top of page
Untitled design.png

Training

Cybersecurity topics can be complex, confusing, and misleading. We strive to develop relevant content that is easy-to-understand and helps to demystify cyber risk, data privacy, security controls, threats, standards, regulations, cyber insurance and other related topics. 

watermark4.png

Learn about Cyber Risk.

WEBINAR - Protecting Patient Data (full recording)
48:12
The most damaging threats you need to know about right now! Business Email Compromise
08:09
Why Cyber Insurance Is a Must-Have for Companies to Protect Their Assets and Reputation?
11:52
DKIM, SPF, and DMARC
14:49

Learn about Security Controls.

What is Email Filtering?
03:04
Why IR Retainers Are Important
02:18
Why Attack Surface Testing Is Important
02:11
Why Privileged Access Is Important
02:10

Learn about Threats.

What is Payment Card Compromise?
03:17
What is Insider Threat?
02:40
What is Ransomware?
03:18
What is Data Leakage?
03:38

Learn about Cyber Insurance.

Why is Cyber Insurance Essential?
09:04
5 things you should do before applying for Cyber Insurance
06:05
Understanding different types of Cyber Insurance Coverage
06:11
Why Cyber Insurance Is a Must-Have for Companies to Protect Their Assets and Reputation?
11:52

Cybersecurity for Insurance.

​Cybersecurity for Insurance is a robust curriculum that provides students with the necessary knowledge needed to specialize in the field of cyber insurance in a way that is engaging, dynamic and tailored to the student’s individual needs.  

19873757031645017476-512.png

Graduation Certificate

Upon completion of the course students receive a certificate valid for 1 year.

16.png

40 Hours of Learning

The course is typically completed within 2-4 months, self-paced, and is available 24x7.

7813720581641963892-512.png

Expert Teachers 

Our content is delivered by expert university professors and insurance executives.

15984328721530513410-512.png
15984328721530513410-512.png
15984328721530513410-512.png
15984328721530513410-512.png
15984328721530513410-512.png

Chapter 1: Introduction to Cyber

 

Chapter 2: Technology Framework

 

Chapter 3: Attack Surface

 

Chapter 4: Cyber Threats

 

Chapter 5: Security Controls

15984328721530513410-512.png
15984328721530513410-512.png
15984328721530513410-512.png
15984328721530513410-512.png
15984328721530513410-512.png

Chapter 6: Regulations and Frameworks

 

Chapter 7: Basics of Cyber Insurance

 

Chapter 8: Cyber Policy Content

 

Chapter 9: Risk Evaluation Process

 

Chapter 10: Advanced Topics

bottom of page