Get Help: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
|||
(71 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
= | {| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;" | ||
==[[ | |- | ||
| rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:german-shepherds.png|frameless|225px|center|link=Need_Help?]] | |||
==[[ | | style="vertical-align: middle; border: none; background-color: #FFFFFF; text-align: center; width: 25%;" | <div style="font-weight:bold;">[[Cybercrime Prevention, Reporting, & Recovery|Cybercrime Victim Resources]]<br>[[File:Meerkat colony 1.png|frameless|75px|link=Cybercrime Prevention, Reporting, & Recovery]]</div><div style="font-size:smaller; font-weight:normal; text-align: left;"> | ||
* How to avoid becoming a victim. | |||
= | * Response and recovery resources. | ||
* Where to report cybercrimes. | |||
* | </div> | ||
* | | style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">[[Social Media|Social Media]]<br>[[File:Swarming_monarch_butterflies_2.png|frameless|75px|link=Social Media]]</div><div style="font-size:smaller; font-weight:normal; text-align: left;"> | ||
* Cybersecurity Podcasts | |||
* Cybersecurity YouTube Channels | |||
* Cybersecurity LinkedIn Groups | |||
</div> | |||
| style="vertical-align: middle; border: none; background-color: #FFFFFF; text-align: center; width: 25%;" | | |||
<div style="position:relative; font-weight:bold;">[[Training & Certification|Training & Certification]]<br> | |||
[[File:Wolf.png|frameless|75px|center|link=Training & Certification]] | |||
<div style="font-size:smaller; font-weight:normal; text-align:left;"> | |||
* University Programs & Ad Hoc Courses | |||
* Security Certification Programs | |||
* Tool Specific Training Resources | * Tool Specific Training Resources | ||
</div> | |||
== | </div> | ||
|- | |||
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">[[Consultants & Service Providers|Consultants & Service Providers]]<br>[[File:Peregrine_falcon_2.png|frameless|75px|link=Consulting_&_Service_Providers]] | |||
<div style="font-size:smaller; font-weight:normal; text-align:left;"> | |||
* Volunteer Cybersecurity Organizations | * Volunteer Cybersecurity Organizations | ||
* Commercial Cybersecurity Consultants | * Commercial Cybersecurity Consultants | ||
* Managed Security Service Providers | * Managed Security Service Providers | ||
</div> | |||
</div> | |||
==Self-Service Tools & | | style="vertical-align: middle; border: none; background-color: #FFFFFF; text-align: center;" | <div style="position:relative; font-weight:bold;">[[Self-Service Tools & Funding|Self-Service Tools & Funding]]<br>[[File:Beavers.png|frameless|75px|link=Self-Service_Tools_&_Funding]] | ||
<div style="font-size:smaller; font-weight:normal; text-align:left;"> | |||
* Self-Assessment & Inventory Tools | |||
* Incident Response Simulators | * Incident Response Simulators | ||
* | * Financial Aid Sources | ||
</div></div> | |||
== | | style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">[[Publications|Publications]]<br>[[File:Inquisitive_raven_2.png|frameless|75px|link=Publications]] | ||
<div style="font-size:smaller; font-weight:normal; text-align:left;"> | |||
* Analysis Reports | * Analysis Reports | ||
* Periodicals | * Periodicals | ||
* Newsletters | * Newsletters & Blogs | ||
</div></div> | |||
|} |
Latest revision as of 05:35, 30 April 2024
|
|
Training & Certification
| |
Consultants & Service Providers
|
Self-Service Tools & Funding
|