Webinars

New Horizons Webinars

Free Webinars from New Horizons Learning Group

Stay On Top of New Technologies & Best Business Practices

New Horizons offers you free, educational webinars to keep you up to date on the latest technologies and best business practices. Stay informed with live presentations on a variety of IT and business topics. Subject matter experts with real world experience host each presentation.

Each highly interactive session allows you to ask questions and gain clarification in real time. Can't attend on the scheduled date? No problem. New Horizons archives its webinars, allowing you to analyze topics at a later date.

No Limits

You may choose to sign up for one or many of our free webinars, depending on your individual interests. If you know of others who would benefit from attending, please forward this free opportunity to them as well.

Upcoming Webinars

1 2Next

To review recordings of previous webinars, visit our archive page.

The State of Security

DATE:  10/05/2016

TIME:  9:00 am PDT / 12:00 pm EDT / 5:00 pm BST

PRESENTER:  Stephen Schneiter – Manager, CompTIA Instructor Network Program

The only things that change more often than technology is a hacker’s ability to exploit it, and the security professional’s ability to respond. Security threats continue to present themselves. The security industry has created new solutions. Join Stephen Schneiter has he discusses the State of Security in 2016 and beyond.

Register Now

Leveraging LinkedIn: Learn How to be Visible to Employers

DATE:  10/07/2016

TIME:  8:00 am PDT / 11:00 am EDT / 4:00 pm BST

PRESENTER:  Gary O’Neal - a Career Strategist, Senior Recruiting Professional, and Director of TalentBranders

When you use LinkedIn to its fullest potential, you will have hiring managers and recruiters knocking down your door to put you in a job that isn’t even posted!

In this informative workshop, you'll learn:

  • How to position your LinkedIn profile so you can be easily found
  • How to use LinkedIn to connect with recruiters and hiring managers
  • How to build your network with strategic connections
  • How to discover Target Companies

Candidates who implement the techniques covered in this workshop report that doors start opening for them, with calls, interviews and employment opportunities. Open your eyes to possibilities! LinkedIn is used by over 90% of employers during their hiring process. The numbers are even higher when recruiters are searching for IT professionals.

Register Now

Getting Your Projects Funded

DATE:  10/11/2016

TIME:  11:00AM Eastern / 10:00AM Central / 9:00AM Mountain / 8:00AM Pacific

PRESENTER:  To be determined

It’s wonderful to have great project ideas and write compelling Project Scope documents, it’s another thing to get them approved, prioritized and funded. This webinar, based on Eric Bloom’s new book “Productivity Driven Success” and New Horizons class by the same name, provides tips, tricks and techniques to move your project from a great idea to being fully funded.

Register Now

Building Effective Cyber Resilience

DATE:  10/11/2016

TIME:  9:00 am PDT / 12:00 pm EDT / 5:00 pm BST

PRESENTER:  Nick Wilding - Head of Cyber Resilience, AXELOS Global Best Practice

All too often cyber attackers find it easier to influence and engage with our staff than we do. The fact is that the majority of successful cyber-attacks succeed because of human error - cyber resilience is fundamentally a human and not just a technology issue. We need to change behaviors, providing the simple, practical guidance that all our people need to make the right decisions at the right time. RESILIA™ is a portfolio of certified training, awareness learning and leadership engagement tools designed to put people at the center of your cyber resilience strategy. Are your people your most effective defense to cyber-attacks? This informative session will guide you on embedding and sustaining the behavior change required across the organization for effective Cyber Resilience.

Register Now

How to Help Prevent a Data Breach

DATE:  10/13/2016

TIME:  8:30 am PDT/11:30 am EDT/4:30 pm BST

PRESENTER:  Warren Bonner - Technical Instructor New Horizons Computer Learning Centers

A recent study by CompTIA cited human error as the most common cause of information security breaches, with some 80% of respondents believing this human error was caused by a lack of security knowledge, training, or failure to follow security procedures.

To eliminate threats throughout the organization, security must reach beyond the IT department. A company must evaluate employee exit strategies (HR), remote project protocol, on- and off-site data storage practices, and more—then establish and enforce new policies and procedures and physical safeguards appropriate to the findings.

Join Technical Instructor Warren Bonner as he discusses several ways your business can help prevent a data breach, including:

  • Conducting a periodic risk assessment
  • Educating employees about appropriate handling and protection of sensitive data
  • Establishing a comprehensive data loss protection plan
  • Providing training and technical support to mobile workers

Register Now

Blind Spots in Network Defense

DATE:  10/18/2016

TIME:  9:00 am PDT / 12:00 pm EDT / 5:00 pm BST

PRESENTER:  Wesley Alvarez – Director of Academics, U.S. EC-Council

Organizations are facing blind spots in their network defenses, and are finding it difficult to address them due to a lack of network security knowledge. However, Network Administrators can become a first line of defense for organizations, when properly prepared. Join Wesley Alvarez from EC-Council as he presents on the gap in cyber network defense today, and how it can be addressed with Certified Network Defenders.

Register Now

Maintaining Security in a Mobile Business World

DATE:  10/20/2016

TIME:  9:00 am PDT / 12:00 pm EDT / 5:00 pm BST

PRESENTER:  Jarred White – Security Architect, AirWatch

Ensuring that your enterprise mobility deployment is secure and that corporate data is protected with end-to-end security that extends to users, devices, applications, content, data, email and networks is paramount in today’s mobile and BYOD business world. Whether using a corporate-owned or employee-owned device, employees access corporate data, email and more from their mobile devices. These user actions require you to implement a mobile strategy with strong security policies. Join Jarred White, Security Architect for AirWatch, as he discusses mobile business security challenges and solutions.

Register Now

Resumes that Rock: The Ticket to Your Next Interview

DATE:  10/21/2016

TIME:  8:00 am PDT / 11:00 am EDT / 4:00 pm BST

PRESENTER:  Gary O’Neal - a Career Strategist, Senior Recruiting Professional, and Director of TalentBranders

When your résumé rocks, you’ll stand out from the crowd, prove your value and get that interview! This workshop provides a foundation that is key to building a resume that will best represent YOU.

What you'll learn:

  • How resumes are used in the hiring process
  • What differentiates a good resume from a resume that ROCKS
  • The difference between reality and myth for resumes and the hiring process
  • How to use your work history to create and support your own "unique professional brand"
  • Discover how best to handle career transitions and various unique situations

Learn a step-by-step process you can use to clarify where you are headed and easily communicate that to others. Understand how to position your strengths and all you bring to a hiring organization by attending this workshop!

Register Now

I Always Feel Like Somebody’s Watching Me

DATE:  10/25/2016

TIME:  9:00 am PDT / 12:00 pm EDT / 5:00 pm BST

PRESENTER:  Stephen Schneiter – Manager, CompTIA Instructor Network Program

This webinar will take a look at the possible threats IoT may pose and the skills sets shared between end-users and IT professionals that will better prepare consumers to effectively use these new technologies while protecting information. We will focus on the “tools of the trade” IT Security professionals are using to collect and analyze network traffic to detect and eliminate threats.

Register Now

Building a Cybersecurity Training Path and Long-Term Credentialing Program

DATE:  10/27/2016

TIME:  9:00 am PDT / 12:00 pm EDT / 5:00 pm BST

PRESENTER:  Paul Huffman, Director of Certification, Logical Operations
Joe Mignano, VP of Channels, Logical Operations

Would you entrust your company's cybersecurity to only two IT employees, or would you rather verify that ALL of your employees are trained to recognize and avoid cyber threats?

Training your IT team to analyze threats and proactively defend networks is critical to protecting your organization, but it's not the whole picture. As we focus on cybersecurity awareness throughout the month of October, it's the perfect time to talk about how every employee plays a key role in maintaining your organization's cybersecurity. In this webinar, we will walk you through a recommended cybersecurity training path that we created to help you determine what type of cybersecurity training different levels of employees (end users, IT staff, and IT Cybersecurity staff) should be focused on obtaining. We’ll also review ways to continuously verify comprehension of cybersecurity awareness knowledge, and how to structure a credentialing program in a way that encourages learning and long-term application of knowledge (vs. the traditional method of cramming for a test and forgetting the knowledge thereafter).

Register Now

1 2Next

Find Resources

Contact Us Today