Awareness and Education
Awareness and Education
Security Awareness Tools
DIR Sponsored Training
DIR Supported Training
- DIR Security Program Monthly Webinars Presented by Gartner
Other Events of Interest (with DIR Participation)
- Recorded Insider Threat: Log Analysis & Correlation
- In this recorded workshop, you will be introduced to the insider threat "problem" - both malicious and non-malicious. This webinar includes some simple hands-on exercises.
- Recorded - Securing Your Wireless Mobile Devices
- In this 60-minute workshop, you will be introduced to the different wireless technologies, how they work, and their associated security weaknesses.
- Recorded - DoS Wireless Roundtable Discussion
- This COL workshop will sponsor the first roundtable discussion with DoS experts/stakeholders on the state of wireless. The discussion will focus on where DoS currently stands and where they are headed. There will be student participation with Q&A.
- Recording Preparing for an Intl Advanced Persistent Threat
- This 60-90 minutes workshop with demonstration will take a closer look at what Advanced Persistent Threats (APTs) are and how they are attacking organizations - designed for the beginner to intermediate learner.
- Recorded Network Fundamentals – Part 1
- This workshop is part one of a two part series that will cover network security fundamentals including an overview of network components and how to properly secure your network. Students need to have a working knowledge of networking concepts.
- Recorded What your Mobile Device Says About You
- Learn to secure your mobile devices with Dr. James Stanger. Dr Stanger will discuss ways that hackers exploit you, your family, business colleagues or friends and how you can secure your mobile device to protect you and them from harm.
Wednesday, March 19, 2014 7:00:00 AM CDT - 8:00:00 AM CDT
Wednesday, March 19, 2014 12:15:00 PM CDT - 1:30:00 PM CDT
In this workshop, Dr. James Stanger will discuss how to detect, track and thwart intrusions. He will profile software such as Tripwire, show how to create honeypots, and conduct tracebacks - for learners with solid knowledge of network concepts.
IPV6 - A Detailed
Tuesday, March 25, 2014 7:00:00 AM CDT - 8:00:00 AM CDT
This Workshop, presented by James Stanger, will present detailed information about how IPv6 works, how it can improve security if properly implemented, and how you can migrate your end user systems from IPv4 to IPv6.
Network Fundamentals - Part 2
Tuesday, April 1, 2014 7:00:00 AM CDT - 8:30:00 AM CDT
Tuesday, April 1, 2014 12:00:00 PM CDT - 1:00:00 PM CDT
This workshop is part two of a two part series that will cover network security fundamentals including an overview of network components and how to properly secure your network. Two 15 minutes hands-on labs will be included.
Insider Threat: User Permissions
Tuesday, April 8, 2014 7:00:00 AM CDT - 8:30:00 AM CDT
Tuesday, April 8, 2014 12:00:00 PM CDT - 1:30:00 PM CDT
Is your organization prepared for the Insider Threat? Learn the tools and techniques of the insider threat and how to prepare your organization. Permission escalation and watermarking techniques will be demonstrated with a hands-on lab.
Insider Threat: Securing Privileged Accounts
Thursday, April 17, 2014 7:00:00 AM CDT - 8:00:00 AM CDT
Thursday, April 17, 2014 12:00:00 PM CDT - 1:00:00 PM CDT
This workshop focuses on proper use and safeguards for Active Directory administrator accounts and Managed Service accounts at Department of State - mainly Microsoft Active Directory accounts with elevated levels of access.
For registration : Cybersecurity Online Training
Information about file formats