Power Up! Jumpstart Your Security Program

Power Up! Jumpstart Your Security Program

Grow and scale your security program by learning to analyze risk and promote a culture of security in your organization.

rate limit

Code not recognized.

About this course

There’s a lot to learn about security, and for many organizations, deploying Duo multi-factor authentication (MFA) is just the first step in creating a more secure environment. Many people rolling out MFA are new to it or are looking to improve the security culture in their organization. The experts in this course will introduce you to some basic security concepts and share tips on assessing your organization’s risk.

By the end of this course, you should be able to:

  • Create a basic threat model for your organization
  • Evaluate strategies to improve security culture in your organization
  • Locate additional resources to further your own security education

 

Curriculum

  • Meet Our Experts
  • Video: Introduction (5:06)
  • Workshop: Threats, Risks, and Bears
  • Video: Assessing the Business (1:44)
  • Sample Questionnaire for End-Users & Teams
  • Video: Security Culture (4:41)
  • Building Relationships with End-Users
  • Video: Nominating Security Champions (2:04)
  • Summary & Resources
  • Knowledge Check
  • Share Feedback (Optional)

About this course

There’s a lot to learn about security, and for many organizations, deploying Duo multi-factor authentication (MFA) is just the first step in creating a more secure environment. Many people rolling out MFA are new to it or are looking to improve the security culture in their organization. The experts in this course will introduce you to some basic security concepts and share tips on assessing your organization’s risk.

By the end of this course, you should be able to:

  • Create a basic threat model for your organization
  • Evaluate strategies to improve security culture in your organization
  • Locate additional resources to further your own security education

 

Curriculum

  • Meet Our Experts
  • Video: Introduction (5:06)
  • Workshop: Threats, Risks, and Bears
  • Video: Assessing the Business (1:44)
  • Sample Questionnaire for End-Users & Teams
  • Video: Security Culture (4:41)
  • Building Relationships with End-Users
  • Video: Nominating Security Champions (2:04)
  • Summary & Resources
  • Knowledge Check
  • Share Feedback (Optional)