Free Online Learning
This article applies to: Training
LinkedIn Learning Featured Training
Current Cornell faculty, students, and staff have access to free online training and development with LinkedIn Learning.
Keep your Computer Secure with LinkedIn Learning
Course: Securing Your Home Office
Working from a home office might be a temporary situation or a permanent choice, but whatever the situation, security is key. In this course, learn how to secure your home office.
Course: Security Tips: Protecting Sensitive Information
Learn tips to protect and exchange your sensitive information using encryption and other tools.
Course: Security Tips Weekly
Learn about topics ranging from password managers to phishing emails, including strategies and tools that can help you become more aware of your own security and how to keep your information safe.
Course: Cybersecurity with Cloud Computing
In this course, learn the major forms of cloud technology, its benefits and risks, and the cybersecurity standards and body of knowledge required to mitigate those risks.
Skillsoft Featured Training
Current Cornell faculty, students, and staff have access to free online training with Skillsoft at Cornell.Percipio.com.
Learn About Cybersecurity Threats with Skillsoft
Video: CompTIA Security+ Attributes of Actors
In this video, you will learn how to define the attributes of actors such as internal, external, sophistication, capability, resources, funding, intent, and motivation.
Audio Book: The Ransomware Threat Landscape: Prepare for, Recognize and Survive Ransomware attacks
This essential guide sets out clearly how ransomware works, helping you better understand the strategic risks and explore measures that can be put in place to protect yourself.
Channel: End User Security
Security is a primary concern for enterprises. Discover the basics of end user security, from methods, tools, and technologies.
eBook: How to Catch a Phish: A Practical Guide to Detecting Phishing Emails
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.
Comments?
To share feedback about this page or request support, log in with your NetID