
Learn USA
In this edition of (newsletter name), we dive into the latest in cybersecurity, featuring expert insights from Richard Beck, QA's cybersecurity portfolio director. We'll also introduce Ela, our new AI-powered learning assistant, designed to elevate self-paced learning experiences in the QA platform. (add in something about instructor or customer spotlight). Stay informed, stay secure, and stay ahead with QA!

Meet Richard Beck:
Cybersecurity Leader and Educator
Richard Beck is a seasoned cybersecurity professional with over 15 years of experience, now focused on bridging the cyber skills gap through education and collaboration. As Portfolio Director for Cyber at QA, he leads initiatives to diversify the workforce and address critical skills shortages.
Cyber Trust Mark Launched to Strengthen Smart Device Security
Just before departing, the Biden administration launched the Cyber Trust Mark, a new cybersecurity labeling program aimed at securing smart devices. The initiative seeks to keep American homes safer from rising cyber threats, featuring QR codes on product labels.
These codes will provide consumers with important security information, like password changes and security update guidelines, to help protect against hacking. The program applies to wireless IoT devices, such as fitness trackers, baby monitors, smart speakers, and doorbells. It does not cover enterprise products or medical devices.
Richard Beck, Cybersecurity Expert and QA Portfolio Director, offers a critical perspective on the new initiative. As a leading authority in the field, Beck points out that while Cyber Trust Mark is a positive step forward, there are some potential misconceptions. "This is long overdue and positive for these types of connected devices and will eventually baseline as the minimum standard, following existing EU baselines. I'm concerned that consumers will wrongly assume that these 'Cyber Trust Mark' products are seen as 'guaranteed secure', which they are not," Beck warns, emphasizing the need for caution in interpreting the mark's meaning.

Cybersecurity and AI: Working and Winning Together
Whether you're looking to enhance your skills or stay ahead of emerging threats, this free 50-minute on-demand webinar provides actionable insights on how to work and win with AI in the world of cyber. Join Beck and David Pool, Data, AI and ML Practice Director, as they dive into the latest trends, challenges, and opportunities at the intersection of AI and Cybersecurity.
Breach in the Spotlight: Who's Tracking your Location Now?
An unknown hacker is claiming to have stolen millions of users' data from U.S. location tracking firm Gravy Analytics, according to screenshots shared online. The company gathers data from smartphones, harvesting information from various sources that track individuals' exact movements, and then sells or shares this data with companies and governments through data aggregators or brokers.
While full details of the breach remain unclear, the hacker posted about it on a site frequented by cyber criminals, suggesting that some or all of the data may have already been sold.
Richard Beck's take? "This is an interesting and alarming compromise for those impacted, capturing the intimate private details of your life and your interactions, a sophisticated pattern-of-life, going well beyond just stealing personal information." This insight reminds us of the deeper risks involved in such data breaches, where stolen information can expose far more than just basic identity details.
Richard Beck's take? "This is an interesting and alarming compromise for those impacted, capturing the intimate private details of your life and your interactions, a sophisticated pattern-of-life, going well beyond just stealing personal information." This insight reminds us of the deeper risks involved in such data breaches, where stolen information can expose far more than just basic identity details.


New in the Platform: Meet Ela, your AI Assistant
We're excited to introduce Ela, our new AI-powered learning assistant, available now on the QA platform!
Ela combines the expertise of QA's top trainers with cutting-edge AI to offer personalized, on-demand guidance throughout your learning journey. Whether you need help navigating AWS content or streamlining your study sessions, Ela is here to provide expert-level support anytime, anywhere. With Ela, learners will have access to tailored answers, automation to speed up learning, and 24/7 assistance.
Currently trained on AWS content, Ela will quickly expand her expertise to cover our full course library, starting in February 2025. Ready to learn smarter? Ela's here to help!

Local Government
Instructor's Corner
Meet Jeremy Price:
QA Solutions Architect
Jeremy Price is a Solutions Architect at QA, dedicated to creating and delivering the best learning solutions for our customers' evolving needs. Price's focus is on making training not only insightful but also practical.
Jeremy shares his take on the two key aspects of teaching Cybersecurity:
1. Staying Up to Date:
"The world of Cybersecurity is constantly changing, and it is paramount for students and instructors to stay on top of trends. As an instructor I'll often poll my class on current cybersecurity news stories so we can chase a new and interesting topic."
2. From Theory to Practice:
"Everything magically works in the lab and in demos, but the real word isn't so cut and dry. It can be hard for students to apply what they've learned when the stakes are higher. I provide open-ended challenges for them to solve on their own, giving them a chance to apply their knowledge."
Cyber & AI Courses
OffSec LearnOne Exam Prep
OFFSECLEARNOffSec LearnOne is ideal for anyone looking to start their cybersecurity journey or work through any of our courses. Having access to labs for one full year allows the flexibility to balance life and…
Implementing Information Protection and Data loss Prevention by using Micr…
MSC5003Gain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create sensitive information types, create sensitivity labels, and use auto…
Db2 for z/OS: Introduction for Technical Support and Operations
TPDBTSThis course has been specifically designed to provide a thorough introduction to Db2 for z/OS, and covers all features up to and including V 12.<br>Taught from a Technical Support/Computer Opera…
Certified ISO/IEC 42001 Lead Auditor
QAISO42KLAISO/IEC 42001 Lead Auditor training course enables you to gain the necessary expertise to audit artificial intelligence management systems (AIMS) by applying widely recognised audit principles, proce…
APMG Enterprise Big Data Professional
APMGEBDPEvery day, we create 2.5 quintillion bytes of data...so much that 90% of the data in the world today has been created in the last two years alone. Data growth, speed and complexity are being driven b…
Developing Databases on Microsoft SQL Server
QASQLDEVThis three-day instructor-led course provides students who wish to develop and maintain SQL Server databases Additionally, it will be of use to individuals who administer applications that deliver co…
Service Blueprinting
QASBThe Service Blueprinting course is a two-day learning event that practically explores service blueprinting through hands on activity and discussion. A service blueprint is a diagram that visualizes t…
ISACA CISM Exam Prep
CISMXPREPThis official ISACA Certified Information Security Manager (CISM) self-study e-learning course is designed to develop expertise in information security governance, risk management, program developmen…
Certificate of Competence in Zero Trust (CCZT)
QACCZTThe industry’s first authoritative Zero Trust Training. The CCZT enables you to understand and implement Zero Trust principles into business planning, enterprise architectures, and technology d…
Microsoft Power BI Data Analyst (PL-300)
MPL300This course provides an all-encompassing journey into data analysis, Power BI, and Microsoft Fabric, equipping participants with the skills needed to transform raw data into actionable insights. Star…
Have a look back on the things you have missed from our previous newsletters

Higher Education and Universities
How can you protect your budgets against underspend for next year, with security and flexibility?
Attracting overseas students, and your financial forecast

Past QA Hot News
Check out past events, blogs and news...

Learning at work 2024
For employers looking to invest in your team's development, our week-long gathering of content offers resources, events, and ideas to help inspire a culture of learning in AI in your workplace