Why Sixty Second Training?
Sponsoring training has never been so fast and easy!
Complete a simple registration form by providing your name, email address, secure password and work industry by classification. It’s that simple.
Review our course library, select those that meet your training needs, and purchase the number of seats you need using a credit card or purchase order.
As Training Manager you create playlists of one or many courses based on the training needs of your employees. Each course serves in the sequence defined in the playlists. Playlists CAN be reordered as necessary.
Once you’ve created a training playlist you can begin to assign them to yourself or anyone you designate. Create your student list by typing or copying & pasting email address lists into our form.
Your students receive email notifications once training has been assigned. You can see when they accept the email, monitor their training status, send reminders and even print completion certificates.
When the Auditor asks for proof that you've trained your employees or encouraged awareness you can simply export timestamped digital training records to Excel OR import a CSV into any records system.
Comprehensive CIP 2019
Comprehensive SCORM course covering ALL CIP standards topics required for NERC compliance. Course CAN be CUSTOMIZED (call).
Transients and Removables
Transient Assets and Removable Media are different based on their designation as Cyber Assets. What are examples of each? What about cloud storage? 145 seconds.
Supply Chain Management
CIP-013 addresses cyber security risk management applies to your supply chain - your vendors and partners. The four security objectives of Supply Chain Management Controls are discussed. 210 seconds.
Terms and Relationships
Review the types of Entities, U.S. and Canadian, the concept of bright-line criteria, and the relationship of assets, entities and the BES. 180 seconds.
Risk is considered when referencing infrastructure reliability, functions, noncompliance, supply chain, and personal risk assessment. 170 seconds.
CIP-009 requires companies to have a recovery plan which supports the continued stability, operability, and reliability of the BES. 210 seconds.
CIP-009 requires companies to have a recovery plan which supports the continued stability, operability, and reliability of the BES. The three recovery phases are reviewed.
Protecting and Classifying
Self-identify BES Cyber System Information. Develop & maintain information protection policies and procedures. 160 seconds.
Physical and Conceptual Assets
Perform a review of asset types and see how they impact the BES. Knowledge, Documents, People, and Equipment are considered.