Free Excel Skills Assessment

Very short questionnaire to establish your skill level with Microsoft Excel.

Excel Assessment

Free Microsoft Word Skills Assessment

Very short questionnaire to establish your skill level with Microsoft Word.

Word Assessment

Free PowerPoint Skills Assessment

Very short questionnaire to establish your skill level with Microsoft PowerPoint.

PowerPoint Assessment

Complimentary Security Webinars for Cybersecurity Awareness Month

Bring your data to life with Microsoft Power BI Bring your data to life with Microsoft Power BI
Previous Article
8 Skills You’ll Master When You Earn Your CompTIA A plus Certification 8 Skills You’ll Master When You Earn Your CompTIA A plus Certification
Next Article

October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month (NCSAM). This annual cybersecurity event places the spotlight on all things security. To help promote this business-critical topic, New Horizons is hosting a month-long series of cybersecurity focused webinars in October to raise awareness about today’s ever evolving cyber threat landscape. 

These cybersecurity webinars will provide you with a better understanding of how to stay safer online, along with industry cybersecurity options to help enhance your organization's cyber resilience and overall cybersecurity posture. Working with partners such as AXELOS, CompTIA, Cisco, EC-Council, ISACA, and Logical Operations, New Horizons is helping train IT professionals, as well as educate business professionals to enhance both your personal and professional cybersecurity practices to help make organizations more cyber resilient and secure.

 
Security training by New Horizons Ireland
Check out our security courses here
 

The State of Security: Turning Challenges into Solutions

When: October 5, 2016 9:00 am PDT / 12:00 pm EDT / 5:00 pm BST 

Presenter: Stephen Schneiter – Manager, CompTIA Instructor Network Program

50 billion devices will be connected to the internet by 2020, and these increasing connections are already changing the security landscape by exponentially expanding the attack surface. Security breaches are born from a weak link in the security chain and hackers are committed to finding these weak links. How prepared is your company?

REGISTER
 

Building Effective Cyber Resilience

When: October 11, 2016 9:00 am PDT / 12:00 pm EDT / 5:00 pm BST 

Presenter: Nick Wilding - Head of Cyber Resilience, AXELOS Global Best Practice

All too often cyber attackers find it easier to influence and engage with our staff than we do. The fact is that the majority of successful cyber-attacks succeed because of human error - cyber resilience is fundamentally a human and not just a technology issue. We need to change behaviors, providing the simple, practical guidance that all our people need to make the right decisions at the right time. RESILIA™ is a portfolio of certified training, awareness learning and leadership engagement tools designed to put people at the center of your cyber resilience strategy. Are your people your most effective defense to cyber-attacks? This informative session will guide you on embedding and sustaining the behavior change required across the organization for effective Cyber Resilience.

REGISTER
 
 
 
 
 
 
 
 
 
 
 
 
 

How to Help Prevent a Data Breach

When: October 13, 2016 8:30 am PDT / 11:30 am EDT / 4:30 pm BST 

Presenter: Warren Bonner - Technical Instructor New Horizons Computer Learning Centers

A recent study by CompTIA cited human error as the most common cause of information security breaches, with some 80% of respondents believing this human error was caused by a lack of security knowledge, training, or failure to follow security procedures.

To eliminate threats throughout the organization, security must reach beyond the IT department. A company must evaluate employee exit strategies (HR), remote project protocol, on- and off-site data storage practices, and more—then establish and enforce new policies and procedures and physical safeguards appropriate to the findings.

Join Technical Instructor Warren Bonner as he discusses several ways your business can help prevent a data breach, including:

  • Conducting a periodic risk assessment
  • Educating employees about appropriate handling and protection of sensitive data
  • Establishing a comprehensive data loss protection plan
  • Providing training and technical support to mobile workers
REGISTER
 

Blind Spots in Network Defense

When: October 18, 2016 9:00 am PDT / 12:00 pm EDT / 5:00 pm BST 

Presenter: Wesley Alvarez – Director of Academics, U.S. EC-Council

Organizations are facing blind spots in their network defenses, and are finding it difficult to address them due to a lack of network security knowledge. However, Network Administrators can become a first line of defense for organizations, when properly prepared. Join Wesley Alvarez from EC-Council as he presents on the gap in cyber network defense today, and how it can be addressed with Certified Network Defenders.

REGISTER
 

Maintaining Security in a Mobile Business World

When: October 20, 2016 9:00 am PDT / 12:00 pm EDT / 5:00 pm BST 

Presenter: Jarred White – Security Architect, AirWatch

Ensuring that your enterprise mobility deployment is secure and that corporate data is protected with end-to-end security that extends to users, devices, applications, content, data, email and networks is paramount in today’s mobile and BYOD business world. Whether using a corporate-owned or employee-owned device, employees access corporate data, email and more from their mobile devices. These user actions require you to implement a mobile strategy with strong security policies. Join Jarred White, Security Architect for AirWatch, as he discusses mobile business security challenges and solutions.

REGISTER
 

I Always Feel Like Somebody’s Watching Me

When: October 25, 2016 9:00 am PDT / 12:00 pm EDT / 5:00 pm BST 

Presenter: Stephen Schneiter – Manager, CompTIA Instructor Network Program

This webinar will take a look at the possible threats IoT may pose and the skills sets shared between end-users and IT professionals that will better prepare consumers to effectively use these new technologies while protecting information. We will focus on the “tools of the trade” IT Security professionals are using to collect and analyze network traffic to detect and eliminate threats.

REGISTER
 

Building a Cybersecurity Training Path and Long-Term Credentialing Program

When: October 27, 2016 8:30 am PDT / 11:30 am EDT / 4:30 pm BST 

Presenter: Paul Huffman, Director of Certification, Logical Operations
Joe Mignano, VP of Channels, Logical Operations

Would you entrust your company's cybersecurity to only two IT employees, or would you rather verify that ALL of your employees are trained to recognize and avoid cyber threats?

Training your IT team to analyze threats and proactively defend networks is critical to protecting your organization, but it's not the whole picture. As we focus on cybersecurity awareness throughout the month of October, it's the perfect time to talk about how every employee plays a key role in maintaining your organization's cybersecurity. In this webinar, we will walk you through a recommended cybersecurity training path that we created to help you determine what type of cybersecurity training different levels of employees (end users, IT staff, and IT Cybersecurity staff) should be focused on obtaining. We’ll also review ways to continuously verify comprehension of cybersecurity awareness knowledge, and how to structure a credentialing program in a way that encourages learning and long-term application of knowledge (vs. the traditional method of cramming for a test and forgetting the knowledge thereafter).

REGISTER
 

 

/ Author: Liam Phelan / Number of views: 2182 / Comments: 0 /
Print
Categories:Cybersecurity

Theme picker

Loader

Categories

Subscribe to our Newsletter

cheat sheet resources

Subscribe to our Newsletter for all the latest cheat sheets and resources.

Subscribe


Follow us on Linkedin for the lastest cheat sheets and learning resources