NATIONAL CYBERSECURITY STRATEGY
STANDARDS & COMPLIANCE
PRIVACY & DATA PROTECTION
CRITICAL NATIONAL INFRASTRUCTURE PROTECTION
PUBLIC POLICY
TECHNOLOGY
EDUCATION
Tab 1
Description
Tab 2
Description
Tab 3
Description

01: National Cybersecurity Strategy Lifecycle

A National Cybersecurity Strategy (NCS) needs to be properly planned, implemented, and monitored for maximum efficiency and effectiveness. This training focuses on the various phases of the NCS lifecycle, and its key elements required to design and implement an NCS framework.

Field is required!
Field is required!
Difficulty Level
Intermediate
Half-day
3 Hours
Pricing
USD $300
Field is required!
Field is required!

02: Managing & Organising a CERT


A Computer Emergency Response Team (CERT) handles computer security incidents and is a critical component in an organisation’s defence against cyber threats. As such, proper organisation and management of the functions and responsibilities of a CERT is key to a robust and resilient cyber defence. This training covers elements such as activities, infrastructure, and standard operating procedures (SOPs) of a CERT.

Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

03: Incident Handling & Response


With growing concerns of cyber threats, understanding cyber incidents, classification of incidents, types of incidents and how to respond to these incidents is critical. This training focuses on how to classify incidents based on international standards within the CERT community.

Field is required!
Field is required!
Difficulty Level
Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

03: Incident Handling & Response


With growing concerns of cyber threats, understanding cyber incidents, classification of incidents, types of incidents and how to respond to these incidents is critical. This training focuses on how to classify incidents based on international standards within the CERT community.

Field is required!
Field is required!
Difficulty Level
Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

03: Incident Handling & Response


With growing concerns of cyber threats, understanding cyber incidents, classification of incidents, types of incidents and how to respond to these incidents is critical. This training focuses on how to classify incidents based on international standards within the CERT community.

Field is required!
Field is required!
Difficulty Level
Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

04: Common Criteria & Its Applications


The Common Criteria is an international standard for computer security evaluation and certification and is useful for improving availability of security-enhanced IT products and protection profiles. This training covers certification basics, benchmark requirements, and specifications and guidelines for evaluating information systems security for your organisation.

Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

05: ISMS for Organisations


Information Security Management System (ISMS) is a documented management system consisting of a set of security controls that protect assets from threats and vulnerabilities. This training provides a brief overview of ISMS requirements and provides support on how to establish an ISMS within an organisation. The training also covers the ISO/IEC 27001 standard, which is the international standard for ISMS, and the ISO/IEC 27002 standard, which provides implementation guidance for ISMS.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

06: Risk Management Strategy


An organisation’s risk management strategy is the basis of its overall risk management lifecycle and must be meticulously planned and executed. This training focuses on risk management practices, structured approaches to address risks, industry best practices, and various methodologies in mitigating risks.

Field is required!
Field is required!
Difficulty Level
Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

07: GDPR Implementation & Compliance


A firm understanding of data protection laws and the GDPR is crucial for organisations to safeguard the data of all its stakeholders and to avoid penalties for non-compliance. This training covers the fundamentals of the GDPR, together with the rights of data subjects, its implementation, and regulatory compliance. Other data protection laws and data governance programme management for organisations will also be covered.

Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

08. Introduction to Cybersecurity Audit


A cybersecurity audit helps an organisation comprehensively review and analyse its IT infrastructure for threats, vulnerabilities, and high-risk practices. This training is designed to provide an overview of the basic knowledge of auditing a cybersecurity programme, while also exploring the various audit practices of identifying threats and vulnerabilities and its impact on an organisation’s operations.


Field is required!
Field is required!
Difficulty Level
Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

09: Data Protection & Privacy


Data protection is a crucial part of an organisation’s cybersecurity strategy. This training covers various approaches to data protection and privacy laws and regulations and the global trends in protecting data transfers. It also covers various data types, industry perspectives and standards, and the challenges faced by organisations while safeguarding personal data and privacy.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

10: Protecting National Sovereignty Through Cyber


In a global supply chain, nations are more exposed to their critical information being exposed or stolen. Governments must understand how to protect their critical assets, especially their data to ensure it is not leaked, stolen, or viewed by unauthorised entities. This training highlights the importance of cybersecurity and data protection to national sovereignty.


Field is required!
Field is required!
Difficulty Level
Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

11: Data Privacy & Social Networks


The advent of social networks is underscoring the importance of data privacy and bringing to fore concerns about the dangers of the Internet. This training provides an insight into the safety and privacy aspects of online users, while also focusing on the literacy of safer internet usage and methods to cultivate cyber hygiene practices on social networks. A comprehensive overview on how to protect user privacy on social networks through proper device settings will also be provided.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

12. Protecting Kids Online


The internet plays a significant role in the lives of children, who may be exposed to harmful content and behaviour as soon as they log on. This course is designed to equip parents and educators with the knowledge, tools, and resources required to protect children online. This training is important and applicable for anyone who works with children and young people in any capacity.


Field is required!
Field is required!
Difficulty Level
Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

13: Introduction To Critical National Information Infrastructure Protection


Critical Infrastructure (CI) refers to assets that are essential for the functioning of a society and the economy. This training introduces the common practices related to the protection of Critical National Information Infrastructure, while providing an overview of the classification of all elements related to Critical Infrastructure (CI) from a defence and national security perspective. It also looks at the security of various sectors that are critical for a country’s local economy and infrastructure development.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

14: Critical National Information Infrastructure Protection Workshop – Transportation Sector Case Study


This is an in-depth training which covers Critical National Information Infrastructure Protection and how states are building on CNI security for the sector through national policies and strategies. A detailed transportation sector case study, together with sector-specific strategies to improve preparedness and resiliency will also be covered.



Field is required!
Field is required!
Difficulty Level
Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

15: Critical National Information Infrastructure Protection Workshop – Financial Sector Case Study


This is an in-depth training which covers Critical National Information Infrastructure Protection and how states are building on CNI security for the sector through national policies and strategies. A detailed financial sector case study, together with sector-specific strategies to improve preparedness and resiliency will also be covered.

Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

16: Critical National Information Infrastructure Protection Workshop – Energy & Power Sector Case Study


This is an in-depth training which covers Critical National Information Infrastructure Protection and how states are building on CNI security for the sector through national policies and strategies. A detailed energy and power sector case study, together with sector-specific strategies to improve preparedness and resiliency will also be covered.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

17: Critical National Information Infrastructure Protection Workshop – Water & Utilities Sector Case Study


This is an in-depth training which covers Critical National Information Infrastructure Protection and how states are building on CNI security for the sector through national policies and strategies. A detailed water and utilities sector case study, together with sector-specific strategies to improve preparedness and resiliency will also be covered.

Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

18: Critical National Information Infrastructure Protection Workshop – Food & Agriculture Sector Case Study


This is an in-depth training which covers Critical National Information Infrastructure Protection and how states are building on CNI security for the sector through national policies and strategies. A detailed food and agriculture sector case study, together with sector-specific strategies to improve preparedness and resiliency will also be covered.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

19: Critical National Information Infrastructure Protection Workshop – Government Services Sector Case Study


This is an in-depth training which covers Critical National Information Infrastructure Protection and how states are building on CNI security for the sector through national policies and strategies. A detailed government services sector case study, together with sector-specific strategies to improve preparedness and resiliency will also be covered.

Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

20: Critical National Information Infrastructure Protection Workshop – Healthcare Sector Case Study


This is an in-depth training which covers Critical National Information Infrastructure Protection and how states are building on CNI security for the sector through national policies and strategies. A detailed healthcare sector case study, together with sector-specific strategies to improve preparedness and resiliency will also be covered.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

21: Critical National Information Infrastructure Protection Workshop – Information Technology Sector Case Study


This is an in-depth training which covers Critical National Information Infrastructure Protection and how states are building on CNI security for the sector through national policies and strategies. A detailed IT sector case study, together with sector-specific strategies to improve preparedness and resiliency will also be covered.



Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

22: Critical National Information Infrastructure Protection – Emergency Services Case Study


This is an in-depth training which covers Critical National Information Infrastructure Protection and how states are building on CNI security for the sector through national policies and strategies. A detailed emergency services sector case study, together with sector-specific strategies to improve preparedness and resiliency will also be covered.



Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

23: Critical National Information Infrastructure Protection – National Defence Case Study


This is an in-depth training which covers Critical National Information Infrastructure Protection and how states are building on CNI security for the sector through national policies and strategies. A detailed national defence sector case study, together with sector-specific strategies to improve preparedness and resiliency will also be covered.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

24: Critical National Information Infrastructure Protection Workshop


This is an in-depth training which covers Critical National Information Infrastructure Protection in detail. A significant part of this training addresses national infrastructure and how states are building on CNI security through national policies and strategies. It also covers steps to develop tools to improve national preparedness and resiliency. This training also covers important steps to help a nation identify its critical sectors.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

25: Supply Chain Security


Supply chain security is a core element of an organisation’s effective supply chain management as it allows stakeholders to identify potential risks and breaches by external parties. Participants will learn the various security concerns related to supply chains, the different levels of audit practices and strict compliance requirements that need to be implemented by organisations as part of its supply chain management.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

26: Working with International Organisations on Cybersecurity


Governments together with the private sector must emphasise a multi-stakeholder approach to cybersecurity. This is especially true as some countries may not possess the technical capabilities to implement their own cybersecurity programmes and procedures. This training provides participants with the understanding of working with various international organisations, what these organisations do, and basic guidelines for cooperating with them to enhance their nation’s cybersecurity capabilities.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

27: Working with Other Governments on Cybersecurity


Governments together with the private sector must emphasise a multi-stakeholder approach to cybersecurity. This is especially true as some countries may not possess the technical capabilities to implement their own cybersecurity programmes and procedures. This training provides participants with the understanding of working with various international organisations, what these organisations do, and basic guidelines for cooperating with them to enhance their nation’s cybersecurity capabilities.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

28: Working with Private Sector on Cybersecurity


While working with other governments is crucial, the private sector is widely involved in managing many of the critical infrastructure and has a wealth of expertise, technology, and skills. This training addresses the importance of working with the private sector, its benefits, and the various levels of cooperation that exist to further strengthen cooperation to combat cybercrime.



Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

29: Budgeting for Cybersecurity Programmes


Budgets are a key element with regards to cybersecurity growth. With limited funding, careful consideration must be placed on elements when a government does its planning and implementation. This training provides participants guidelines on how to build a budget strategy, prioritise programmes, and understand individual factors which need to be considered when developing a budget strategy.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

30: Rightsizing Cybersecurity for your Nation’s Needs & Obtaining Funding for It


This training provides the necessary guidelines to help nations identify funding channels for their cybersecurity investments and how to procure funds using these channels. This training also discusses steps to determine assets which need to be protected, the capabilities required, how to prioritise investments, and the level of funds needed to achieve the desired objectives (rightsizing).


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

31: Cybersecurity for e-Gov Services


This training identifies the various e-Government (e-Gov) services and their corresponding benefits, risks, and threats. It also provides participants with the cybersecurity strategies required to address potential risks when implementing such e-Gov services.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

32: Cybersecurity & Privacy for Campaigns


Many countries have faced cybersecurity threats in legislative or presidential elections. With more countries migrating toward electronic voting, cyber threats are becoming increasingly prevalent and must be adequately addressed and managed. This training provides participants information of these threats, relevant adversaries, and how to mitigate risks to execute a secure campaign free from external influence.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

33: VIP Security


VIPs and executives are attractive targets for cybercriminals as they hold valuable and sensitive information. Their wealth also makes them attractive targets for extortion. This training helps participants understand threats against VIPs and how to better protect VIPs against these threats. Technical and non-technical solutions to protect VIPs and executives from cyber threats are also covered.



Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

34: Introduction to Security Awareness


This training is designed to provide participants the skills and knowledge needed to cultivate cyber safe behaviour, which will help mitigate risks when in cyberspace. Steps to better protect users and their organisations from cyber criminals and threats are also addressed.



Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

35: Security Awareness Workshop


Participants will learn of the various threats to organisational security, what these threats look like when encountered by a user, and how they can take action to stop or avoid security threats. Learning to defend against phishing attacks requires a multi-layered approach to security, including technology to recognise and block potential threats in inbound emails, and awareness training for participants on how to spot threats and what to do when they encounter one.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

36: Social Engineering & Ransomware


Social engineering is essentially the art of gaining access to buildings, systems, or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques. This training teaches participants the most common social engineering threats and how to protect themselves and their systems from social engineering attacks. Participants will also learn about ransomware and how to identify, prevent and mitigate ransomware attacks.



Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

37: Managing Network Security Threats


Network security is important for both home and business networks. Most physical locations with high-speed internet connections have one or more wireless routers, which could be exploited if not properly secured. A solid network security system helps reduce the risk of data loss and theft. This training helps participants understand the concept of network security and the different types of networks. The types of network layers, network attacks, and various network protections is also covered.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

38: Managing Threats to IoT Security


IoT comprises the fusion of devices and the web, specifically the cloud, with devices sending and recording data, ubiquitously and continually, everywhere. This training helps participants gain an understanding of the various threats to IoT devices and how to manage these threats effectively.

Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

39: Managing Zero Days Exploits


Identifying zero-day attacks is challenging, especially if these attacks are executed stealthily. Unless the attackers intend to attract public attention, it is often too late for victims to mitigate the zero-day attack by the time it is detected. Even the most sophisticated antivirus and antimalware tools fail to detect zero-day attacks because they do not have the signatures to identify the malware in use. Participants will learn best practices to protect against zero-day attacks and mitigate the associated risks.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

40: Implementing AI & Machine Language to Improve Cybersecurity


Artificial Intelligence (AI) algorithms are improving the capabilities of computers to perform tasks traditionally limited to human intelligence, such as decision-making and speech recognition. This training covers how AI and Machine Learning (ML) work in the real world, recent developments in the AI/ML space, and explores methods that can be used to improve cybersecurity around AI/ML applications.

Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

41: Encryption for Data in Motion & Data at Rest


This training provides participants an overview of best practices for data protection. It covers encryption of data at rest, in motion, and best practices for how to store data within and between various services in ensuring its confidentiality, integrity and availability.


Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

50: Building a Cybersecurity Training Roadmap


With the pervasive increase of cyberattacks, governments and organisations must be prepared to protect, defend, detect, respond, and mitigate these threats. This training guides participants in building a cybersecurity training roadmap through benchmarking, assessments, and needs analysis. An analysis of common cyber threats and the need for cybersecurity expertise and personnel is also covered.



Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

51: Training & Retaining Cybersecurity Staff


The need to train and develop more cybersecurity experts is increasingly pressing amid a global shortage in cybersecurity professionals and rising sophistication of cyberattacks. This training focuses on the process of identifying, selecting, and retaining staff while choosing the right training, qualifications, and certifications for them.




Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

51: Training & Retaining Cybersecurity Staff


The need to train and develop more cybersecurity experts is increasingly pressing amid a global shortage in cybersecurity professionals and rising sophistication of cyberattacks. This training focuses on the process of identifying, selecting, and retaining staff while choosing the right training, qualifications, and certifications for them.




Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

52: Cybersecurity Education & Certification


This training provides participants with the understanding of cybersecurity education, its importance, challenges in the skills gap and how to address this gap. It also discusses the various cybersecurity certification programmes, their respective providers, and how to build a certification roadmap to enhance the talent pool.

Field is required!
Field is required!
Difficulty Level
Basic-Intermediate
Half-day
Half-day
Pricing
USD $300
Field is required!
Field is required!

Start Learning

Register your interest and we’ll be in contact to share further details shortly.

Field is required!
Field is required!
Full Name
Field is required!
Field is required!
Your Email
Field is required!
Field is required!
Your Organisation
Field is required!
Field is required!

Your Selected Courses


01: National Cybersecurity Strategy Lifecycle

Field is required!
Field is required!


02: Managing & Organising a CERT

Field is required!
Field is required!


03: Incident Handling & Response

Field is required!
Field is required!


04: Common Criteria & Its Applications

Field is required!
Field is required!


05: ISMS for Organisations

Field is required!
Field is required!


06: Risk Management Strategy

Field is required!
Field is required!


07: GDPR Implementation & Compliance

Field is required!
Field is required!


08. Introduction to Cybersecurity Audit

Field is required!
Field is required!


09: Data Protection & Privacy

Field is required!
Field is required!


10: Protecting National Sovereignty Through Cyber

Field is required!
Field is required!


11: Data Privacy & Social Networks

Field is required!
Field is required!


12. Protecting Kids Online

Field is required!
Field is required!


13: Introduction To Critical National Information Infrastructure Protection

Field is required!
Field is required!


14: Critical National Information Infrastructure Protection Workshop – Transportation Sector Case Study

Field is required!
Field is required!


15: Critical National Information Infrastructure Protection Workshop – Financial Sector Case Study

Field is required!
Field is required!


16: Critical National Information Infrastructure Protection Workshop – Energy & Power Sector Case Study

Field is required!
Field is required!


17: Critical National Information Infrastructure Protection Workshop – Water & Utilities Sector Case Study

Field is required!
Field is required!


18: Critical National Information Infrastructure Protection Workshop – Food & Agriculture Sector Case Study

Field is required!
Field is required!


19: Critical National Information Infrastructure Protection Workshop – Government Services Sector Case Study

Field is required!
Field is required!


20: Critical National Information Infrastructure Protection Workshop – Healthcare Sector Case Study

Field is required!
Field is required!


21: Critical National Information Infrastructure Protection Workshop – Information Technology Sector Case Study

Field is required!
Field is required!


22: Critical National Information Infrastructure Protection – Emergency Services Case Study

Field is required!
Field is required!


23: Critical National Information Infrastructure Protection – National Defence Case Study

Field is required!
Field is required!


24: Critical National Information Infrastructure Protection Workshop

Field is required!
Field is required!


25: Supply Chain Security

Field is required!
Field is required!


26: Working with International Organisations on Cybersecurity

Field is required!
Field is required!


27: Working with Other Governments on Cybersecurity

Field is required!
Field is required!


28: Working with Private Sector on Cybersecurity

Field is required!
Field is required!


29: Budgeting for Cybersecurity Programmes

Field is required!
Field is required!


30: Rightsizing Cybersecurity for your Nation’s Needs & Obtaining Funding for It

Field is required!
Field is required!


31: Cybersecurity for e-Gov Services

Field is required!
Field is required!


32: Cybersecurity & Privacy for Campaigns

Field is required!
Field is required!


33: VIP Security

Field is required!
Field is required!


34: Introduction to Security Awareness

Field is required!
Field is required!


35: Security Awareness Workshop

Field is required!
Field is required!


36: Social Engineering & Ransomware

Field is required!
Field is required!


37: Managing Network Security Threats

Field is required!
Field is required!


38: Managing Threats to IoT Security

Field is required!
Field is required!


39: Managing Zero Days Exploits

Field is required!
Field is required!


40: Implementing AI & Machine Language to Improve Cybersecurity

Field is required!
Field is required!


41: Encryption for Data in Motion & Data at Rest

Field is required!
Field is required!


50: Building a Cybersecurity Training Roadmap

Field is required!
Field is required!


51: Training & Retaining Cybersecurity Staff

Field is required!
Field is required!


52: Cybersecurity Education & Certification

Field is required!
Field is required!