Online Training Resources

There are more options all the time for online learning opportunities. Many are relevant content and even award CPEs. We wanted to share some resources since now more than ever it has become important to embrace remote learning.

Since more and more people are finding it more necessary to find remote training opportunities, here are some providers stepping up.

Websites with learning

These sites are known for producing high-quality content and offering certificates, CPEs, and even degrees.

Individual Courses

These are specific courses or events that may also be of interest.

  • Individual courses will be added over time; also check our calendar

Local Events

Do Your Part. #BeCyberSmart

Cybercriminals are relentless in their pursuit to reach you. Their unsolicited email, telephone calls, and even text and chat messages — which were once viewed as just a nuisance ― are now potentially harmful scams. And the target is none other than you. 

Join us in October for NC State’s Cybersecurity Awareness Month (CSAM) program, “Do Your Part. #BeCyberSmart,” and participate in activities that will increase your awareness of security issues that impact you. 

Who’s Calling? Understanding the Scourge of Robocalls

On Wednesday, Oct. 6, Brad Reaves, assistant professor in the NC State Department of Computer Science and a member of the Wolfpack Security and Privacy Research (WSPR) Lab, will present the keynote address, “Who’s Calling? Understanding the Scourge of Robocalls,” from 1 p.m. to 2:30 p.m. online. 

Telephone subscribers in the US are inundated by frequent unsolicited calls known as robocalls, and this is arguably one of the greatest cybersecurity issues facing people today. In this talk, Reaves will explain how and why the robocall problem became so significant, how NC State research reveals how these robocallers operate, and what is being done to put an end to the problem.

Reaves’ research is dedicated to measuring and improving the security and privacy of computer systems, with a particular emphasis on telephone networks and software for mobile platforms. This work has addressed detection and measurement of mobile malware in the wild, identified systemic risks in developing world mobile money systems, and provided new techniques to distinguish legitimate and fraudulent phone calls. His research integrates knowledge from fields as diverse as signal processing and digital communications; data science, machine learning and statistics; cryptography; program analysis; reverse engineering; and Internet and telephone networks.

To register, visit REPORTER. This event is open to the general public.