Free online learning for government employees.
How Threat Hunters Use Data Analytics to Shut Down Attackers
This video, developed in collaboration with Cloudera, will address the challenges of managing security data in a large agency and how the right data analytics solution can reduce both volume and noise, giving threat hunters and analysts the upper hand.
Related Videos
Nov-09-2022
Digital collaboration is a good thing, right? Of course it is. But it's also a potential cybersecurity risk. The problem is tha...
Keeping Data Secure in a Digital Workspace
Sep-19-2022
Filling vacant positions. Measuring employee performance. Identifying training needs. Strengthening diversity, equity and inclu...
4 Steps to Data-Driven Workforce Management
Mar-29-2022
If data were water, many organizations would say they often feel like they're drinking from a firehose: They end up soaked but ...
A Better Way to Handle Real-Time, Data-Intensive Workloads
Jan-14-2022
Have you ever felt like your agency's data is out of control? The data you need is somewhere, but you don't always know where o...
Is Your Data Out of Control?
Dec-20-2021
Government agencies typically have a lot of data. What they often lack is stakeholder buy-in and an easy way to extract relevan...
Getting What You Need from Data Analytics
Dec-03-2021
Healthcare researchers often rely solely on clinical trial data to perform their research. More generalizable and robust insigh...
Finding the Gold in Public Health Research Databases
Jun-21-2021
In the modern battlefield, facing near peer adversaries, the U.S. military forces must coordinate to leverage every advantage a...
Making Better Tactical Decisions by Integrating Military Data
Jan-13-2021
Agency folks with an interest in analysis know there is a huge amount of data out there, stored in databases sprinkled througho...
Using Data Management to Overcome Data Silos
Jan-07-2021
Using data to drive decision making can help federal agencies identify problems, improve the quality of programs and steer the ...
How Do You Become a Data-Driven Agency?
Dec-14-2020
What may sound like A Space Odyssey's HAL is becoming a reality for citizen and professional data scientists – real-time data a...
Real-Time Data Analysis in the Field
Oct-15-2024
To respond to today’s cyber threats, agencies need to ensure their security and network operations centers are able to collabor...
Modernizing Network and Cyber Operations
Oct-15-2024
In March 2024, Cisco completed its acquisition of Splunk, making it easier for agencies to deploy a unified solution that provi...
Creating a Collaborative SOC/NOC Environment
Feb-02-2021
State and local agencies are common targets for ransomware, making their cloud computing environments increasingly vulnerable t...
3 Steps for Surviving Ransomware
Jan-06-2021
Web application security is too frequently handled by external controls and legacy tools not designed for securing more modern ...
Timing Is Everything for Web Application Security
Dec-22-2020
It's critically important for agencies to not only continually provide services in the face of unplanned emergencies, but to op...
Building Resilience Into Your Agency
Dec-09-2020
Containerization is rapidly changing how agencies develop software, providing a way to build applications that can move easily ...
Containerization: Don’t Get Blindsided by Hidden Security Threats
Dec-02-2020
In cybersecurity, do more solutions make for a merrier defense? Not necessarily. Too many tools can actually lead to infighting...
How to Unlock the Hidden Value of Your Cyber Defenses
Nov-18-2020
When you have access to all your data, then your agency can make the best use of it. Yet, many agencies rely on disconnected to...
How to Get the Most Value From All Data, All the Time
Nov-18-2020
There’s good reason why ransomware and other types of malware continue to plague organizations: Cybercriminals keep coming up w...
How to Strengthen Cybersecurity (Beyond Buying New Tools)
Oct-06-2020
Many agencies have been turning to open source, which is code that’s freely available, to enable innovation and get away from p...
Why You Need Support for Open Source Code
Sep-15-2020
With cyberattacks, the last thing you want is one that spreads. But working with a variety of viruses and techniques, cyberatta...
The Need for Speed in Detecting and Responding to Cyberthreats
Aug-24-2020
Many common cyber defenses, like Intrusion Prevention Systems and Web Application Firewalls, have problems when it comes to app...
Embedding RASP for Application and Data Security
Jul-22-2020
Data is the foundation for emerging technologies and it’s critical for government agencies to recognize that. In this course, w...
Critical Success Factors When Building A Secure and Flexible Data Strategy
Jul-21-2020
The golden rule of security is to always be prepared. And when it comes to protecting critical cloud-based data, old tactics ju...
Cloud Security: Defending a Pillar of IT Modernization
Jul-02-2020
Modern methodologies have accelerated the process of software development, but often at the cost of security. In fact, a recent...
How to Address Security Vulnerabilities in the Development Lifecycle
Jun-08-2020
In this course, you’ll learn how productivity and security go hand in hand in the remote environment. You’ll hear five best pra...
5 Strategies to Enhance Security for Productivity While Remote
Mar-27-2020
If you haven’t heard of ransomware yet, you will. Ransomware is more than just malicious software – it’s a dangerous cyberthrea...
Federal Ransomware: A Rising Threat
Mar-26-2020
The Continuous Diagnostics and Mitigation, managed by the Department of Homeland Security, is the cornerstone of the federal go...
Manage Cybersecurity Threats with the CDM Dashboard Ecosystem
Mar-13-2020
By taking this course, you will be enrolled in five lessons about DDoS attacks and how to prevent them. We will explore what DD...
Introduction to DDoS Attacks
Mar-12-2020
Information security may very well be the defining challenge of this era of government. How will government meet security deman...
Cybersecurity Crash Course
Mar-12-2020
In this six-lesson course, we’ll examine the components of an effective security strategy that addresses all necessary systems....