

Netiquette Guidelines for Online Students
Netiquette Guidelines for Online Students The following Netiquette Guidelines are suggestions for success in your online learning environment. Software Usage The course software and server are property of the College District. Use of the electronic communication tools, such as chat, discussion boards, or email for personal gain or gain on behalf of other individuals or organizations or for soliciting funds for charity, non-profit organizations, schools, or other businesses

Class Resources
Additional class resources like slides, graphics, examples, eBooks, and other resources are available on the Las Positias document share Marvin. Marvin is only accessible from computers on the Las Positas network. To access those resources, open the network location \\marvin\Instructor\Donald Hester\ You can open this location from the run command for from windows explorer. Resources available on the Internet: Slides and infographics from Donald’s past speaking engagements a


Cyber Security for SMB
Small businesses are wide open for hacking. What can small business do to if large companies with dedicated security staff can’t stop data breaches? What small and mediums business need to know about cyber security. The risks related to social media, hackers, Identity Theft, Data Breaches, Espionage...
This video is from a session for a chamber of commerce talk at Coastline Community College. #Cybersecurity #PCI #Compliance #SocialMedia #DataBreach #Espionage #RiskManagem


Use Azure Security Center to prevent, detect, and respond to threats
"Microsoft Azure Security Center helps organizations prevent, detect, and respond to threats by providing increased visibility into the security of cloud workloads and advanced analytics to identify attacks that might otherwise go undetected. Gain insights into how cloud workload owners, IT security professionals, and security operations centers are using Azure Security Center to meet their security management and monitoring needs. We walk through real-world examples, share l


Security Standards for Processing Credit Cards
All organizations that process payment cards (Visa, MasterCard, AMEX, etc...) have to comply with the Payment Card Industry Data Security Standard (PCI DSS). All organizations will eventually have to provide evidence of compliance by self-assessment questionnaires, network vulnerability scans, and/or audits to their acquiring bank.
Any organization that processes, stores or transmits credit card information must comply with the Data Security Standard. This includes organ


Building and Maintaining a Successful RMF Program
TU Building and Maintaining a Successful RMF Program
Starting or maintaining an effective and efficient risk management program (RMF) is key for success. Cybersecurity challenges often take time away from this key aspect of implantation. This is second in a series on NIST’s Risk Management Framework (RMF). This session covers topics in (ISC)2 CAP certification, FISMA, DIACAP and DIARMF. #RMF #TU #RiskManagement #NIST #FISMA #Cybersecurity #CAP #ISC2


Office 365 Cyber Security
Secure Office 365 like a cybersecurity proassessing risk and implementing controls Based on proven experience, our top Office 365 cybersecurity consultants provide coaching on how to assess risk and implement the rich set of security, compliance, and information protection controls. Learn how to prioritize security threats, translate threats into technical strategy, and then take a systematic approach to implementing features and controls. This session covers the primary area


Introduction to NIST’s Risk Management Framework (RMF)
TU Introduction to NIST’s Risk Management Framework (RMF) StartFragmentThis introductory session will cover the basic steps of the Risk Management Framework (RMF) and the transition away from the previous Certification and Accreditation approach to information systems security and assurance. This will also cover the benefits of the RMF for organizations, local, state, and federal governments. This is first in a series on NIST’s Risk Management Framework (RMF). This session co


Tips for Server Rooms
Server Room Environmental and Physical Security Server Rooms This is a short check list of things to consider when planning your server room/data center. A formal risk analysis should be done to determine what exactly are the risks and what controls are needed and at what level and cost. Obviously small organization will not be able to take all of these preventative measures and they may decide that the cost is out weighed by the benefit. The decision on what risks to acce


Microsoft Ignite Keynotes
Ignite Keynote Description: “Technology continues to rapidly evolve, offering us new ways of working and powering digital transformation for all organizations. Key to our ability to harness technology is our ability to evolve with it, to harness new capabilities and learn new skills. Join Scott Guthrie, Executive Vice President, Microsoft; on Monday morning to start Microsoft Ignite. Scott will focus on how technology enables digital transformation and, along with guests, dem