Minimum Technology Requirements for Students
A working computer with speakers
Access to a reliable internet connection
Google Chrome or Firefox as an internet browser (We cannot endorse the reliability of Internet Explorer, Edge, Opera, or any other browser not listed.)
Any note-taking material you may need
Student Registration and Scheduling Information
Students may register for classes in-person at: 8301 Joliet Street, Hudson Fl.
Over the phone with one of our student counselors
Via our store at: https://cistore.contractorsinstitute.com/
(You will be emailed with your course access information at the time of registration.)
Class Schedules are listed in our brochure and are available upon request or here on our website!
Information Security Policy
Authentication: User data in our system is logically segregated by account-based access rules. User accounts have unique usernames and passwords that must be entered each time a user logs on.
Passwords: User application passwords are stored internally hashed and are accessible on a need-to-know basis.
Certain sensitive user data, such as credit card details and account passwords, are stored and transmitted in encrypted format and processed through a third-party entity (Paypal).
It is the policy of the Contractors Institute to never sell student information or any collected information with student identities attached.
All Contractors Institute data is backed up via geographically disparate data centers on a regular basis.
All Contractors Institute information systems and infrastructure that are locally installed are located in locked and monitored areas that are regularly checked for intrusion attempts.
Internal servers have redundant internal and external power supplies.
Continuous uptime monitoring, with immediate escalation to our ISP in the event of a failure.
Backups occur weekly at multiple geographically disparate sites.
Testing: System functionality and design changes are verified in an isolated test “sandbox” environment and subject to functional and security testing prior to deployment to active production systems.
Contractors Institute network security includes an external gateway with an active firewall attached.
Secure VPN, 2FA (two-factor authentication), and role-based access is enforced for systems management by authorized engineering staff.
Logging and Auditing:
Central logging systems capture and archive all internal systems access including any failed authentication attempts.
Latest security patches are applied to all operating systems, applications, and network infrastructure to mitigate exposure to vulnerabilities.
Technical Support is available:
Monday - Friday: 8am - 4pm
Proprietary Interests / Intellectual Property Rights
Copyright & Trademarks
All rights reserved. All content (texts, trademarks, illustrations, photos, graphics, files, designs, arrangements etc.) on this website of the Contractors Institute are protected by copyright and other protective laws. The contents of this website are to be used only in accordance with Internet regulations.
Without the explicit written permission of the Contractors Institute it is prohibited to integrate in whole, or in part, any of the protected contents published on these websites into other programs or other web sites or to use them by any other means. This website can contain elements that are protected by copyright and by other laws that are subject to the copyright or other rights of third parties and that are correspondingly protected for these third parties.
The Contractors Institute has carefully compiled the contents of this website in accordance with their current state of knowledge. Access to and use of this website, as well as web sites related or connected to this by links, are at the user's own risk and responsibility. Damage and warranty claims arising from missing or incorrect data are excluded. The Contractors Institute bears no responsibility or liability for damage of any kind, also for indirect or consequential damages resulting from access to or use of this website or websites related or connected to this by links.
Links to other websites
The Contractors Institute website can contain links (cross references) to websites that are run by third parties. The Contractors Institute takes no responsibility for the content of these other websites.
Organizational & Administrative Security
Employee Screening: We perform background screening on all employees, to the extent possible within our technological capabilities.
Training: We provide ongoing security and technology use training for employees.
Access: Access controls to sensitive data in our databases, systems, and environments are set on a need-to-know / least privilege necessary basis.