In my last blog post on August 20th this year, one of the Lynda.com links I included was a course in Cybersecurity at work. Since then some major New Zealand companies such as the NZ Stock Exchange and the Metservice have been affected by cyber attacks. I hope the courses included here will give some guidance on how you can protect your company. Also if you are thinking of getting into the industry, I’ve included some insights from a cybersecurity professional.
Cybersecurity for small and medium sized businesses: Essential training Using the NIST Cybersecurity Framework—an international standard created by the National Institute of Standards and Technology—Kristin Judge takes you through a five-step process that can help you better secure your business. The course runs for roughly 1 1/2 hours and is at a beginners level and includes topics such as Protecting valuable data and accounts, recovering from a breach, and technology checklists for small and medium businesses.
Cybersecurity Foundations . This 2 hour course uploaded this year is designed to help you in assessing and mitigating risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, and the Payment Card Industry Data Security Standard (PCI DSS). Malcolm details pertinent cyber threats and how they operate, including how cyber criminals hide their attacks, how advanced persistent threats (APTs) work, and even how to determine what’s real and what’s merely cyber fear, uncertainty, and doubt (FUD). (intermediate level)
The cybersecurity threat landscape. This Marc Menninger 1 hour beginner’s course describes some of the most common cybersecurity threats, including phishing and ransomware, as well as newer attack vectors like cryptojacking, cloud-based threats, and unsecured Internet of Things (IoT) devices. He then teaches the best countermeasures for reducing or eliminating the impact of these threats.
Learning supply chain cybersecurity. In this hour long intermediate level course, Dr. Emma Osborn discusses how supply chains are evolving, and the different ways that businesses within the supply chain interact. She reviews examples of real-world supply chains and uses these to explore how the scope of cybersecurity risk is creeping past traditional organizational boundaries. You can then learn some approaches for managing relationships and improving supply chain security, discovering what works best for each scenario.
And finally, Insights from a cybersecurity professional. In this interview-style course, Mike Chapple answers questions such as…How does one break into the cybersecurity field? What are the various career tracks? How do organizations prevent a security breach? What are the compliance issues? Who is responsible for security in the cloud? and How does IT security impact other business divisions?