Training Courses

UC Cyber Security Awareness Training

The eCourse on information security awareness training covers basic information regarding security, email, passwords, and social engineering, in addition to introducing contemporary threats and teaching good behaviors that protect information. It is highly recommended for anyone in today's electronic world.

It was created by the UC IT Policy & Security (UCITPS), an organization consisting of the Information Security and Policy Officers of the University of California's 10 campuses and five medical centers.

Instructions

Please visit the UC Learning Center and enter in your UCLA Logon credentials. On the left-hand side of the page under “Quick Links” click on Training Analysis. Here, you will be able to identify the completion due date for the “UC Cyber Security Awareness Training – Refresher.” Click the “Start” button to begin. If a warning indicates that pop-ups are being blocked, temporarily unblock pop-ups to allow the content from the UC LMS. Then refresh the page and the eCourse should appear.

WhiteHat Security Certified Secure Developer Program (WCSD)

WhiteHat Security has created a Certified Secure Developer Program (WCSD) to make it easy for developers to incorporated application security into their development and to enable all developers to write secure code while maintaining the agility and speed that each organization needs.  Led by some of the leading AppSec experts, this program includes a free 5-part webinar training series and complimentary access to the OWASP Top 10 for developers computer-based training course (worth $500).
 
To register for this training, please visit https://www.whitehatsec.com/products/computer-based-training/certified-secure-developer/. The webinar series schedule is as follows:

  • Part 1 - Introduction to Application Security for Developers: April 4th 2017, 11am PT
  • Part 2 - Applying Secure Design Patterns to Common Vulnerabilities: May 2nd, 2017, 11 am PT
  • Part 3 - Applying Secure Design Patterns to Services and APIs: June 6th, 2017, 11am PT
  • Part 4 - Verifying Secure Design Patterns through Testing: July 11th, 2017, 11am PT
  • Part 5 - Integrating Continuous Verification into the Software Development Process: Aug. 1st 2017, 11am PT

Upon completion of the program requirements and passing the certification test, participants will receive the official WhiteHat Certified Secure Developer (WCSD) designation.

Multi-Factor Authentication At UCLA

Multi-factor authentication will provide an added level of security to websites and applications accessed by your UCLA Logon, including MyUCLA. This is achieved through the use of an application called Duo. Once you've enrolled in MFA at UCLA, all login attempts to access resources protected by your UCLA Logon will require using an additional authentication factor through Duo. For more information on enrolling and using MFA, visit the UC Learning Center MFA training course.

Lynda.com security courses

Please go to Lynda.com to log in with your UCLA Logon ID. Once logged in, you can search for the following courses:

Computer Security and Internet Safety Fundamentals (1 h 44 m) - Learn how to safeguard your computers and laptops, keep your digital data secure, and protect your privacy online. This course is a beginner's guide to cybersecurity, showing you ways to prevent malware, viruses, and security breaches on your computers and networks. First, author Jess Stratton guides you through securing your computer—with antivirus software, firewalls, and encryption—and protecting your wireless network.

Computer Security: Investigation and Response (1 h 57 m) - This course covers the basics of computer forensics and cyber crime investigation. It provides an overview of forensic science, and discusses best practices in the field and the frameworks professionals use to conduct investigations.

Cybersecurity with Cloud Computing (2 h 25 m) - How do you keep your organization's files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, It outlines the major cloud security risks, some of which have resulted in service disruptions at companies like Azure, Dropbox, Google, and Amazon, and shows how to plan for and minimize risk when it comes to your own cloud deployments.

Essentials of Cryptography and Network Security (1 h 45 m) - Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure.

Foundations of Cybersecurity (2 h 26 m) - Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. This class shows you how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, ISO 27000, and the Payment Card Industry Data Security Standard (PCI DSS).

Foundations of IT Security: Core Concepts (1 h 13 m) - Computing and Internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. This beginner-level course covers core security concepts and introduces risks such as social engineering, malware, and spyware.

Introduction to Ethical Hacking (1 h 12 m) - What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired stills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you.

Introduction to Kali Linux (2 h 20 m) - Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers. Using Kali Linux, certified ethical hackers can test networks on their organizations' behalves, to see if they're vulnerable to outside attacks. This course will give prospective ethical hackers a short overview of the tools in Kali Linux.

Practical Cybersecurity (2 h) - Protect your network from cyber attacks. This class shows you how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems.