Training & Education Services

Written by Edtech Entrepreneur, Education Evangelist, Exercise Enthusiast

The ‘Wild Wild Web’ (www), like the early days of the American Western Frontier, has become a haven of Criminal Hackers and Malware.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Think you got it now?  Are you ready to try a test?  Security Concepts Quiz 1.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Virtual Vocabulary - can you navigate an interview involving all these terms?

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Here's the vocabulary you need to navigate any security publication.  Sitting on the train?  Do a low stress brain refresh.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

How many unauthorized data exfiltration attempts have been detected recently by the organization's Data Loss Prevention (DLP) system? What percentage of the organization's business systems are not utilizing host based Data Loss Prevention (DLP) software applications? Whether it was a customer request or a conversation with an examiner, they expected a detailed answer broken out by business unit.  If you manage compliance, you are accountable to these answers. 

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Networking and Security concepts are critical to assessing security policy in networked and cloud environments.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

If Steven Tyler did security, it would be really cool security.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Can you pen test?  Can you do it better than a blackhat? 

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Does Audit Make us Secure?  Presented at ISACA SV Spring Conference, May 15th, 2015

Robin Basham, M.Ed, M.IT, CISSP, CISA, CRISC, CGEIT, HISP, CRP, VRP

Founder EnterpriseGRC Solutions

Companies that passed audit and had a major breach

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
ISACA

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

 Virtualization Wordsearch - When you have a virtual vocab, you can listen to the engineering concepts that matter.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

EnterpriseGRC Solutions Reading Room (out of date - to be updated soon)

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive