Education

Information security threats evolve on a daily basis, organizations with a well rounded cyber security plan understand the need for continual education in this area.  Security awareness is one of the best security controls organizations can implement.  Being associated with a land grant university, CyberTAP is perfectly suited to develop a custom training curriculum for your needs.  Training can be delivered onsite at your facility, online via CyberTAP’s learning management system, or at a Purdue University campus near you.

Cyber-Range Training

CyberTAP, is excited to offer state-of-the-art simulation and training in a robust environment.  These live-fire exercises will walk learners through real life experiences of facing adversarial cyber threats.  With more than a dozen scenarios, learners and companies can choose from our standard set of offerings or customize a course for their needs.  

 

Applied Cybersecurity Essentials (ACE) Course

Our synchronous and asynchronous Applied Cybersesurity Essential course covers the essentials of cybersecurity while making it an applied learning opportunity.  The course covers the foundational concepts of cyber security,vulnerability management, enterprise security, and identity access management.   Ask us about it today!

Compliance

Many industry standards and State & Federal regulations require that organizations educate their employees on the risk of cyber security threats.  Improving the cyber security hygiene of employees require proactive, timely, and meaningful educational programs.  CyberTAP is available to assist organizations in the development and delivery of compliance based employee training for HIPAA, PCI, DoD DFARS, ISO, etc.

Phishing Simulation

The five most common attack types that social engineers use to target their victims are phishing, pretexting, baiting, quid pro quo and tailgating. More than 40% of all information breaches result from this malicious online activity, with 98% of these incidents carried out by phishing, according to the 2017 Verizon Data Breaches Investigation Report.

Phishing uses targeted messaging to steal information or gain unauthorized access to computer systems. It is primarily conducted via email but can come in the form of voicemail, SMS texting and even social media posts. Phishing attempts ask you to provide sensitive information, encourage you to click links, or urge you to download attachments.

Purdue’s CyberTAP team provides Phishing Simulation Education to test your employee’s with computer access of their susceptibility to clicking on suspicious links, opening unsolicited attachments, and sharing information with unverified websites.  Point-in-time training occurs in the event that an employee interacts with a phishing message.   This timely remediation training addresses what to look for and how to respond to suspicious messaging.  Monthly security awareness reminders, flyers, and training are made available for all active phishing simulation clients.

Custom Training

Need a specialized training program for your technical staff? Looking to grow your security team’s internal capability?  CyberTAP can develop a customized cyber security bootcamp, refresher course, or certification prep course.

 

Contact

George Bailey
George Bailey
MS, CISSP, GCIH
Assistant Director
(765) 494-7538
baileyga@purdue.edu

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2015 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Office of Corporate and Global Partnerships

Trouble with this page? Disability-related accessibility issue? Please contact Office of Corporate and Global Partnerships at ocgp@purdue.edu.