Texas Department of Information Resources (DIR) Certified Training
Essential security awareness programs
Empower people to protect their organization.
In support of Texas House Bill (HB) 3834, the Texas Department of Information Resources has certified three Optiv cybersecurity training programs for state and government employees.
No matter how advanced your security technology, every organization has risks associated with its workforce. Human risk is difficult to quantify because stakeholders must consider every type of threat, malicious, negligent and unwitting. Investing in a holistic program to educate and empower everyone who touches your network inherently reduces the risk by increasing awareness and impacting culture. In addition, employee engagement and retention increase when end users find educational content relatable, meaningful and aligned with their organization’s culture.
State, local and educational organizations can choose from various programs to help employees be more secure in their daily routines and, as a result, protect sensitive data. Each program helps employees develop positive behavior changes through engaging and meaningful coursework. Plus, this program can be hosted on an organization’s internal SCORM-compliant learning management system (LMS) or Optiv’s LMS.
Transform your organization with these DIR-approved training programs
Microlearning courses that concisely examine focused security topics utilizing technology, examples and best practices that learners at nearly any experience level can use. (Includes: Cloud Security, Data Privacy, Email Security, Insider Threat, Social Engineering, Workplace Security.)
Comprised of 10-minute courses that use a gamified learning approach. The Masterminds, a group of cybercriminals, use CyberBOTs to commit cyberattacks in each course, and learners are tasked with defeating them. (Includes: Cloud Security, Data Privacy, Email Security, Insider Threat, Social Engineering, Workplace Security.)
Security Awareness Circuit Training
Immersive 10-minute courses where users are presented with real-world scenarios with the consequences of their actions affecting scenario progression. (Includes: Cloud Security, Data Privacy, Email Security, Insider Threat, Social Engineering, Workplace Security.)