security
Feb-11-2021
This course will discuss how federal agencies can leverage a secure access service edge (SASE) approach to maintain TIC 3.0 com...