Free online learning for government employees.
How Your Agency Can Modernize with Next-Generation Networking and Security
For federal agencies, network modernization isn’t a nice-to-have, it’s a must-have. It’s top of mind for agencies today because strong networks underpin nearly everything that employees do in today’s digital world.
In this course, you’ll learn about the network security challenges that agencies face, including security and legacy technology. You will also learn how a software-defined approach to networking is helping to address those issues and ensure government networks are nimble and adaptable to change.
Related Videos
Aug-26-2024
Government agencies know that the cloud is the path to transformation. But when it comes to using commercial cloud services, th...
Safety and Sovereignty in the Cloud: Overcoming Commercial Cloud Challenges
Jul-16-2024
Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise,...
The Hidden Dangers: A Guide to Mobile Security Threats
Jul-03-2024
Hybrid work has put state and local government agencies in a fix: They need to strengthen security for hybrid workers but not a...
Secure the Hybrid Workplace Without Compromising Performance
May-29-2024
Agencies love how cloud makes it easy for any office or program team to spin up a new service whenever they need it. But that a...
Better Visibility, Better Budgeting: How to Manage Your Cloud Spend
Mar-04-2024
As agencies embark on their journey to zero trust, they'll find no lack of tools to help them on their way. The problem is that...
Deploying Zero Trust Network Access to Drive Improved Cybersecurity
Dec-27-2023
For IT teams, there's no shortage of data to help identify problems with application performance. In fact, there's so much data...
Demystify Your Application Performance
Nov-28-2023
A Rube Goldberg machine is a ridiculously complicated, enormously complex gizmo used to accomplish a simple task. The concept i...
How to Take the Pain and Complexity out of IT Management
Nov-14-2023
When an employee files a complaint, it’s a difficult situation for the agency and employee alike. If you can’t track that compl...
Improve Relations With Employees Through Workforce Case Management
Jul-31-2023
Despite new technologies and new policies, cyber criminals continue to find ways to infiltrate government networks.
That’s why...
Next-Level Network Security: How to Detect Hidden Threats
Jan-05-2023
The VPN has been a constant in the life of remote workers for such a long time, it's difficult to imagine another option. If th...
How to Break up With Your VPN (and Improve Security)
Oct-15-2024
To respond to today’s cyber threats, agencies need to ensure their security and network operations centers are able to collabor...
Modernizing Network and Cyber Operations
Oct-15-2024
In March 2024, Cisco completed its acquisition of Splunk, making it easier for agencies to deploy a unified solution that provi...
Creating a Collaborative SOC/NOC Environment
Oct-26-2021
This video, developed in collaboration with Cloudera, will address the challenges of managing security data in a large agency a...
How Threat Hunters Use Data Analytics to Shut Down Attackers
Feb-02-2021
State and local agencies are common targets for ransomware, making their cloud computing environments increasingly vulnerable t...
3 Steps for Surviving Ransomware
Jan-06-2021
Web application security is too frequently handled by external controls and legacy tools not designed for securing more modern ...
Timing Is Everything for Web Application Security
Dec-22-2020
It's critically important for agencies to not only continually provide services in the face of unplanned emergencies, but to op...
Building Resilience Into Your Agency
Dec-09-2020
Containerization is rapidly changing how agencies develop software, providing a way to build applications that can move easily ...
Containerization: Don’t Get Blindsided by Hidden Security Threats
Dec-02-2020
In cybersecurity, do more solutions make for a merrier defense? Not necessarily. Too many tools can actually lead to infighting...
How to Unlock the Hidden Value of Your Cyber Defenses
Nov-18-2020
There’s good reason why ransomware and other types of malware continue to plague organizations: Cybercriminals keep coming up w...
How to Strengthen Cybersecurity (Beyond Buying New Tools)
Sep-15-2020
With cyberattacks, the last thing you want is one that spreads. But working with a variety of viruses and techniques, cyberatta...
The Need for Speed in Detecting and Responding to Cyberthreats
Aug-24-2020
Many common cyber defenses, like Intrusion Prevention Systems and Web Application Firewalls, have problems when it comes to app...
Embedding RASP for Application and Data Security
Jul-21-2020
The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...
Cloud Security: Defending a Pillar of IT Modernization
Jul-02-2020
Modern methodologies have accelerated the process of software development, but often at the cost of security. In fact, a recent...
How to Address Security Vulnerabilities in the Development Lifecycle
Jun-08-2020
In this course, you’ll learn how productivity and security go hand in hand in the remote environment. You’ll hear five best pra...
5 Strategies to Enhance Security for Productivity While Remote
Mar-27-2020
If you haven’t heard of ransomware yet, you will. Ransomware is more than just malicious software – it’s a dangerous cyberthrea...
Federal Ransomware: A Rising Threat
Mar-26-2020
The Continuous Diagnostics and Mitigation, managed by the Department of Homeland Security, is the cornerstone of the federal go...
Manage Cybersecurity Threats with the CDM Dashboard Ecosystem
Mar-13-2020
By taking this course, you will be enrolled in five lessons about DDoS attacks and how to prevent them. We will explore what DD...
Introduction to DDoS Attacks
Mar-12-2020
Information security may very well be the defining challenge of this era of government. How will government meet security deman...
Cybersecurity Crash Course
Mar-12-2020
Cloud is a common buzzword in the IT world, and in our daily lives we use the cloud to do everything from check email, to acces...
Making Smarter IT Investments
Mar-12-2020
In this six-lesson course, we’ll examine the components of an effective security strategy that addresses all necessary systems....
How to Build Connected Security
Mar-12-2020
Government agencies have invested heavily in infrastructure, applications and processes, but now too many times, it feels like ...