Past Trainings:
CMMC for Small Manufacturers
VIRTUAL TRAINING
Date: February 25th, 2021
Time: 12pm
The Cybersecurity Maturity Model Certification (CMMC) is here and now a requirement for all manufacturers working with the Department of Defense. Learn how to prepare your business for CMMC compliance in this webinar with BitLyft Cybersecurity
Real Careers in Cybersecurity
VIRTUAL TRAINING
Date: February 3rd, 2021
Time: 12pm
Interested in benefits and opportunities that arise from a career in cybersecurity? Join us for a panel discussion led by staff from BitLyft Cybersecurity as they share their journey and careers in cybersecurity.
Speakers:
Noah Hoaf – Cybersecurity Engineer
Austin Awalt- Software Developer
Security on a Shoestring
Affordable Security Program Solutions for Small and Medium Businesses
VIRTUAL TRAINING
Date: January 19, 2021
Time: 9am – 1pm
Protecting your organization is becoming more and more challenging as prices for security products and services have skyrocketed over the last decade. While larger organizations are able to purchase necessary equipment and hire staff dedicated to security, small and medium sized businesses are not able to keep up. Hackers know this and have redirected their efforts in hopes of pulling off the next large-scale breach. There are plenty of low cost, no cost, solutions available to organizations that have slim budgets. This training will provide information on how to implement these cost effective solutions within your organization.
Cybersecurity: Threat at Your Doorstep
Date/Time: Tuesday, October 20, 2020 at 9:00am
Duration: 4 Hours
Format: Workshop Style
Prerequisites: None
Audience: Business owners, students, faculty, managers and community members. No previous cybersecurity experience required.
This webinar is comprised of several 50-minute modules focusing on the current threat landscape, social engineering, critical controls, common attack vectors and more. Participants receive an in-depth overview of the types of various hackers, the nature and role of training programs and warning signs of an attack. Attendees also participate in a phishing demonstration.