Get Help: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 2: Line 2:
|-
|-
| rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:german-shepherds.png|frameless|225px|center|link=Need_Help?]]
| rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:german-shepherds.png|frameless|225px|center|link=Need_Help?]]
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Cybercrime Prevention, Reporting, & Recovery<br>[[File:Meerkat colony 1.png|frameless|75px|link=Cybercrime Prevention, Reporting, & Recovery]]</div><div style="font-size:smaller; font-weight:normal; text-align: left;">
| style="vertical-align: middle; border: none; background-color: #FFFFFF; text-align: center; width: 25%;" | <div style="font-weight:bold;">Cybercrime Prevention, Reporting, & Recovery<br>[[File:Meerkat colony 1.png|frameless|75px|link=Cybercrime Prevention, Reporting, & Recovery]]</div><div style="font-size:smaller; font-weight:normal; text-align: left;">
* Conferences, Roundtables, and Meetups
* Conferences, Roundtables, and Meetups
* Virtual, In Person, and Combined Events
* Virtual, In Person, and Combined Events
* Free and For Pay Events
* Free and For Pay Events
</div>
</div>
| style="vertical-align: middle; border: none; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Social Media<br>[[File:Swarming_monarch_butterflies_2.png|frameless|75px|link=Social Media]]</div><div style="font-size:smaller; font-weight:normal; text-align: left;">
| style="vertical-align: middle; border: background-color: #EBEBEB; none; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Social Media<br>[[File:Swarming_monarch_butterflies_2.png|frameless|75px|link=Social Media]]</div><div style="font-size:smaller; font-weight:normal; text-align: left;">
* Cybersecurity Podcasts
* Cybersecurity Podcasts
* Cybersecurity YouTube Channels
* Cybersecurity YouTube Channels
* Cybersecurity LinkedIn Groups
* Cybersecurity LinkedIn Groups
</div>
</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" |
| style="vertical-align: middle; border: none; background-color: #FFFFFF; text-align: center; width: 25%;" |
<div style="position:relative; font-weight:bold;">Training & Certification<br>
<div style="position:relative; font-weight:bold;">Training & Certification<br>
[[File:Wolf.png|frameless|75px|center|link=Training & Certification]]
[[File:Wolf.png|frameless|75px|center|link=Training & Certification]]
Line 22: Line 22:
</div>
</div>
|-
|-
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Consultants & Service Providers<br>[[File:Peregrine_falcon_2.png|frameless|75px|link=Consulting_&_Service_Providers]]
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Consultants & Service Providers<br>[[File:Peregrine_falcon_2.png|frameless|75px|link=Consulting_&_Service_Providers]]
<div style="font-size:smaller; font-weight:normal; text-align:left;">
<div style="font-size:smaller; font-weight:normal; text-align:left;">
* Volunteer Cybersecurity Organizations
* Volunteer Cybersecurity Organizations
Line 29: Line 29:
</div>
</div>
</div>
</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Self-Service Tools & Funding<br>[[File:Beavers.png|frameless|75px|link=Self-Service_Tools_&_Funding]]
| style="vertical-align: middle; border: none; background-color: #FFFFFF
; text-align: center;" | <div style="position:relative; font-weight:bold;">Self-Service Tools & Funding<br>[[File:Beavers.png|frameless|75px|link=Self-Service_Tools_&_Funding]]
<div style="font-size:smaller; font-weight:normal; text-align:left;">
<div style="font-size:smaller; font-weight:normal; text-align:left;">
* Self-Assessment & Inventory Tools
* Self-Assessment & Inventory Tools
Line 35: Line 36:
* Financial Aid Sources
* Financial Aid Sources
</div></div>
</div></div>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Publications<br>[[File:Inquisitive_raven_2.png|frameless|75px|link=Publications]]
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Publications<br>[[File:Inquisitive_raven_2.png|frameless|75px|link=Publications]]
<div style="font-size:smaller; font-weight:normal; text-align:left;">
<div style="font-size:smaller; font-weight:normal; text-align:left;">
* Analysis Reports
* Analysis Reports

Revision as of 00:40, 8 April 2024

German-shepherds.png
Cybercrime Prevention, Reporting, & Recovery
Meerkat colony 1.png
  • Conferences, Roundtables, and Meetups
  • Virtual, In Person, and Combined Events
  • Free and For Pay Events
Social Media
Swarming monarch butterflies 2.png
  • Cybersecurity Podcasts
  • Cybersecurity YouTube Channels
  • Cybersecurity LinkedIn Groups
Training & Certification
Wolf.png
  • University Programs & Ad Hoc Courses
  • Security Certification Programs
  • Tool Specific Training Resources
Consultants & Service Providers
Peregrine falcon 2.png
  • Volunteer Cybersecurity Organizations
  • Commercial Cybersecurity Consultants
  • Managed Security Service Providers
style="vertical-align: middle; border: none; background-color: #FFFFFF
text-align
center;" |
Self-Service Tools & Funding
Beavers.png
  • Self-Assessment & Inventory Tools
  • Incident Response Simulators
  • Financial Aid Sources
Publications
Inquisitive raven 2.png
  • Analysis Reports
  • Periodicals
  • Newsletters & Blogs