  {"id":1115,"date":"2022-06-02T13:07:08","date_gmt":"2022-06-02T13:07:08","guid":{"rendered":"https:\/\/www.nicholls.edu\/continuing-ed\/?page_id=1115"},"modified":"2022-12-01T21:51:09","modified_gmt":"2022-12-01T21:51:09","slug":"cyber","status":"publish","type":"page","link":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/","title":{"rendered":"Certified Cyber Security Specialist"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1115\" class=\"elementor elementor-1115\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-af68a9e elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"af68a9e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-403c5db\" data-id=\"403c5db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fd6897a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd6897a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6b8bc4c\" data-id=\"6b8bc4c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e74900 elementor-widget elementor-widget-heading\" data-id=\"1e74900\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Certified Cyber Security Specialist<span style=\"vertical-align: super;font-size: 20px\"> TM<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a78968a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a78968a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76281f7\" data-id=\"76281f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c30257 elementor-widget elementor-widget-video\" data-id=\"8c30257\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=63Wa-VO7JJY&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;play_on_mobile&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;video_type&quot;:&quot;youtube&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8df536d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8df536d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-16d5e5c\" data-id=\"16d5e5c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7fe39eb elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7fe39eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why become a Certified Cyber Security Specialist<span style=\"vertical-align: super;font-size: 12px\"> TM<\/span>?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4453705 elementor-widget elementor-widget-text-editor\" data-id=\"4453705\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe Certified Cyber Security Specialist<span style=\"vertical-align: super;font-size: 8px\">TM<\/span> program provides in-depth knowledge of the identity theft, identity fraud, cyber security, cyber anonymity and other information such as data protection, virtual private networks and biometric security. Prior experience in the cyber security industry is not required nor needed. The CCSS program will help risk managers, employers, employees and insurance professionals to gain extensive knowledge in the world of cyber security.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5a1894d\" data-id=\"5a1894d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e700dea elementor-widget elementor-widget-image\" data-id=\"e700dea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"400\" height=\"388\" src=\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM-400x388.png\" class=\"attachment-medium size-medium wp-image-1124\" alt=\"\" srcset=\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM-400x388.png 400w, https:\/\/www.nicholls.edu\/camps-and-special-programs\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM-768x744.png 768w, https:\/\/www.nicholls.edu\/camps-and-special-programs\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM.png 968w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bf39dc6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf39dc6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b3cfe2a\" data-id=\"b3cfe2a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f33b67 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"8f33b67\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is involved for Certification?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93cb927 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"93cb927\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">STEP 1 - Register for the course modules<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">STEP 2 - Take the 5 course modules (approximately 5 hours)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">STEP 3 - Register for the CCSS exam<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">STEP 4 - Take the required 100 question proctored exam<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">STEP 5 - Pass the exam with a 70% or higher<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c7899dc elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"c7899dc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-624c050\" data-id=\"624c050\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-13d065e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13d065e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-349d6ac\" data-id=\"349d6ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-693fdf5 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"693fdf5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is the Cost?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26c6a9a uael-align-price-list-left uael-pricelist-stack-mobile elementor-widget elementor-widget-uael-price-list\" data-id=\"26c6a9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;pricelist_overall_align&quot;:&quot;left&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;32&quot;,&quot;sizes&quot;:[]},&quot;pricelist_title_margin&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:&quot;1&quot;},&quot;pricelist_desc_margin&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;0&quot;,&quot;right&quot;:&quot;0&quot;,&quot;bottom&quot;:&quot;0&quot;,&quot;left&quot;:&quot;0&quot;,&quot;isLinked&quot;:&quot;&quot;},&quot;pricelist_price_margin&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:&quot;1&quot;},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;list_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;list_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;list_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;pricelist_title_margin_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;pricelist_title_margin_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;pricelist_desc_margin_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;pricelist_desc_margin_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;pricelist_price_margin_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;pricelist_price_margin_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}\" data-widget_type=\"uael-price-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"uael-price-list uael-price-list-none uael-pl-price-position-right\">\n\n\t\t\t\t\t\t<div class=\"uael-price-list-item\">\n\n\t\t\t\n\t\t\t<div class=\"uael-price-list-text\">\n\t\t\t\t<div class=\"uael-price-list-header\">\n\t\t\t\t\t<a class=\"uael-price-list-title\" href=\"#\">\t\t\t\t\t<span>Modules enrollment and exam<\/span>\n\t\t\t\t\t<\/a>\t\t\t\t\t\t<span class=\"uael-price-list-separator\"><\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"uael-price-wrapper uael-pl-price-inner\">\n\t\t\t\t<span class=\"uael-price-list-price \">$150<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<p class=\"uael-price-list-description\">Covers course and two tests.<\/p>\n\n\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"uael-price-wrapper uael-pl-price-outer\">\n\t\t\t\t<span class=\"uael-price-list-price  uael-price-list-price \">$150<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-price-list-item\">\n\n\t\t\t\n\t\t\t<div class=\"uael-price-list-text\">\n\t\t\t\t<div class=\"uael-price-list-header\">\n\t\t\t\t\t<a class=\"uael-price-list-title\" href=\"#\">\t\t\t\t\t<span>Re-testing fee<\/span>\n\t\t\t\t\t<\/a>\t\t\t\t\t\t<span class=\"uael-price-list-separator\"><\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"uael-price-wrapper uael-pl-price-inner\">\n\t\t\t\t<span class=\"uael-price-list-price \">$100<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<p class=\"uael-price-list-description\">You will have two (2) opportunities to pass the exam. re-testing fee is required after two (2) failed attempts.<\/p>\n\n\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"uael-price-wrapper uael-pl-price-outer\">\n\t\t\t\t<span class=\"uael-price-list-price  uael-price-list-price \">$100<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-price-list-item\">\n\n\t\t\t\n\t\t\t<div class=\"uael-price-list-text\">\n\t\t\t\t<div class=\"uael-price-list-header\">\n\t\t\t\t\t<a class=\"uael-price-list-title\" href=\"#\">\t\t\t\t\t<span>Annual CCSS certification renewal fee<\/span>\n\t\t\t\t\t<\/a>\t\t\t\t\t\t<span class=\"uael-price-list-separator\"><\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<span class=\"uael-price-wrapper uael-pl-price-inner\">\n\t\t\t\t<span class=\"uael-price-list-price \">$149<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t<p class=\"uael-price-list-description\">Annual fee beginning in year 2<\/p>\n\n\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"uael-price-wrapper uael-pl-price-outer\">\n\t\t\t\t<span class=\"uael-price-list-price  uael-price-list-price \">$149<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8252204 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8252204\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42c34fc\" data-id=\"42c34fc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d4f06a5 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"d4f06a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xl\" href=\"https:\/\/contedu.nicholls.edu\/wconnect\/ace\/ShowSchedule.awp?&#038;Mode=GROUP&#038;Group=:FULL&#038;Title=Complete+Listings\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Register Today!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e5f5da elementor-widget elementor-widget-text-editor\" data-id=\"0e5f5da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>**** Instructions and your license code will be sent to you after payment is received.****<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9006479 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9006479\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41e36d5\" data-id=\"41e36d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-649d4a9 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"649d4a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Course Descriptions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a46bac9 elementor-widget elementor-widget-toggle\" data-id=\"a46bac9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1721\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1721\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Course \/ Module 1: Be Secure: Corporate &amp; individual responsibilities of data protection<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1721\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1721\"><h3><strong>Course Overview:<\/strong><\/h3><p>This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the global Identity Theft crisis and educating agents on how to assist their clients (employers) from a Risk Management perspective. The course will discuss the differences between, Data Breach, Data Comprise and Data Leaks. Topics such as cloud-based data storage risks, public networks, personal virtual private networks (\u201dVPN\u2019s\u201d), safer passwords, and how to select the appropriate Identity Theft protection program as part of the overall benefit program. Information on how to protect company emails, email attachments, how agents can better protect client.<\/p><p>We are seeing Insurance carriers offer corporate liability insurance rate reductions when a business has internal written Cyber Security protocols and employee training on how to protect company and client data. Insurance professionals will gain an enhanced understanding on how to help clients set-up internal policies and procedures and negotiate and work with Insurance Carriers to secure the best possible coverage and rates for their clients.<\/p><h3><strong>Learning Objectives:<\/strong><\/h3><ul><li>After completing this workshop, you will be able to:<\/li><li>Understand the definitions and statistics of identity theft<\/li><li>Be aware of how fraudsters gain access to information<\/li><li>Suggest the appropriate individual digital safety &amp; protection products to clients<\/li><li>Identify and repair damage done from this kind of fraud<\/li><li>Know the resources and tips to use when applying security<\/li><li>Apply the knowledge you\u2019ve learned to various case scenarios<\/li><\/ul><h3><strong>Course Outline:<\/strong><\/h3><p><strong>Keeping Data Secure<\/strong><\/p><ul><li>How is data stolen?<\/li><li>Passwords: The Reality Check<\/li><li>Computer system OS updates<\/li><li>Email protection &amp; safety strategy<\/li><\/ul><p><strong>Understanding Data Loss<\/strong><\/p><ul><li>What are the cost of ID Theft &amp; Data Breaches<\/li><li>Data Breach vs. Comprise vs. Leak<\/li><li>How hacking is really done<\/li><\/ul><p><strong>Open Source Intelligence<\/strong><\/p><ul><li>How your personal data is discovered and used by criminals<\/li><li>Virtual Private Networks (\u201cVPNs\u201d)<\/li><li>Methods used for discovering your data<\/li><\/ul><p><strong>Understanding Your Risks<\/strong><\/p><p><strong>Data and Public Access<\/strong><\/p><ul><li>Credit Monitoring vs. Credit Freeze<\/li><li>Cloud Storage \/ File Sharing<\/li><li>Public Networks<\/li><\/ul><p><strong>Identity Protection Products<\/strong><\/p><ul><li>Credit Monitoring<\/li><\/ul><p><strong>Review What Your Learned<\/strong><\/p><ul><li>Exercises<\/li><li>Applying What You Learned<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1722\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1722\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Course \/ Module 2: Protecting Employee Privacy and Identity in the Digital Age<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1722\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1722\"><h3><strong>Course Overview: <\/strong><\/h3><p>This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the global Identity Theft crisis. It will educate agents on how to assist their clients (employers) from a Risk Management perspective. The course will discuss Medical Identity Theft and how to protect employee health data. Agents can help their employer groups in creating corporate Identity Theft and Data Protection protocols, helping employees to gain an increased awareness and understanding relative to the risks of Identity Theft, both personal and at their workplace. Information on how to protect company emails, email attachments, how employees can better protect their employer and possible employer\u2019s client. Understanding the industry nomenclatures as well as the steps necessary to repair any damage and other industry resources.<\/p><h3><strong>Learning Objectives:<\/strong><\/h3><p><strong>After completing this workshop, you will be able to:<\/strong><\/p><ul><li>Understand the definitions and statistics of identity theft<\/li><li>Be aware of how fraudsters gain access to information<\/li><li>Suggest the appropriate individual digital safety &amp; protection products to clients<\/li><li>Identify and repair damage done from this kind of fraud<\/li><li>Know the resources and tips to use when applying security<\/li><li>Apply the knowledge you\u2019ve learned to various case scenarios<\/li><\/ul><h3><strong>Course Outline:<\/strong><\/h3><p><strong>What is Identity Theft<\/strong><\/p><ul><li>Identity Theft 101<\/li><li>Types of Identity Theft<\/li><\/ul><p><strong>Definitions<\/strong><\/p><ul><li>PII: Personal Identifying Information<\/li><li>Identity Theft vs. Identity Fraud<\/li><li>Victim Fraud &amp; Financial Losses<\/li><\/ul><p><strong>How Fraudsters Can Get Your Information<\/strong><\/p><ul><li>How Non-Fraudsters Can Get Your Information<\/li><li>Old School Methods<\/li><li>Targeted Methods<\/li><li>Pharming &amp; Phishing<\/li><li>SMShing, Vishing &amp; Spoofing<\/li><li>Check Fraud<\/li><\/ul><p><strong>Identifying Risk<\/strong><\/p><ul><li>Installed Devices Risk<\/li><li>Chip Enabled Credit Cards<\/li><li>EMV &amp; RFID Protection<\/li><li>Financial Account Risks<\/li><\/ul><p><strong>Digital Safety Risk<\/strong><\/p><ul><li>Password Protections<\/li><li>2FA\/MFA<\/li><li>Wi-Fi Keylogging<\/li><li>Geotagging<\/li><li>Biometrics<\/li><li>Social Media<\/li><\/ul><p><strong>Recovery and Protection<\/strong><\/p><ul><li>Steps Required to Repair the Damage<\/li><li>Report Your Identity Theft or Fraud<\/li><li>Identity Protection<\/li><li>Alerts for Minors<\/li><li>Sex Offender Reporting<\/li><li>Resources and Tips<\/li><li>Password Managers<\/li><\/ul><p><strong>Review What You Learned<\/strong><\/p><ul><li>Exercises<\/li><li>Applying What You Learned<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1723\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1723\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Course \/ Module 3: Identity Theft Programs: Unmasking the Complexities<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1723\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1723\"><h3><strong>Course Overview:<\/strong><\/h3><p>This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, the various types of Identity Theft Insurance programs and the differences between them, such as, proactive versus reactive programs, services included in various programs, insurance coverages, how they work and what to look for. If an employee is part of a global data breach, and they receive correspondence, what exactly will the no cost identity monitoring services include. Information on insured versus non-insured programs will be discussed as well as peeling back the insurance policy with a deep dive review of what insurance policies typically include, what is excluded and what to look for in recommending the right solution for their clients and their employees.<\/p><p>A review of credit monitoring services, social media monitoring, digital footprint exposures, retirement plan stolen funds reimbursement, tax fraud protection and employee financial wellness. Discussions on fiduciary responsibilities of an insurance professionals on helping employers navigate through the complexities of Identity Theft programs as an employee benefit.<\/p><h3><strong>Learning Objectives:<\/strong><\/h3><p><strong>After completing this workshop, you will be able to:<\/strong><\/p><ul><li>Understand the definitions and statistics of identity theft<\/li><li>Be aware of how fraudsters gain access to information<\/li><li>Suggest the appropriate individual digital safety &amp; protection products to clients<\/li><li>Identify and repair damage done from this kind of fraud<\/li><li>Know the resources and tips to use when applying security<\/li><li>Apply the knowledge you\u2019ve learned to various case scenarios<\/li><\/ul><h3><strong>Course Outline:<\/strong><\/h3><p><strong>Identity Theft Programs<\/strong><\/p><ul><li>Insured vs. non-insured programs<\/li><li>Proactive vs. Reactive Programs<\/li><li>Standalone programs<\/li><\/ul><p><strong>Comprehensive Coverage Review<\/strong><\/p><ul><li>Remediation<\/li><li>Monitoring<\/li><li>Alerts<\/li><li>Digital Footprints<\/li><li>PII &amp; PHI<\/li><li>IP address monitoring<\/li><li>Deceased family members<\/li><li>Mobile Apps<\/li><\/ul><p><strong>Why Identity Theft Programs as an Employee Benefit<\/strong><\/p><ul><li>How do they protect employees?<\/li><li>How do they protect and benefit the company?<\/li><li>Recruitment &amp; Retention<\/li><li>Employee Productivity<\/li><li>Absenteeism &amp; Presenteeism<\/li><\/ul><p><strong>The \u201cInsurance Policy\u201d<\/strong><\/p><ul><li>What does it specifically cover?<\/li><li>What are the exclusions<\/li><li>What to look for<\/li><\/ul><p><strong>Review What Your Learned<\/strong><\/p><ul><li>Exercises<\/li><li>Applying What You Learned<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1724\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1724\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Course \/ Module 4: The Dark Web &amp; Your Digital Footprint<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1724\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1724\"><h3><strong>Course Overview:<\/strong><\/h3><p>This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the layers of the Internet which go far<br \/>beyond the surface web. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. There are several different ways that ransomware can infect computers. From a risk management perspective, we will share methods to protect company and client data as well as insurance products to financially protect employers. Further discussions on Advanced Threat Intelligence on how to recognize and protect from breaches and financial fraud with proactive prevention methods to protect company assets.<\/p><p>We are seeing Insurance Carriers offer corporate liability insurance rate reductions when a business has internal written Cyber Security protocols and employee training on how to protect company and client data. Insurance professionals will gain an enhanced understanding on how to help clients set-up internal policies and procedures and negotiate and work with Insurance Carriers to secure the best possible coverage and rates for their clients.<\/p><p>Further discussions on your Digital footprint which refers to one&#8217;s unique set of traceable digital activities, actions, contributions and communications manifested on the Internet or on digital devices. On the World Wide Web, the internet footprint is the information left behind as a result of a user&#8217;s web-browsing and stored as cookies. This creates vulnerability to an individual person, business, clients and other organizations. We will discuss risk management and mitigation protocols as well as the implementation of insurance programs to financially protect organizations. Information on Identity theft protection programs as part of the overall employee benefit program and business protection insurance.<\/p><h3><strong>Learning Objectives:<\/strong><\/h3><ul><li>After completing this workshop, you will be able to:<\/li><li>Understand the definitions and statistics of the Dark Web<\/li><li>Be aware of how fraudsters gain access to information and hold company data hostage<\/li><li>Providing information on your \u201cDigital Footprint\u201d and how that puts your business at risk<\/li><li>Discussions on Cyber Anonymity<\/li><li>Know the resources and tips to use when applying security<\/li><li>Apply the knowledge you\u2019ve learned to various case scenarios<\/li><\/ul><h3><strong>Course Outline:<\/strong><\/h3><p><strong>Risk Mitigation &amp; Protection<\/strong><\/p><ul><li>World Wide Web<\/li><li>The Surface Web<\/li><li>The Deep Web<\/li><li>The Dark Web<\/li><li>How the Web layers works<\/li><li>Anonymous browsers<\/li><li>Search engines<\/li><li>Chatrooms<\/li><li>Forums<\/li><li>Dangers and precautions<\/li><\/ul><p><strong>Cyber anonymity to reduce risk exposure<\/strong><\/p><ul><li>The Onion Router: \u201cTOR\u201d<\/li><li>Invisible Internet Project: \u201cI2P\u201d<\/li><li>Using the right protocols<\/li><\/ul><p><strong>Data Theft<\/strong><\/p><ul><li>Ransomware<\/li><li>Extortionware<\/li><li>Malware<\/li><\/ul><p><strong>Digital Footprint<\/strong><\/p><ul><li>What you leave behind and what is at risk<\/li><li>How to protect personal, business and client information<\/li><li>How to insure your risk<\/li><li><strong>Biometrics<\/strong><\/li><li>Retina scans<\/li><li>Thump prints<\/li><li>Voice recognition<\/li><li>Facial recognition<\/li><li>Risks associated with biometrics<\/li><\/ul><p><strong>Child Identity Theft<\/strong><\/p><ul><li>How it Happens<\/li><li>How to Recognize<\/li><li>How to Prevent<\/li><li>Can children have insurance<\/li><\/ul><p><strong>Identity Protection Products<\/strong><\/p><ul><li>Employee benefit programs<\/li><li>Employer risk management programs<\/li><li>What to look for in a product<\/li><li>How to select the right insurance program<\/li><li>Embedded programs<\/li><li>Corporate Liability Coverage<\/li><\/ul><p><strong>Review What Your Learned<\/strong><\/p><ul><li>Exercises<\/li><li>Applying What You Learned<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1725\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1725\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Course \/ Module 5: Unravelling a Cyber Security Insurance Policy<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1725\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1725\"><h3><strong>Course Overview:<\/strong><\/h3><p>This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the layers of a cyber security insurance<br \/>policy. This module will review what is and is not covered, what to look for, how to negotiate removal of certain exclusions and how to negotiate what to include.<\/p><h3><strong>Learning Objectives:<\/strong><\/h3><p><strong>After completing this workshop, you will be able to:<\/strong><\/p><ul><li>Understand the definitions of a cyber insurance policy<\/li><li>What to be aware of relative to exclusions<\/li><li>How to negotiate coverage and cost<\/li><li>How to select the right carrier and coverage<\/li><\/ul><h3><strong>Course Outline:<\/strong><\/h3><p><strong>What The Typical Policy Covers<\/strong><\/p><ul><li>Legal Expenses<\/li><li>IT Forensics<\/li><li>Negotiation of ransomware payment<\/li><li>Data restoration<\/li><li>Breach notifications to customers<\/li><li>Public relations expertise<\/li><li>Credit monitoring and Identity Restoration for customers<\/li><\/ul><p><strong>What The Typical Policy Does Not Cover<\/strong><\/p><ul><li>Cyber insurance policies generally do not cover<\/li><li>Potential future lost profits<\/li><li>Loss of value due to theft of your Intellectual Property<\/li><li>The cost to improve internal technology systems<\/li><li>The cost to upgrade any software or security patch&#8217;s after a cyber event<\/li><\/ul><p><strong>What is the Typical cost of Cyber Insurance<\/strong><\/p><ul><li>Your reputation<\/li><li>Your customer retention<\/li><li>First-Party and Third-party policies<\/li><li>Older vs. new cyber insurance policies<\/li><\/ul><p><strong>What to Look For in a Policy<\/strong><\/p><ul><li>Cyber extortion coverage<\/li><li>Data recovery services<\/li><li>Cyber business interruption<\/li><li>Hacker demand negotiations<\/li><li>Hacker demand reimbursement<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b93278a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b93278a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9ec7ebd\" data-id=\"9ec7ebd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a753d0 elementor-widget elementor-widget-spacer\" data-id=\"2a753d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Certified Cyber Security Specialist TM Why become a Certified Cyber Security Specialist TM? The Certified Cyber Security SpecialistTM program provides in-depth knowledge of the identity theft, identity fraud, cyber security, cyber anonymity and other information such as data protection, virtual private networks and biometric security. Prior experience in the cyber security industry is not required [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1115","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Certified Cyber Security Specialist - Camps and Special Programs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Certified Cyber Security Specialist - Camps and Special Programs\" \/>\n<meta property=\"og:description\" content=\"Certified Cyber Security Specialist TM Why become a Certified Cyber Security Specialist TM? The Certified Cyber Security SpecialistTM program provides in-depth knowledge of the identity theft, identity fraud, cyber security, cyber anonymity and other information such as data protection, virtual private networks and biometric security. Prior experience in the cyber security industry is not required [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/\" \/>\n<meta property=\"og:site_name\" content=\"Camps and Special Programs\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-01T21:51:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nicholls.edu\/continuing-ed\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM-400x388.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/\",\"url\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/\",\"name\":\"Certified Cyber Security Specialist - Camps and Special Programs\",\"isPartOf\":{\"@id\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nicholls.edu\/continuing-ed\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM-400x388.png\",\"datePublished\":\"2022-06-02T13:07:08+00:00\",\"dateModified\":\"2022-12-01T21:51:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/#primaryimage\",\"url\":\"https:\/\/www.nicholls.edu\/continuing-ed\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM-400x388.png\",\"contentUrl\":\"https:\/\/www.nicholls.edu\/continuing-ed\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM-400x388.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Certified Cyber Security Specialist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/#website\",\"url\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/\",\"name\":\"Camps and Special Programs\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nicholls.edu\/camps-and-special-programs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Certified Cyber Security Specialist - Camps and Special Programs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/","og_locale":"en_US","og_type":"article","og_title":"Certified Cyber Security Specialist - Camps and Special Programs","og_description":"Certified Cyber Security Specialist TM Why become a Certified Cyber Security Specialist TM? The Certified Cyber Security SpecialistTM program provides in-depth knowledge of the identity theft, identity fraud, cyber security, cyber anonymity and other information such as data protection, virtual private networks and biometric security. Prior experience in the cyber security industry is not required [&hellip;]","og_url":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/","og_site_name":"Camps and Special Programs","article_modified_time":"2022-12-01T21:51:09+00:00","og_image":[{"url":"https:\/\/www.nicholls.edu\/continuing-ed\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM-400x388.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/","url":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/","name":"Certified Cyber Security Specialist - Camps and Special Programs","isPartOf":{"@id":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/#primaryimage"},"image":{"@id":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nicholls.edu\/continuing-ed\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM-400x388.png","datePublished":"2022-06-02T13:07:08+00:00","dateModified":"2022-12-01T21:51:09+00:00","breadcrumb":{"@id":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/#primaryimage","url":"https:\/\/www.nicholls.edu\/continuing-ed\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM-400x388.png","contentUrl":"https:\/\/www.nicholls.edu\/continuing-ed\/wp-content\/uploads\/sites\/32\/2022\/06\/Screen-Shot-2022-06-02-at-8.30.38-AM-400x388.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/cyber\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/"},{"@type":"ListItem","position":2,"name":"Certified Cyber Security Specialist"}]},{"@type":"WebSite","@id":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/#website","url":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/","name":"Camps and Special Programs","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/wp-json\/wp\/v2\/pages\/1115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/wp-json\/wp\/v2\/comments?post=1115"}],"version-history":[{"count":0,"href":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/wp-json\/wp\/v2\/pages\/1115\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.nicholls.edu\/camps-and-special-programs\/wp-json\/wp\/v2\/media?parent=1115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}