
The Learning Curve
In this first edition of The Learning Curve, we dive into the latest in cybersecurity, featuring expert insights from Richard Beck, QA's cybersecurity portfolio director. We'll also introduce Ela, our new AI-powered learning assistant, designed to elevate self-paced learning experiences in the QA platform. Plus, in our Instructor's Corner, Jeremy Price, QA Solutions Architect, shares his tips on staying up to date and turning cybersecurity theory into practice. Stay informed, stay secure, and stay ahead with QA!

Meet Richard Beck: Cybersecurity Leader and Educator
Richard Beck is a seasoned cybersecurity professional with over 15 years of experience, now focused on bridging the cyber skills gap through education and collaboration. As Portfolio Director for Cyber at QA, he leads initiatives to diversify the workforce and address critical skills shortages.
Cyber Trust Mark Launched to Strengthen Smart Device Security
Just before departing, the Biden administration launched the Cyber Trust Mark, a new cybersecurity labeling program aimed at securing smart devices. The initiative seeks to keep American homes safer from rising cyber threats, featuring QR codes on product labels.
These codes will provide consumers with important security information, like password changes and security update guidelines, to help protect against hacking. The program applies to wireless IoT devices, such as fitness trackers, baby monitors, smart speakers, and doorbells. It does not cover enterprise products or medical devices.
"This is long overdue and positive for these types of connected devices and will eventually baseline as the minimum standard, following existing EU baselines. I'm concerned that consumers will wrongly assume that these 'Cyber Trust Mark' products are seen as 'guaranteed secure', which they are not," Beck warns, emphasizing the need for caution in interpreting the mark's meaning.

Cybersecurity and AI: Working and Winning Together
Whether you're looking to enhance your skills or stay ahead of emerging threats, this free 50-minute on-demand webinar provides actionable insights on how to work and win with AI in the world of cyber. Join Beck and David Pool, Data, AI and ML Practice Director, as they dive into the latest trends, challenges, and opportunities at the intersection of AI and Cybersecurity.
Breach in the Spotlight: Who's Tracking your Location Now?
An unknown hacker is claiming to have stolen millions of users' data from U.S. location tracking firm Gravy Analytics, according to screenshots shared online. The company gathers data from smartphones, harvesting information from various sources that track individuals' exact movements, and then sells or shares this data with companies and governments through data aggregators or brokers.
While full details of the breach remain unclear, the hacker posted about it on a site frequented by cyber criminals, suggesting that some or all of the data may have already been sold.
Richard Beck's take? "This is an interesting and alarming compromise for those impacted, capturing the intimate private details of your life and your interactions, a sophisticated pattern-of-life, going well beyond just stealing personal information." This insight reminds us of the deeper risks involved in such data breaches, where stolen information can expose far more than just basic identity details.
Richard Beck's take? "This is an interesting and alarming compromise for those impacted, capturing the intimate private details of your life and your interactions, a sophisticated pattern-of-life, going well beyond just stealing personal information." This insight reminds us of the deeper risks involved in such data breaches, where stolen information can expose far more than just basic identity details.


New in the Platform: Meet Ela, your AI Assistant
We're excited to introduce Ela, our new AI-powered learning assistant, available now on the QA platform!
Ela combines the expertise of QA's top trainers with cutting-edge AI to offer personalized, on-demand guidance throughout your learning journey. Whether you need help navigating AWS content or streamlining your study sessions, Ela is here to provide expert-level support anytime, anywhere. With Ela, learners will have access to tailored answers, automation to speed up learning, and 24/7 assistance.
Ela, now trained on our full course library, is ready to help you learn smarter.

Meet Jeremy Price: QA Solutions Architect
Jeremy Price is a Solutions Architect at QA, dedicated to creating and delivering the best learning solutions for our customers' evolving needs. Price's focus is on making training not only insightful but also practical.
Jeremy shares his take on the two key aspects of teaching Cybersecurity:
1. Staying Up to Date:
"The world of Cybersecurity is constantly changing, and it is paramount for students and instructors to stay on top of trends. As an instructor I'll often poll my class on current cybersecurity news stories so we can chase a new and interesting topic."
2. From Theory to Practice:
"Everything magically works in the lab and in demos, but the real word isn't so cut and dry. It can be hard for students to apply what they've learned when the stakes are higher. I provide open-ended challenges for them to solve on their own, giving them a chance to apply their knowledge."
Cyber & AI Courses
Data Warehousing on AWS
AMWSDWData Warehousing on AWS introduces you to concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AW…
Microsoft 365 Copilot technical overview for IT professionals
QAM365COPThis course provides IT professionals with a comprehensive technical understanding of Microsoft 365 Copilot. Participants will gain insights into Copilot’s architecture, licensing, administrati…
Oracle Database: PL/SQL Workshop
OCDBPLSQLWThis course provides a comprehensive guide to Oracle Database 19c PL/SQL programming. Participants will explore PL/SQL's capabilities to manage data, automate tasks, and develop scalable database…
Building Resilient Streaming Analytics Systems on Google Cloud
GCPBRSASProcessing streaming data is becoming increasingly popular as streaming enables businesses to get real-time metrics on business operations. This course covers how to build streaming data pipelines on…
Oracle Database 23ai: New Features for Administrators
OCDBANF23AIThis course covers the latest additions and improvements in Oracle Database 23ai. It equips Oracle Database Administrators with knowledge about enhanced tools for better management, focusing on perfo…
Advanced Juniper Security (AJSEC)
TPJUN_AJSECThis five-day course, which is designed to build off of the current Junos Security (JSEC) offering, delves deeper into Junos security. Through demonstrations and hands-on labs, you will gain experi…
Introduction to Copilot in Microsoft Dynamics 365 Sales
QAD365COPThis is a short 1-day course to introduce the new AI tool of Microsoft Copilot to the Dynamics platform. Specifically, we look at Dynamics 365 Copilot within the Sales application. This course will a…
EC Council Certified Network Defender (v3)
ECCNDCertified Network Defender (CND) v3 is the world's first network security program with a continual / adaptive security strategy. It is a network security course designed to help organizations cre…
Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with…
QABBPTBHOHave you ever thought of hacking web applications for fun and profit? How about playing with authentic, award-winning security bugs identified in some of the greatest companies? If that sounds intere…
Introduction to the Junos Operating System (IJOS)
TPJUN_IJOSThis three-day course provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos devices. The course provides a brief overview of the Ju…