Free online learning for government employees.

Next-Level Network Security: How to Detect Hidden Threats
Despite new technologies and new policies, cyber criminals continue to find ways to infiltrate government networks.
That’s why you can’t just focus on prevention: Malicious actors could already be in your environment, hidden by the overwhelming volume of cyber data.
Related Videos
Jun-02-2025
First responders and other government organizations in the field need trusted, uninterrupted access to information and communic...
A Single Solution: Secure Wireless Networks in the Field
May-28-2025
Every year, government loses billions of dollars to waste, fraud and abuse. Digital services are especially vulnerable, because...
Automated Identity Proofing Takes a Bite out of Waste, Fraud and Abuse
Apr-07-2025
Many federal agencies rely on outdated network infrastructure that is ill-equipped to handle the surge in bandwidth and securit...
How to Modernize the Network, Strengthen Security and Cut Costs
Mar-14-2025
Government agencies have a mandate to protect citizen data, but vulnerable code, faulty design and an insecure supply chain can...
The App Security Imperative: Closing the Cyber Gap
Jul-16-2024
Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise,...
The Hidden Dangers: A Guide to Mobile Security Threats
Jul-03-2024
Hybrid work has put state and local government agencies in a fix: They need to strengthen security for hybrid workers but not a...
Secure the Hybrid Workplace Without Compromising Performance
Mar-04-2024
As agencies embark on their journey to zero trust, they'll find no lack of tools to help them on their way. The problem is that...
Deploying Zero Trust Network Access to Drive Improved Cybersecurity
Oct-26-2022
Yes, a zero trust-based approach to cybersecurity is complicated. And yes, you need to understand what it is and why it's impor...
Why Zero Trust? Why Now?
Aug-05-2022
Trying to figure out what exactly is in your cloud environment can be a bit like trying to get through a maze while blindfolded...
Best Practices for Hardening Cloud Security
Mar-31-2022
There's no getting around it: Malicious cyber actors see state and local agencies as prime targets -- both because they manage ...