Free online learning for government employees.
  
 
  Creating an Integrated Cyber Defense
    Citizen data. The federal government has it, and bad actors want it. Cyber threats surround agencies on all sides, creating a constant challenge to protect sensitive information about Americans. How do agencies protect themselves?
The answer is an Integrated Cyber Defense Platform that unifies cybersecurity for legacy and modern systems. It’s a common hub for controlling threat prevention and keeping agency’s safe. In this course, we examine what an Integrated Cyber Defense Platform protects, how it achieves security goals and how agencies can use it to achieve better outcomes.
Related Videos
          Jun-02-2025
        
          
            First responders and other government organizations in the field need trusted, uninterrupted access to information and communic...
          
      A Single Solution: Secure Wireless Networks in the Field
          May-28-2025
        
          
            Every year, government loses billions of dollars to waste, fraud and abuse. Digital services are especially vulnerable, because...
          
      Automated Identity Proofing Takes a Bite out of Waste, Fraud and Abuse
          Apr-07-2025
        
          
            Many federal agencies rely on outdated network infrastructure that is ill-equipped to handle the surge in bandwidth and securit...
          
      How to Modernize the Network, Strengthen Security and Cut Costs
          Mar-14-2025
        
          
            Government agencies have a mandate to protect citizen data, but vulnerable code, faulty design and an insecure supply chain can...
          
      The App Security Imperative: Closing the Cyber Gap
          Jul-16-2024
        
          
            Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise,...
          
      The Hidden Dangers: A Guide to Mobile Security Threats
          Jul-03-2024
        
          
            Hybrid work has put state and local government agencies in a fix: They need to strengthen security for hybrid workers but not a...
          
      Secure the Hybrid Workplace Without Compromising Performance
          Mar-04-2024
        
          
            As agencies embark on their journey to zero trust, they'll find no lack of tools to help them on their way. The problem is that...
          
      Deploying Zero Trust Network Access to Drive Improved Cybersecurity
          Jul-31-2023
        
          
            Despite new technologies and new policies, cyber criminals continue to find ways to infiltrate government networks.
That’s why...
          
      Next-Level Network Security: How to Detect Hidden Threats
          Oct-26-2022
        
          
            Yes, a zero trust-based approach to cybersecurity is complicated. And yes, you need to understand what it is and why it's impor...
          
      Why Zero Trust? Why Now?
          Aug-05-2022
        
          
            Trying to figure out what exactly is in your cloud environment can be a bit like trying to get through a maze while blindfolded...
          
      Best Practices for Hardening Cloud Security
          Apr-11-2025
        
          
            Between return-to-office mandates and an evolving threat landscape, network and security modernization initiatives have taken o...
          
      New Modernization Priorities Put Focus on Converged Solutions
          Apr-11-2025
        
          
            For years, many federal agencies have looked at networking and cybersecurity as separate functions. But that approach has run i...
          
      How to Bring Greater Efficiency to Network and Cyber Operations
          Mar-19-2025
        
          
            Insider threats have always been with us butut new technologies, including artificial intelligence, have made it easier for net...
          
      How Can Agencies Strengthen Their Defense Against Insider Threats?
          Mar-19-2025
        
          
            Artificial intelligence and other technologies have made it much easier for end-users to manipulate data and systems in ways th...
          
      Meeting the Challenge of Insider Threats
          Mar-10-2025
        
          
            While zero-trust network architecture represents a significant shift in cybersecurity, it does not address the full scope of da...
          
      Beyond Zero Trust: How to Strengthen Your Data Resilience
          Mar-10-2025
        
          
            As the data environment grows more complex, agencies need to look beyond zero-trust network architecture to address the full sc...
          
      How to Take the Next Step Toward Data Resilience
          Mar-05-2025
        
          
            Between digital transformation and artificial intelligence, agencies are faced with increased data vulnerability and growing at...
          
      Increased Data Vulnerability Requires New Focus on Resilience
          Mar-05-2025
        
          
            Given the heightened risks to government data, agencies need to think not just in terms of security but also resilience. In thi...
          
      Why Agencies Need to Get Serious About Data Recovery
          Dec-19-2024
        
          
            Even as malicious actors grow more sophisticated and lethal, agencies continue to face significant obstacles in their efforts t...
          
      State, Local Agencies Find Strength in Whole-of-State Cyber Strategy
          Jan-06-2021
        
          
            Web application security is too frequently handled by external controls and legacy tools not designed for securing more modern ...
          
      Timing Is Everything for Web Application Security
          Dec-22-2020
        
          
            It's critically important for agencies to not only continually provide services in the face of unplanned emergencies, but to op...
          
      Building Resilience Into Your Agency
          Dec-09-2020
        
          
            Containerization is rapidly changing how agencies develop software, providing a way to build applications that can move easily ...
          
      Containerization: Don’t Get Blindsided by Hidden Security Threats
          Dec-02-2020
        
          
            In cybersecurity, do more solutions make for a merrier defense? Not necessarily. Too many tools can actually lead to infighting...
          
      How to Unlock the Hidden Value of Your Cyber Defenses
          Nov-18-2020
        
          
            There’s good reason why ransomware and other types of malware continue to plague organizations: Cybercriminals keep coming up w...
          
      How to Strengthen Cybersecurity (Beyond Buying New Tools)
          Sep-15-2020
        
          
            With cyberattacks, the last thing you want is one that spreads. But working with a variety of viruses and techniques, cyberatta...
          
      The Need for Speed in Detecting and Responding to Cyberthreats
          Jul-21-2020
        
          
            The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...
          
      Cloud Security: Defending a Pillar of IT Modernization
          Jul-02-2020
        
          
            Modern methodologies have accelerated the process of software development, but often at the cost of security. In fact, a recent...
          
      How to Address Security Vulnerabilities in the Development Lifecycle
          Jun-08-2020
        
          
            In this course, you’ll learn how productivity and security go hand in hand in the remote environment. You’ll hear five best pra...
          
      5 Strategies to Enhance Security for Productivity While Remote
          Mar-27-2020
        
          
            If you haven’t heard of ransomware yet, you will. Ransomware is more than just malicious software – it’s a dangerous cyberthrea...
          
      Federal Ransomware: A Rising Threat
          Mar-26-2020
        
          
            The Continuous Diagnostics and Mitigation, managed by the Department of Homeland Security, is the cornerstone of the federal go...
          
      Manage Cybersecurity Threats with the CDM Dashboard Ecosystem
          Mar-13-2020
        
          
            By taking this course, you will be enrolled in five lessons about DDoS attacks and how to prevent them. We will explore what DD...
          
      Introduction to DDoS Attacks
          Mar-12-2020
        
          
            Information security may very well be the defining challenge of this era of government. How will government meet security deman...
          
      Cybersecurity Crash Course
          Mar-12-2020
        
          
            In this six-lesson course, we’ll examine the components of an effective security strategy that addresses all necessary systems....
          
      