cyber security training se edition
DESCRIPTION
SE editionTRANSCRIPT
DEFEND YOUR ORGANISATION FROM CYBER THREATSby Creating Alignment Between People, Organisational Processes & Technology
CYBER SECURITY: High-Performance Training & Implementation Solutions
PROCESS/POLICY
PEOPLE TECHNOLOGY
Optimizing IT Workforce Performance
A Holistic Approach to Optimise Your
Workforce
Learn more
National Cybersecurity Workforce Framework
Workshop
Learn more
GCHQ Certified Training Courses
Learn more
90%90% of all reported security incidents are the result of
human error
58%58% of CISOs said their
IT systems were definitely or probably under attack without them knowing it
2,000,000Shortage of 2,000,000 trained cyber security professionals by 2017
Optimise Your Cyber Security Workforce by Creating Alignment Between People, Processes & Technology
Learning Tree Leverages Industry Frameworks
National Institute of Standards & Technology (NIST) Framework
With the NIST Cybersecurity Framework, an organisation can use its current process and overlay it onto the Framework to determine gaps in its current cyber security risk approach and develop a road map to improvement.
National Cybersecurity Workforce Framework (NCWF) as Defined by NICE
The NCWF as defined NICE has seven categories, each comprised of several specialty areas. Each specialty area is comprised of tasks, as well as the Knowledge, Skills and Abilities (KSAs) required to complete the tasks.
GCHQ Certified Training & the IISP Skills Framework
The UK Government Communications Headquarters (GCHQ), one of the three UK Intelligence and Security Agencies, has developed the GCHQ Certified Training Scheme (GCT) to provide high quality, relevant Cyber Security training that is consistent with industry best practice and mapped to the Industry respected IISP Skills Framework. Accredited training delivery, content and customer service is assessed and accredited by APMG-International, the accreditors for the GCT Scheme.
- National Strategy, Roles, and Responsibilities Need to Be Better Defined
and More Effectively Implemented, U.S. Government Accountability Office
- Core Security
- Network World
PEOPLEHaving a clear, up-to-date
understanding of job roles and the competent people to fulfill those
roles is essential for any organisation to function effectively in a cyber
security environment.
PROCESS/POLICYCyber attacks are evolving and
striking organisations constantly. To continuously defend your
organisation from these threats, your workforce needs to establish
structured processes and implement best practices.
TECHNOLOGYWhile new technology can be easy to acquire, your organisation will
still be at risk of an attack until your people have the right security skills.
By providing your workforce with the right cyber security training, your technology will be implemented at
full potential.
CYBER SECURITY THREATS ARE ON THE RISE
A HOLISTIC APPROACH TO OPTIMISE YOUR WORKFORCE
IMPLEMENTProcess & Organisational
Improvements
ENHANCEKnowledge, Skills &
Abilities (KSAs)ASSESS/MAPKnowledge, Skills &
Abilities (KSAs)
DEFINEOrganisational Structure, Processes & Job Roles
› Leveraging the National Cybersecurity Workforce Framework (NCWF), develop an optimal cyber security organisational design, including defined roles and job descriptions
› Based on your cyber security needs, ensure you have the proper policies and processes well-defined, using best practices from the NIST Cybersecurity Framework
› Align the Knowledge, Skills, and Abilities (KSAs) of your workforce to each role of the NCWF
› Determine the KSAs of your existing staff and identify skill gaps using automated skills assessments
› Develop a customised cyber security curriculum with individual Learning Plans to meet the needs of your staff and organisation
› Provide programme management of the training, coaching, and mentoring of your staff
› Benefit from GCHQ Certified Training and Learning Tree exam resulting in an independent APMG-International GCT Certificate Award
› Rapidly increase the process maturity of your cyber security organisation with customised Acceleration Workshops
› Embed our expert instructors to help your staff apply newly gained skills on the job
CYBE
R SE
CURI
TYAC
CELE
RATI
ON W
ORKS
HOPS
• Leverage the NCWF to identify the optimal cyber security organisational structure and job role descriptions
• Improve threat identification and analysis in the organisation’s Security Operations Center (SOC)
• Establish a cyber security forensics process for the organisation
• Refine the organisation’s cyber security testing and certification approach
• Establish an organisation risk management approach based on the NIST Cybersecurity Framework
• Invest in training that has been validated as GCHQ Certified Training. Optimizing IT Workforce Performance
Learning Tree Cyber Security Courses are Aligned With the NCWF* as Defined by NICE* and the IISP Skills FrameworkGain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, and many more!
LEARN MORE AT: LEARNINGTREE.SE/CYBER OR CALL 08-506 668 00
SECURELY PROVISIONConceptualizing, Designing, and Building Secure IT Systems
Information Assurance Compliance} Cyber Security: Accessibility & Quality
Course 3674 • 4 Days} Vulnerability Assessment
Course 589 • 4 Days
Software Security Engineering} Securing Web Applications, Services & Servers
Course 940 • 4 Days} Penetration Testing: Tools & Techniques
Course 537 • 4 Days} Mobile Application & Device Security
Course 2781 • 3 Days
OPERATE & MAINTAINProviding Support, Administration, and Maintenance of IT Systems
Customer Service & Technical Support} System & Network Security Introduction
Course 468 • 4 Days} Social Engineering Deceptions & Defenses
Course 2012 • 3 Days} CompTIA A+ Certification Exam Prep
Course 445 • 5 Days
Data Administration} SQL Server Introduction
Course 2107 • 4 Days} SQL Server Database Administration
Course 2108 • 4 Days} Relational Database Design, Tools & Techniques*
Course 382 • 4 Days
PROTECT & DEFENDIdentification, Analysis, and Mitigation of Threats to Internal IT Systems or Networks
CND Analyst} Cyber Security: Accessibility & Quality
Course 3674 • 4 Days} CompTIA Network+ Certification Exam Prep
Course 2708 • 5 Days} CompTIA Cybersecurity Analyst CSA+ Exam Preparation
Course 2047 • 5 Days} Certified Ethical Hacker (CEH) Certification Exam Prep
Course 2031 • 5 Days} EC-Council Certified Hacking Forensic Investigator (CHFI)
Exam Preparation Course 2023 • 4 Days
CND Infrastructure Support} System & Network Security Introduction
Course 468 • 4 Days} Defending the Perimeter from Cyber Attacks
Course 2010 • 4 Days } Endpoint Security & Network Access Control
Course 2011 • 4 Days} Certified Network Defender (CND)
Course 2032 • 5 Days
INVESTIGATEInvestigation of Cyber Events and/or Crimes of IT Systems, Networks, and Digital Evidence
Digital Forensics} Penetration Testing: Tools & Techniques
Course 537 • 4 Days} Digital Forensics: Tools & Techniques
Course 2055 • 5 Days
Investigation} Vulnerability Assessment
Course 589 • 4 Days
OVERSIGHT & DEVELOPMENTProviding Leadership, Management, Direction, and/or Development of Advocacy
Information Systems Security Operations} Certified Information Systems Auditor (CISA) Exam Prep
Course 2040 • 4 Days} Cyber Security Risk Assessment & Management
Course 2013 • 4 Days} Certified Information Systems Security Professional (CISSP)
Exam Prep Course 2058 • 5 Days
} (ISC)² Certified Cloud Security Professional (CCSP) Exam Prep Course 1213 • 5 Days
Security Program Management} Cyber Security Risk Assessment & Management
for the U.S. Government Course 2051 • 4 Days
} Strategic Thinking for Operational Management Course 3310 • 3 Days
} Certified Information Security Manager (CISM) Exam Prep Course 2036 • 4 Days
} EC-Council Certified Chief Information Security Officer (CCISO) Exam Preparation Course 2026 • 5 Days
ANALYSEReview and Evaluation of Incoming Cyber Security Information
All Source Intelligence} EC-Council Certified Security Analyst (ECSA)
Exam Preparation Course 2024 • 5 Days
} Essentials of Activity-Based Intel. (ABI)* Course 8101 • 1 Day
} Applying Activity-Based Intel. Methods* Course 8205 • 5 Days
Exploitation Analysis} CompTIA Security+ Certification Exam Prep
Course 446 • 5 Days} Penetration Testing: Tools & Techniques
Course 537 • 4 Days
Learning Tree Cyber Security Courses are Aligned With the NCWF* as Defined by NICE* and the IISP Skills FrameworkGain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, and many more!
Learning Tree has developed a learning path of 5 GCT Certified Application Level Courses mapped to the IISP Skills Framework:
• System and Network Security Introduction Course 468 • 4 Days
• Cyber Risk Assessment and Management Course 2013 • 4 Days
• Defending the Perimeter from Cyber Attacks Course 2010 • 4 days
• Securing Web Applications, Services and Servers Course 940 • 4 days
• Penetration Testing: Tools and Technique Course 537 • 4 days
Optimizing IT Workforce Performance
= GCT CERTIFIED
Cyber Security: Risk Management for the C-Suite Webinar On Demand 1068 • 1 Hour
SEE NEXT PAGE TO LEARN MORE }
COMPLIMENTARY WEBINAR ON DEMAND
Presented by RICHARD A. SPIRES CEO, Learning Tree
Investigation} Vulnerability Assessment
Course 589 • 4 Days
Systems Development} Securing Web Applications, Services & Servers
Course 940 • 4 Days} Cyber Security: Accessibility & Quality
Course 3674 • 4 Days
System Requirements Planning} System & Network Security Introduction
Course 468 • 4 Days} Disaster Recovery Planning
Course 289 • 4 Days} Identity Management
Course 2056 • 4 Days
Network Services} Introduction to Networking
Course 450 • 4 Days} Network Configuration & Troubleshooting
Course 451 • 4 Days} CompTIA Network+ Certification Exam Prep
Course 2708 • 5 Days
System Administration} Windows Server Group Policy Management*
Course 963 • 4 Days
Systems Security Analysis} Defending the Perimeter from Cyber Attacks
Course 2010 • 4 Days} Social Engineering Deceptions & Defenses
Course 2012 • 3 Days} Endpoint Security & Network Access Control
Course 2011 • 4 Days
Vulnerability Assessment & Management} Vulnerability Assessment
Course 589 • 4 Days} Penetration Testing: Tools & Techniques
Course 537 • 4 Days} Advanced Threats: Targeted Attacks/Defenses
Course 2054 • 4 Days
Threat Analysis} Social Engineering Deceptions & Defenses
Course 2012 • 3 Days
Incident Response} CompTIA Security+ Certification Exam Prep
Course 446 • 5 Days} Digital Forensics: Tools & Techniques
Course 2055 • 5 Days} EC-Council Certified Incident Handler (ECIH)
Exam Preparation Course 2025 • 5 Days
* These courses are exclusively available for Private Team Training delivery at your preferred location
LEARNINGTREE.SE/CYBER 08-506 668 00
National Cybersecurity Workforce Framework WorkshopWorkshop Course 3941 • 1 DayIn this workshop, an expert advisor is embedded in your organisation to provide a practical demonstration of how to apply the National Cybersecurity Workforce Framework and address your specific cyber security needs.
LEARN MORE AT: LEARNINGTREE.SE/3941
APPLY THE NICE FRAMEWORK IN YOUR ORGANISATION
COMPLIMENTARY WEBINAR ON DEMAND
LEARN MORE AT: LEARNINGTREE.SE/CYBER OR CALL 08-506 668 00
I received an overview of cyber security topics, terms, and trends at just the right level of depth for its executive audience. I left impressed by the credentials and experience of the facilitator and armed with the right questions to ask my organisation.
— R. Svec, Director of Learning and DevelopmentVeris Group, LLC
This course helps managers view the c-suite from a different perspective, and move into the mind set of cyber security. It provided a technical overview on the evolution process of cyber security, while balancing board-level strategy with technical detail. I would recommend both managers and c-level professionals take this course. — Anonymous, Manager working with his CISO
“
““
“
Optimizing IT Workforce Performance
Presented by
RICHARD A. SPIRESCEO, Learning Tree
Former CIO at the U.S. Department of Homeland Security and the IRS
Cyber Security: Risk Management for the C-SuiteWebinar On Demand 1068 • 1 HourKey Objectives• Provide baseline knowledge of cyber security issues with
a focus on its difficulty and scope
• Highlight that cyber security is a risk management problem and recognise the need for a robust risk management process
• Explain board and c-suite responsibilities in regards to cyber security
LEARN MORE AT: LEARNINGTREE.SE/CYBERCSUITE
SE17
01 C
yber
Sec
LEARNINGTREE.SE/CYBER 08-506 668 00
HIGH-PERFORMANCE TRAINING & IMPLEMENTATION SOLUTIONS FROM LEARNING TREE
Optimizing IT Workforce Performance
ITIL®, PRINCE2®, MSP® and PRINCE2 Agile® are registered trade marks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. COBIT® is a registered trademark of
Information Systems Audit and Control Association® (ISACA®). IIBA® is a registered trademark owned by International Institute of Business Analysis. CBAP® and CCBA® are registered
certification marks owned by International Institute of Business Analysis. PMI, PMP, CAPM, PMI-ACP, and PMI-PgMP are marks of the Project Management Institute, Inc.
APMG-International Change Management and AgilePM are trademarks of The APM Group Limited, used under permission of The APM Group Limited. All rights reserved.
APPLY THE NICE FRAMEWORK IN YOUR ORGANISATION
COMPLIMENTARY WEBINAR ON DEMAND
Trusted Partner for 60,000+ Organisations
serving national and multinational corporations,
government agencies, education and non-profits
600+ Expert Advisors
serving our global customer footprint and averaging
20+ years of diverse real-world experience
Demonstrated Past Performance
in offering end-to-end proven capabilities to provide all facets of Workforce Optimisation resulting in improved organisational alignment
For over 40 years, Learning Tree has been a Proven Market Leader
DATA & SECURITY
Activity-Based Intelligence
Big Data
Business Intelligence
Cyber Security
Oracle
SQL Server
APPLICATION OPERATING SYSTEMS
UNIX & Linux
Windows Desktop
Windows Systems
APPLICATION DEVELOPMENT
.NET / Visual Studio
Adobe
Agile & Scrum
Apple Programming
Java Programming
Mobile App Development
Python, Perl & C++
Software Development
Web Development
BUSINESS MANAGEMENT
Business Analysis
Communication Skills
IBM
ITIL ®, COBIT ® & TOGAF®
Leadership & Professional Development
Microsoft Office
Project Management
SharePoint
NETWORKING
Cisco
Cloud Computing
Networking & Virtualisation
BRAND
Adobe
Cisco
IBM
Oracle