Hi [[ session.user.profile.firstName ]]

Cybrary - Free Cyber Security Training

  • Date
  • Rating
  • Views
  • The Future Qualified Employee: Developing a Hands-On Security Training Program
    The Future Qualified Employee: Developing a Hands-On Security Training Program Ryan Corey, Cybrary Co-Founder Recorded: Apr 18 2017 33 mins
    The enterprise landscape is constantly changing. Business leaders need employees who can remain up-to-date with the current technologies and continually develop their practical security skills. But what does the future qualified employee really look like? And is this a realistic expectation for companies?
    55% of employers believe hands-on experience is the most important factor for qualified employees.
    Getting employees training in a cost-effective way and validating their training is part of the problem. That changes now.
    Join Cybrary Co- Founder Ryan Corey as he provides some insight into the future of security training and demonstrates the capabilities of Cybrary’s New Enterprise Training Management and Skill Assessment platform, Teams.
    In this 30-minute interactive webinar, you’ll learn:
    •The training challenges faced by security teams
    •How Cybrary Teams can address these challenges and the capabilities of the platform
    •Why a hands-on, personalized learning approach is the solution
    •How to develop a hands-on training program for your organization
    •How to utilize training assessments to ensure team members are meeting your organization's requirements
    Attend to receive a Teams discount code and free Cybrary t-shirt.
  • Suffering from security fatigue? Here’s what you can do about it!
    Suffering from security fatigue? Here’s what you can do about it! Chris Widstrom, Product Manager Recorded: Apr 18 2017 44 mins
    A new study from the National Institute of Standards and Technology (NIST) found that most typical computer users they interviewed experienced security fatigue that often leads users to risky computing behavior at work and in their personal lives.

    Because of end user security fatigue, IT professionals are constantly playing defense, trying to manage passwords, change passwords and protect passwords. They are spending far too much time and effort just trying to keep up with password maintenance—and experiencing password security fatigue themselves—as they try to manage and protect both end user and privileged accounts.

    Join Thycotic as we share insights into how you can minimize security fatigue in your organization for both end users and privileged account users, and prevent threats from outside hackers and malicious insiders.
  • Ransomware on the Dark Web: How the Underground Economy Works
    Ransomware on the Dark Web: How the Underground Economy Works Andrei Barysevich, Director of Advanced Collection and Levi Gundert, Vice President of Intelligence, Recorded Future Recorded: Mar 9 2017 63 mins
    Ransomware can be more disturbing and damaging than any other cyber crime, and payouts seem to be on the rise. Now, a new brand of extortion is emerging, where criminals threaten to sell data obtained from ransomware campaigns on the cyber criminal underground. Join this webinar to learn about the mastermind behind an infamous ransomware campaign, the mindset of criminals no longer content with small payouts, what role threat intelligence plays, and the pros and cons of paying off criminals.
  • Global State of Privileged Account Management
    Global State of Privileged Account Management Steve Kahan Recorded: Nov 8 2016 40 mins
    According to the 2016 Verizon Data Breach Report, 63% of confirmed data breaches involved leveraging weak, default or stolen passwords.

    Join Thycotic in a 45-minute educational training session that reveals the specific shortcomings in the current state of privileged account security and provides recommendations for how to address the most common failures.
    During the training session, you will learn session:
    · Why privileged accounts are an attractive target for attackers
    · Overview of the Privileged Password Vulnerability Benchmark
    · See the overall grades of 600+ organizations who took the Privileged Password Vulnerability Benchmark
    · Review the specific gaps in privileged account security practices
    · Provide best practice recommendations to reduce the risk
    · Provide access to a several free tools that you can leverage to get immediate improvements

    As a bonus, we will provide access to the Privilege Password Vulnerability Benchmark so your members get immediate feedback on two dimensions:
    · Organizations will get a grade based on their benchmark answers (A-F)
    · Organizations will also get a report to see how their answers to each benchmark question compares to others in their peer group
  • Security Implications of Internet of Things (IoT)
    Security Implications of Internet of Things (IoT) Ebrima Ceesay Recorded: Mar 10 2016 72 mins
    A look at security implications of IoT and how we can tackle the challenges.
  • SSL Traffic - The Cyber Criminal's Best Friend
    SSL Traffic - The Cyber Criminal's Best Friend Darrin Coulson - Blue Coat's VP - Emerging Markets Recorded: Jan 14 2016 52 mins
    Combating Advanced Cyber-threats grows more challenging every day. Cyber criminals are cloaking their attacks within Secure Sockets Layer (SSL) traffic, knowing very well that perimeter security devices are blind to their exploits.
    Despite solving the dilemma that all of your network security devices can have the ability to scrutinize SSL traffic with the right tools in place, the issue of maintaining user privacy is the next concern. How can you inspect SSL traffic for threats while maintaining the privacy of employee online banking, healthcare, and shopping transactions?
    Increased SSL usage causes new headaches for IT security. Monitoring and enforcing compliance with internal and external standards for acceptable use of SSL encryption is difficult at best and needs to be able to look at ALL SSL traffic, not just port 443. Implementation of weak encryption keys and sub-par cipher suites often give organizations a false sense of security.
    This workshop will provid Decision Makers and Security Practitioners with the knowledge to equip existing security devices to inspect SSL traffic and maintain high performance capabilities, while maintaining user privacy and enforcing SSL-usage standards, with a common criteria certified device.
    Don’t miss this opportunity to learn more.
  • Emerging Trends in Threat Intel
    Emerging Trends in Threat Intel Craig Williams, Senior Technical Leader, Security Outreach Manager Cisco Systems Recorded: Jun 4 2015 61 mins
    Gain an insider's knowledge of the latest trends happening in threat intel with this live classroom presented by Craig Williams, a team member of Cisco's Talos.
  • State of the Current Threat Environment: TPP Strategies to Mitigate
    State of the Current Threat Environment: TPP Strategies to Mitigate Joseph Perry, Cybrary SME Recorded: Apr 2 2015 60 mins
    Note: You can only view this event logged into Cybrary's website.

    Learn how to develop a defensive arsenal against some of today's most powerful cyber threats in Cybrary's first live classroom event. Post-Exploitation Hacking SME Joseph Perry will be presenting on the tools, process and practice strategies to mitigate cyber threats LIVE, and you're invited to have a front-row seat! Gain valuable knowledge on the defensive measures that matter most when protecting sensitive data.

Embed in website or blog