Learn to address cybersecurity concerns through all tiers of the global supply chain and with companies directly involved in delivery of products, services, and solutions to the federal government.
Learn to address cybersecurity concerns through all tiers of the global supply chain and with companies directly involved in delivery of products, services, and solutions to the federal government.
Lower levels of the supply chain are a huge risk to prime contractors and the government. Smaller companies often don't have the resources to properly secure their systems or their controlled unclassified information (CUI). Proper oversight is key.
This course provides guidance to ensure that all members of the supply chain protect their systems and CUI from cybersecurity attacks.
This course is intended for contracting personnel in the Federal Government and commercial sectors who need to provide oversight of cybersecurity regulations and compliance in the supply chain.
Learning Objectives:
Management Concepts is the nation’s premier provider of career development, performance improvement, and human capital solutions for the public sector. Since 1973, we have collaborated with and supported Federal Government agencies and state and local governments to empower individuals, teams, and organizations to grow and achieve their personal and organizational missions with our high-impact training and transformative consulting solutions.
Accelebrate’s CISSP Test Prep training class prepares attendees to take the Certified Information Systems Security Professional exam.
CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required for any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs.
Cybersecurity is one of the fastest growing fields in the technology industry, and the demand for qualified professionals far outpaces the supply. "Red team," or offensive security professionals, test systems for existing vulnerabilities.
This course covers the duties of Cybersecurity Analysts, Systems Security Analyst, Threat Analyst, and Vulnerability Assessment Analysts and those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such in...
The course explains security principles, strategies, coding techniques, and tools that can help make software fault tolerant and resistant to attacks. Students will write and analyze code that demonstrates specific security development techniques.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy