Why Sixty Second Training?

Sponsoring training has never been so fast and easy!

Create Account

Complete a simple registration form by providing your name, email address, secure password and work industry by classification. It’s that simple.

Activate Courses

Review our course library, select those that meet your training needs, and purchase the number of seats you need using a credit card or purchase order.

Create Playlists

As Training Manager you create playlists of one or many courses based on the training needs of your employees. Each course serves in the sequence defined in the playlists. Playlists CAN be reordered as necessary.

Assign Training

Once you’ve created a training playlist you can begin to assign them to yourself or anyone you designate. Create your student list by typing or copying & pasting email address lists into our form.

Manage Training

Your students receive email notifications once training has been assigned. You can see when they accept the email, monitor their training status, send reminders and even print completion certificates.

Ensure Compliance

When the Auditor asks for proof that you've trained your employees or encouraged awareness you can simply export timestamped digital training records to Excel OR import a CSV into any records system.


Latest Courses

Comprehensive CIP 2019

Comprehensive SCORM course covering ALL CIP standards topics required for NERC compliance. Course CAN be CUSTOMIZED (call).

Transients and Removables

Transient Assets and Removable Media are different based on their designation as Cyber Assets. What are examples of each? What about cloud storage? 145 seconds.

Supply Chain Management

CIP-013 addresses cyber security risk management applies to your supply chain - your vendors and partners. The four security objectives of Supply Chain Management Controls are discussed. 210 seconds.

Terms and Relationships

Review the types of Entities, U.S. and Canadian, the concept of bright-line criteria, and the relationship of assets, entities and the BES. 180 seconds.

Risky Business

Risk is considered when referencing infrastructure reliability, functions, noncompliance, supply chain, and personal risk assessment. 170 seconds.

Recovery Plans

CIP-009 requires companies to have a recovery plan which supports the continued stability, operability, and reliability of the BES. 210 seconds.

Rating Assets

CIP-009 requires companies to have a recovery plan which supports the continued stability, operability, and reliability of the BES. The three recovery phases are reviewed.

Protecting and Classifying

Self-identify BES Cyber System Information. Develop & maintain information protection policies and procedures. 160 seconds.

Physical and Conceptual Assets

Perform a review of asset types and see how they impact the BES. Knowledge, Documents, People, and Equipment are considered.