Upcoming Trainings


Date:  February 3rd, 2021

Time:  12pm

Interested in benefits and opportunities that arise from a career in cybersecurity?  Join us for a panel discussion led by staff from BitLyft Cybersecurity as they share their journey and careers in cybersecurity.  Speakers include Noah Hoag and Austin Awalt.



Register at go.umflint.edu/cybercareer



Date:  February 24th, 2021

Time:  12:00pm

The Cybersecurity Maturity Model Certification (CMMC) is here and now a requirement for all manufacturers working with the Department of Defense.  Learn how to prepare your business for CMMC compliance in this webinar with BitLyft Cybersecurity.

Register at go.umflint.edu/cmmc


Past Trainings

Security on a Shoestring

Security on a shoestring

Affordable Security Program Solutions for Small and Medium Businesses


Date:  January 19, 2021

Time:  9am - 1pm






Protecting your organization is becoming more and more challenging as prices for security products and services have skyrocketed over the last decade. While larger organizations are able to purchase necessary equipment and hire staff dedicated to security, small and medium sized businesses are not able to keep up. Hackers know this and have redirected their efforts in hopes of pulling off the next large-scale breach. There are plenty of low cost, no cost, solutions available to organizations that have slim budgets. This training will provide information on how to implement these cost effective solutions within your organization.

REGISTER NOW at go.umflint.edu/shoestring  


Cybersecurity:  Threat at Your Doorstep

Cybersecurity:  Threat at Your Doorstep

Date/Time:  Tuesday, October 20, 2020 at 9:00am

Duration:  4 Hours

Format:  Workshop Style

Prerequisites:  None

Audience:  Business owners, students, faculty, managers and community members. No previous cybersecurity experience required.

This webinar is comprised of several 50-minute modules focusing on the current threat landscape, social engineering, critical controls, common attack vectors and more. Participants receive an in-depth overview of the types of various hackers, the nature and role of training programs and warning signs of an attack. Attendees also participate in a phishing demonstration.