• Online, Self-Paced
Course Description

If you were asked to climb a chain that had a rusty link somewhere, you’d probably think twice. After all, a chain is only as strong as its weakest link. It’s an expression we’ve all heard before, but it’s true. One weak point and the whole thing snaps, and you’re tumbling to the floor!

The same is true for cybersecurity. Cybercriminals are most likely to attack at the weakest point. If you have a weak link, they’ll be able to exploit it and cause damage along the entire supply chain. This course will help you ensure your entire supply chain has robust cybersecurity.
By the end of this course, you’ll be able to:
• Explain why cybersecurity is paramount to every step of a supply chain
• Recognize common supply chain cyberattacks
• Implement the principles of supply chain cybersecurity
Why take this course?
For your cybersecurity to be effective, it needs to cover your entire supply chain. This course, suitable for anyone in IT or security management, will teach you how to spot and deal with weak links. You’ll also learn some common cyber supply chain attacks, so you can work to prevent them from happening to you.

10 mins | SCORM | Workbook

Learning Objectives

Explain why cybersecurity is paramount to every step of a supply chain, Recognize common supply chain cyberattacks, Implement the principles of supply chain cybersecurity

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Systems Analysis
  • Vulnerability Assessment and Management
  • Knowledge Management
  • Cybersecurity Management
  • Cyber Operational Planning

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.