This course is currently closed
- Visit our Frequently Asked Questions page for more information.
- Visit our Glossary to view definitions of cybersecurity related terms.
- Email us at Cybersecurity@EncoreSupportSystems.com.
- Connect with us on Facebook and LinkedIn.
- Visit us at EncoreSecurityServices.com
- Ensure your sound is enabled and turned up in order to listen to the video audio.
- Closed captioning is available for all users.
- To turn on closed captioning, select the “CC” button located on the bottom right of the play bar, next to the settings button.
- When using closed captioning, we recommend using “Fullscreen” view which can be found on the bottom-right corner of the play bar.
- Once a topic is complete, the course will automatically load the next video. Click on the video or use the play button to start the next topic.
- Select “Start Here – Course Introduction” below the Course Content to get started (as shown below).
Module II – Best Practices for Detecting, Assessing, Reporting, and Addressing Information Security Threats 2 Topics