cyber security training se edition

7
DEFEND YOUR ORGANISATION FROM CYBER THREATS by Creating Alignment Between People, Organisational Processes & Technology CYBER SECURITY: High-Performance Training & Implementation Solutions PROCESS/ POLICY PEOPLE TECHNOLOGY A Holistic Approach to Optimise Your Workforce Learn more National Cybersecurity Workforce Framework Workshop Learn more GCHQ Certified Training Courses Learn more

Upload: learningtree-international

Post on 26-Jul-2016

216 views

Category:

Documents


1 download

DESCRIPTION

SE edition

TRANSCRIPT

Page 1: Cyber security training SE edition

DEFEND YOUR ORGANISATION FROM CYBER THREATSby Creating Alignment Between People, Organisational Processes & Technology

CYBER SECURITY: High-Performance Training & Implementation Solutions

PROCESS/POLICY

PEOPLE TECHNOLOGY

Optimizing IT Workforce Performance

A Holistic Approach to Optimise Your

Workforce

Learn more

National Cybersecurity Workforce Framework

Workshop

Learn more

GCHQ Certified Training Courses

Learn more

Page 2: Cyber security training SE edition

90%90% of all reported security incidents are the result of

human error

58%58% of CISOs said their

IT systems were definitely or probably under attack without them knowing it

2,000,000Shortage of 2,000,000 trained cyber security professionals by 2017

Optimise Your Cyber Security Workforce by Creating Alignment Between People, Processes & Technology

Learning Tree Leverages Industry Frameworks

National Institute of Standards & Technology (NIST) Framework

With the NIST Cybersecurity Framework, an organisation can use its current process and overlay it onto the Framework to determine gaps in its current cyber security risk approach and develop a road map to improvement.

National Cybersecurity Workforce Framework (NCWF) as Defined by NICE

The NCWF as defined NICE has seven categories, each comprised of several specialty areas. Each specialty area is comprised of tasks, as well as the Knowledge, Skills and Abilities (KSAs) required to complete the tasks.

GCHQ Certified Training & the IISP Skills Framework

The UK Government Communications Headquarters (GCHQ), one of the three UK Intelligence and Security Agencies, has developed the GCHQ Certified Training Scheme (GCT) to provide high quality, relevant Cyber Security training that is consistent with industry best practice and mapped to the Industry respected IISP Skills Framework. Accredited training delivery, content and customer service is assessed and accredited by APMG-International, the accreditors for the GCT Scheme.

- National Strategy, Roles, and Responsibilities Need to Be Better Defined

and More Effectively Implemented, U.S. Government Accountability Office

- Core Security

- Network World

PEOPLEHaving a clear, up-to-date

understanding of job roles and the competent people to fulfill those

roles is essential for any organisation to function effectively in a cyber

security environment.

PROCESS/POLICYCyber attacks are evolving and

striking organisations constantly. To continuously defend your

organisation from these threats, your workforce needs to establish

structured processes and implement best practices.

TECHNOLOGYWhile new technology can be easy to acquire, your organisation will

still be at risk of an attack until your people have the right security skills.

By providing your workforce with the right cyber security training, your technology will be implemented at

full potential.

CYBER SECURITY THREATS ARE ON THE RISE

Page 3: Cyber security training SE edition

A HOLISTIC APPROACH TO OPTIMISE YOUR WORKFORCE

IMPLEMENTProcess & Organisational

Improvements

ENHANCEKnowledge, Skills &

Abilities (KSAs)ASSESS/MAPKnowledge, Skills &

Abilities (KSAs)

DEFINEOrganisational Structure, Processes & Job Roles

› Leveraging the National Cybersecurity Workforce Framework (NCWF), develop an optimal cyber security organisational design, including defined roles and job descriptions

› Based on your cyber security needs, ensure you have the proper policies and processes well-defined, using best practices from the NIST Cybersecurity Framework

› Align the Knowledge, Skills, and Abilities (KSAs) of your workforce to each role of the NCWF

› Determine the KSAs of your existing staff and identify skill gaps using automated skills assessments

› Develop a customised cyber security curriculum with individual Learning Plans to meet the needs of your staff and organisation

› Provide programme management of the training, coaching, and mentoring of your staff

› Benefit from GCHQ Certified Training and Learning Tree exam resulting in an independent APMG-International GCT Certificate Award

› Rapidly increase the process maturity of your cyber security organisation with customised Acceleration Workshops

› Embed our expert instructors to help your staff apply newly gained skills on the job

CYBE

R SE

CURI

TYAC

CELE

RATI

ON W

ORKS

HOPS

• Leverage the NCWF to identify the optimal cyber security organisational structure and job role descriptions

• Improve threat identification and analysis in the organisation’s Security Operations Center (SOC)

• Establish a cyber security forensics process for the organisation

• Refine the organisation’s cyber security testing and certification approach

• Establish an organisation risk management approach based on the NIST Cybersecurity Framework

• Invest in training that has been validated as GCHQ Certified Training. Optimizing IT Workforce Performance

Page 4: Cyber security training SE edition

Learning Tree Cyber Security Courses are Aligned With the NCWF* as Defined by NICE* and the IISP Skills FrameworkGain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, and many more!

LEARN MORE AT: LEARNINGTREE.SE/CYBER OR CALL 08-506 668 00

SECURELY PROVISIONConceptualizing, Designing, and Building Secure IT Systems

Information Assurance Compliance} Cyber Security: Accessibility & Quality

Course 3674 • 4 Days} Vulnerability Assessment

Course 589 • 4 Days

Software Security Engineering} Securing Web Applications, Services & Servers

Course 940 • 4 Days} Penetration Testing: Tools & Techniques

Course 537 • 4 Days} Mobile Application & Device Security

Course 2781 • 3 Days

OPERATE & MAINTAINProviding Support, Administration, and Maintenance of IT Systems

Customer Service & Technical Support} System & Network Security Introduction

Course 468 • 4 Days} Social Engineering Deceptions & Defenses

Course 2012 • 3 Days} CompTIA A+ Certification Exam Prep

Course 445 • 5 Days

Data Administration} SQL Server Introduction

Course 2107 • 4 Days} SQL Server Database Administration

Course 2108 • 4 Days} Relational Database Design, Tools & Techniques*

Course 382 • 4 Days

PROTECT & DEFENDIdentification, Analysis, and Mitigation of Threats to Internal IT Systems or Networks

CND Analyst} Cyber Security: Accessibility & Quality

Course 3674 • 4 Days} CompTIA Network+ Certification Exam Prep

Course 2708 • 5 Days} CompTIA Cybersecurity Analyst CSA+ Exam Preparation

Course 2047 • 5 Days} Certified Ethical Hacker (CEH) Certification Exam Prep

Course 2031 • 5 Days} EC-Council Certified Hacking Forensic Investigator (CHFI)

Exam Preparation Course 2023 • 4 Days

CND Infrastructure Support} System & Network Security Introduction

Course 468 • 4 Days} Defending the Perimeter from Cyber Attacks

Course 2010 • 4 Days } Endpoint Security & Network Access Control

Course 2011 • 4 Days} Certified Network Defender (CND)

Course 2032 • 5 Days

INVESTIGATEInvestigation of Cyber Events and/or Crimes of IT Systems, Networks, and Digital Evidence

Digital Forensics} Penetration Testing: Tools & Techniques

Course 537 • 4 Days} Digital Forensics: Tools & Techniques

Course 2055 • 5 Days

Investigation} Vulnerability Assessment

Course 589 • 4 Days

OVERSIGHT & DEVELOPMENTProviding Leadership, Management, Direction, and/or Development of Advocacy

Information Systems Security Operations} Certified Information Systems Auditor (CISA) Exam Prep

Course 2040 • 4 Days} Cyber Security Risk Assessment & Management

Course 2013 • 4 Days} Certified Information Systems Security Professional (CISSP)

Exam Prep Course 2058 • 5 Days

} (ISC)² Certified Cloud Security Professional (CCSP) Exam Prep Course 1213 • 5 Days

Security Program Management} Cyber Security Risk Assessment & Management

for the U.S. Government Course 2051 • 4 Days

} Strategic Thinking for Operational Management Course 3310 • 3 Days

} Certified Information Security Manager (CISM) Exam Prep Course 2036 • 4 Days

} EC-Council Certified Chief Information Security Officer (CCISO) Exam Preparation Course 2026 • 5 Days

ANALYSEReview and Evaluation of Incoming Cyber Security Information

All Source Intelligence} EC-Council Certified Security Analyst (ECSA)

Exam Preparation Course 2024 • 5 Days

} Essentials of Activity-Based Intel. (ABI)* Course 8101 • 1 Day

} Applying Activity-Based Intel. Methods* Course 8205 • 5 Days

Exploitation Analysis} CompTIA Security+ Certification Exam Prep

Course 446 • 5 Days} Penetration Testing: Tools & Techniques

Course 537 • 4 Days

Page 5: Cyber security training SE edition

Learning Tree Cyber Security Courses are Aligned With the NCWF* as Defined by NICE* and the IISP Skills FrameworkGain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, and many more!

Learning Tree has developed a learning path of 5 GCT Certified Application Level Courses mapped to the IISP Skills Framework:

• System and Network Security Introduction Course 468 • 4 Days

• Cyber Risk Assessment and Management Course 2013 • 4 Days

• Defending the Perimeter from Cyber Attacks Course 2010 • 4 days

• Securing Web Applications, Services and Servers Course 940 • 4 days

• Penetration Testing: Tools and Technique Course 537 • 4 days

Optimizing IT Workforce Performance

= GCT CERTIFIED

Cyber Security: Risk Management for the C-Suite Webinar On Demand 1068 • 1 Hour

SEE NEXT PAGE TO LEARN MORE }

COMPLIMENTARY WEBINAR ON DEMAND

Presented by RICHARD A. SPIRES CEO, Learning Tree

Investigation} Vulnerability Assessment

Course 589 • 4 Days

Systems Development} Securing Web Applications, Services & Servers

Course 940 • 4 Days} Cyber Security: Accessibility & Quality

Course 3674 • 4 Days

System Requirements Planning} System & Network Security Introduction

Course 468 • 4 Days} Disaster Recovery Planning

Course 289 • 4 Days} Identity Management

Course 2056 • 4 Days

Network Services} Introduction to Networking

Course 450 • 4 Days} Network Configuration & Troubleshooting

Course 451 • 4 Days} CompTIA Network+ Certification Exam Prep

Course 2708 • 5 Days

System Administration} Windows Server Group Policy Management*

Course 963 • 4 Days

Systems Security Analysis} Defending the Perimeter from Cyber Attacks

Course 2010 • 4 Days} Social Engineering Deceptions & Defenses

Course 2012 • 3 Days} Endpoint Security & Network Access Control

Course 2011 • 4 Days

Vulnerability Assessment & Management} Vulnerability Assessment

Course 589 • 4 Days} Penetration Testing: Tools & Techniques

Course 537 • 4 Days} Advanced Threats: Targeted Attacks/Defenses

Course 2054 • 4 Days

Threat Analysis} Social Engineering Deceptions & Defenses

Course 2012 • 3 Days

Incident Response} CompTIA Security+ Certification Exam Prep

Course 446 • 5 Days} Digital Forensics: Tools & Techniques

Course 2055 • 5 Days} EC-Council Certified Incident Handler (ECIH)

Exam Preparation Course 2025 • 5 Days

* These courses are exclusively available for Private Team Training delivery at your preferred location

Page 6: Cyber security training SE edition

LEARNINGTREE.SE/CYBER 08-506 668 00

National Cybersecurity Workforce Framework WorkshopWorkshop Course 3941 • 1 DayIn this workshop, an expert advisor is embedded in your organisation to provide a practical demonstration of how to apply the National Cybersecurity Workforce Framework and address your specific cyber security needs.

LEARN MORE AT: LEARNINGTREE.SE/3941

APPLY THE NICE FRAMEWORK IN YOUR ORGANISATION

COMPLIMENTARY WEBINAR ON DEMAND

LEARN MORE AT: LEARNINGTREE.SE/CYBER OR CALL 08-506 668 00

I received an overview of cyber security topics, terms, and trends at just the right level of depth for its executive audience. I left impressed by the credentials and experience of the facilitator and armed with the right questions to ask my organisation.

— R. Svec, Director of Learning and DevelopmentVeris Group, LLC

This course helps managers view the c-suite from a different perspective, and move into the mind set of cyber security. It provided a technical overview on the evolution process of cyber security, while balancing board-level strategy with technical detail. I would recommend both managers and c-level professionals take this course. — Anonymous, Manager working with his CISO

““

Optimizing IT Workforce Performance

Presented by

RICHARD A. SPIRESCEO, Learning Tree

Former CIO at the U.S. Department of Homeland Security and the IRS

Cyber Security: Risk Management for the C-SuiteWebinar On Demand 1068 • 1 HourKey Objectives• Provide baseline knowledge of cyber security issues with

a focus on its difficulty and scope

• Highlight that cyber security is a risk management problem and recognise the need for a robust risk management process

• Explain board and c-suite responsibilities in regards to cyber security

LEARN MORE AT: LEARNINGTREE.SE/CYBERCSUITE

Page 7: Cyber security training SE edition

SE17

01 C

yber

Sec

LEARNINGTREE.SE/CYBER 08-506 668 00

HIGH-PERFORMANCE TRAINING & IMPLEMENTATION SOLUTIONS FROM LEARNING TREE

Optimizing IT Workforce Performance

ITIL®, PRINCE2®, MSP® and PRINCE2 Agile® are registered trade marks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. COBIT® is a registered trademark of

Information Systems Audit and Control Association® (ISACA®). IIBA® is a registered trademark owned by International Institute of Business Analysis. CBAP® and CCBA® are registered

certification marks owned by International Institute of Business Analysis. PMI, PMP, CAPM, PMI-ACP, and PMI-PgMP are marks of the Project Management Institute, Inc.

APMG-International Change Management and AgilePM are trademarks of The APM Group Limited, used under permission of The APM Group Limited. All rights reserved.

APPLY THE NICE FRAMEWORK IN YOUR ORGANISATION

COMPLIMENTARY WEBINAR ON DEMAND

Trusted Partner for 60,000+ Organisations

serving national and multinational corporations,

government agencies, education and non-profits

600+ Expert Advisors

serving our global customer footprint and averaging

20+ years of diverse real-world experience

Demonstrated Past Performance

in offering end-to-end proven capabilities to provide all facets of Workforce Optimisation resulting in improved organisational alignment

For over 40 years, Learning Tree has been a Proven Market Leader

DATA & SECURITY

Activity-Based Intelligence

Big Data

Business Intelligence

Cyber Security

Oracle

SQL Server

APPLICATION OPERATING SYSTEMS

UNIX & Linux

Windows Desktop

Windows Systems

APPLICATION DEVELOPMENT

.NET / Visual Studio

Adobe

Agile & Scrum

Apple Programming

Java Programming

Mobile App Development

Python, Perl & C++

Software Development

Web Development

BUSINESS MANAGEMENT

Business Analysis

Communication Skills

IBM

ITIL ®, COBIT ® & TOGAF®

Leadership & Professional Development

Microsoft Office

Project Management

SharePoint

NETWORKING

Cisco

Cloud Computing

Networking & Virtualisation

BRAND

Adobe

Cisco

IBM

Oracle