Data Backup And Recovery (Video)
This module emphasizes the importance of data backup and recovery.
1:13 minutes
*Courses may vary.
Search Courses
This module emphasizes the importance of data backup and recovery.
1:13 minutes
This micro-learning module emphasizes the importance of locking your screens.
0:35 minutes
This short, one-minute video outlines the risks improperly disposed printed material, technology and removable media can pose to an organization.
1:03 minutes
Why you should use lock screens on your devices.
1:00 minutes
This video covers the risks of carrying out business outside of your facility.
1:00 minutes
This module will explore the basics of incident response and the first rules of keeping people and data safe.
4:49 minutes
The United States imports and exports trillions of dollars’ worth of goods and services every year. This module covers the Customs-Trade Partnership Against Terrorism, or C-TPAT.
7:33 minutes
Defense Federal Acquisition Regulation Supplement (DFARS) Training - An Introduction to security and awareness training
Learners will explore the FAR Code of Conduct and the requirements for staying in compliance as a contractor for the federal government.
5:36 minutes
This module outlines how to properly dispose of criminal justice information (CJI), how to locate and remove CJI securely, when CJI should be destroyed and best practices for destroying CJI.
7:05 minutes
This module covers the necessary defenses against unauthorized access to your facility and any paper copies of criminal justice information in your possession.
9:25 minutes
NIST 800-171 is just one of many federal publications that contractors and companies working with the government are required to comply with. This module will introduce you to NIST 800-171: what it is, and what to do about it.
13:33 minutes
This security and awareness module will explore the issue of organizational compliance with NIST 800-171 guidelines.
10:39 minutes
This module walks learners through common data retention plans, data types typically subject to data retention policies and secure data disposal considerations.
4:32 minutes
This module reinforces the importance of secure data-disposal methods and shares best practices for disposal of sensitive data.
2:17 minutes
Please complete and submit the form below.