Course Catalog

null

DHS FEMA Courses

These courses are provided by the Department of Homeland Security and free to individuals and jurisdictions

null

IT Certifications

These courses improve IT and cybersecurity skills and credentials

null

Industry Courses

These courses are designed to assist industry with various aspects of their cybersecurity program

DHS FEMA

Community Cybersecurity

AWR135 – 6.00 Hours

The Promoting Community Cybersecurity (PCCS) course is designed to give participants an introduction to cybersecurity topics, methods, and processes, and to explore organizational responsibilities in the context of the community, state and nation. The course provides an overview of the steps taken within organizations to protect their cyber resources. The course also looks at that protection within the context of the broader community. Participants will explore the impact of the interconnections and dependencies introduced by information technology. Basic concepts of of cybersecurity, network connectivity, threats, types of attacks, and the structure of the Community Cybersecurity Maturity Model (CCSMM) will be discussed. The basic characteristics of communities and organizations that exhibit good cybersecurity are examined through the use of case studies within the context of each CCSMM dimension. In addition, the interrelationships between the dimensions of the CCSMM and the dependency on each dimension for good cybersecurity are also discussed.

Course Objectives

At the conclusion of the course, participants will be able to:

  • Recognize various types of cyber threats and attacks.
  • Identify the dimensions and general structure of the CCSMM.
  • Recognize failures and successes in each of the CCSMM dimensions.
  • Identify how to improve those dimensions within their own community and/or organization.
  • Describe interdependencies associated with the CCSMM.
Prerequisite

A general awareness of computer systems and their vulnerabilities is assumed. Ideally, this course would be taken following the AWR-136: Essentials of Community Cybersecurity course and/or a Community Cybersecurity Exercise.

Topics
  • The security environment
  • What is being attacked
  • Threats
  • Types of attacks
  • The potential for catastrophe
  • The Community Cybersecurity Maturity Model (CCSMM)
  • Awareness
  • Information Sharing
  • Processes
  • Planning
  • The environment
  • Interrelationships between dimensions
  • What to do next
Audience

The target audience is general managers, security personnel, planning personnel, incident responders, and IT managers who oversee computer and network operations. These groups are included to ensure a common body of knowledge when dealing with cybersecurity incidents and issues.

VIEW SCHEDULE & REGISTER
AWR136 – 4.00 Hours

The Essentials of Community Cybersecurity (ECCS) course provides individuals, community leaders, and first responders with information on how cyber attacks can impact, prevent, and/or stop operations and emergency responses in a community. The course also provides a cursory introduction to cybersecurity vulnerabilities, risks, threats, and countermeasures. It explains vulnerabilities of computer systems and networks and how these vulnerabilities can affect communities, organizations, and daily workplace operations. The course introduces actions communities can take in establishing a cybersecurity program. The course provides participants with an awareness of issues. It gives an overview of threats and vulnerabilities, without going into too many details, to highlight the potential impact a cyber attack could have. Participants discuss some of the fundamental activities needed to develop a cybersecurity program, without addressing the technical details of how to secure critical infrastructures. The course introduces the Community Cybersecurity Maturity Model (CCSMM) as a framework for understanding community cybersecurity and offers a brief introduction to low-cost or no-cost approaches to securing a community against cybersecurity threats and attacks. The course sets the stage for further efforts in which a community can build a cybersecurity program.

Course Objectives

At the conclusion of the course, participants will be able to:

  • Recognize why community cybersecurity is important.
  • Recognize the characteristics of a community cybersecurity program.
Prerequisite

There are no prerequisites for the course. No prior background in cybersecurity or information technology is required.

Topics
  • Why cybersecurity is important
  • Unstructured threats
  • Structured threats
  • Highly structured threats
  • The Community Cybersecurity Maturity Model (CCSMM)
  • Things a community can do to initiate a cybersecurity program
  • Where to go for help
Audience

The target audience is personnel involved with critical infrastructure, emergency operations, and incident response in public or private organizations, including state, county, and municipal officials; members of industry affiliations and chambers of commerce.

VIEW SCHEDULE & REGISTER

Cybersecurity Online Tracks

Cybersecurity for Everyone (CYBER 101)

Information Security for Everyone AWR175 – 10.5 hrs

Information Security for Everyone is designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. By presenting best practices along with a small amount of theory, trainees are taught both what to do and why to do it. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks, and safe Internet usage.

Two credit hours through ACE are provided only if all three courses within the Online for Everyone – Non-Technical (Cyber 101) track are completed.

There are no prerequisites for this course.

Topics
  • Safe internet usage
  • Securing a clean computer
  • Securing a corrupted computer
  • Protecting your computer and its contents
  • Securing computer networks
  • Secure communications and information security best practices
  • Maintaining Privacy Guidelines for maintaining privacy while surfing the internet

Cyber Ethics AWR174 – 13 hrs

Cyber Ethics is designed to teach students the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern Internet. In addition to providing students with the skills to assess future ethical dilemmas for themselves, Cyber Ethics also looks at some of the more pressing concerns related to Internet usage today.

Two credit hours through ACE are provided only if all three courses within the Online for Everyone – Non-Technical (Cyber 101) track are completed.

There are no prerequisites for this course.


Topics
  • Overview and terminology
  • Privacy
  • Intellectual property
  • Professional codes of ethics
  • Freedom of Speech on the internet
  • Issues related to ethical hacking

Cyber Law and White Collar Crime AWR168 – 10 hrs

This intermediate course is designed to teach students the fundamentals of computer crime issues from a legal perspective. The training will highlight the various computer crimes and appropriate response by first defenders and others that may encounter these types of issues. Participants learn legislations and organizational efforts to control or prevent such crimes. This course covers intellectual property law (copyright, trade secrets, unfair competition, and unfair business practices), personal jurisdiction, electronic commerce and software contracts, telecommunications, antitrust, privacy, the right to accuracy of information, the right to access information, and the First Amendment.

Two credit hours through ACE are provided only if all three courses within the Online for Everyone – Non-Technical (Cyber 101) track are completed.

Prerequisites: Completion of Information Security Basics (AWR173), Cyber Ethics (AWR174), and Information Security for Everyone <em>or knowledge and understanding of topics</em>


Topics
  • Miscellaneous Cybercrimes
  • Key terms and concepts in cyber law
  • Intellectual property cybercrimes
  • Trademarks and domain name theft
  • Internet fraud
  • Electronic evidence and E-discovery

Cybersecurity for IT Professionals (CYBER 201)

Information Security Basics AWR173 – 13 hrs

Information Security Basics is designed to teach entry and mid-level IT staff the technological fundamentals of information security. The goal of this course is to provide trainees some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to providing an introduction to information assurance, trainees will also learn general concepts (terminologies), an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography.

Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed.


Topics
  • Overview and terminology
  • General concepts
  • TCP/IP networking
  • Network security
  • Operating systems and security
  • Cryptography

Network Assurance AWR138 – 10.5 hrs

Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation.

Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed.

It is recommended that you have completed Information Security Basics and Information Security for Everyone or have good working knowledge of topics… read more.


Topics
  • Layered defense
  • Surveillance and reconnaissance
  • Outsider threat protection

Secure Software AWR178 – 9 hrs

This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies.

Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed.


Topics
  • Secure software programming
  • Secure software design and testing
  • Secure software methodologies

Digital Forensics Basics AWR139 – 7 hrs

This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis, and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.

Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed.


Topics
  • Evidentiary reporting
  • Computer technologies
  • Digital evidence collection

Cybersecurity for Business Professionals (CYBER 301)

Information Risk Management AWR177 – 13 hrs

This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training on information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies, and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.

Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed.

There are no prerequisites for this course.


Topics
  • Introduction to Information Security Risk Management
  • Asset evaluation and Business Impact Analysis
  • Risk identification
  • Risk quantification
  • Risk response development and control
  • Security policy, compliance, and business continuity

Cyber Incident Analysis and Response AWR169 – 10 hrs

This course covers various incident analysis tools and techniques that support dynamic vulnerability analysis and elimination, intrusion detection, attack protection, and network/resources repair. The trainee will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response.

Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed.

There are no prerequisites for this course.


Topics
  • Introduction to incident management
  • Incident preparation
  • Incident detection and analysis
  • Containment, eradication, and recovery
  • Proactive and post incident cyber services

Disaster Recovery for Information Systems AWR176 – 10 hrs

Disaster Recovery for Information Systems will train business managers to respond to varying threats that might impact their organization’s access to information. This course provides requisite background theory and recommended best practices needed by managers to keep their offices running during incidents of different types. Topics include an overview of business continuity planning; disaster recovery planning; guides for implementing and managing disaster recovery plans, a discussion of technical vulnerabilities faced by organizations, and an examination of legal issues that may confront an organization.

Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed.

There are no prerequisites for this course.


Topics
  • Overview of business information continuity
  • Guides for implementing and managing business information continuity plan
  • Discussion of technical vulnerabilities faced by organizations
  • Examination of legal issues that may confront an organization

IT Certifications

Students will perform evaluations of organizational policies, procedures, and processes to ensure that an organization’s information systems align with overall business goals and objectives. You will evaluate the security and controls of business structure and governance methods; the policies, procedures, and guidelines used; and the overall security of the business environment. Also, this course will help you prepare for the ISACA® CISA® certification exam.

Topics
  • Information Systems Audit Process
  • IT Governance
  • Systems & Infrastructure Lifecycle Management & Maintenance
  • IT Service Delivery & Support
  • Protection of Information Assets
  • Business Continuity & Disaster Recovery
VIEW SCHEDULE & REGISTER

CISM certification program was developed by the Information Systems Audit and Control Association (ISACA) for experienced Information security management professionals with work experience in developing and managing information security programs and who understand the programs relationship with the overall business goals. The CISM exam is offered three times a year (June, September, and December), consisting of 200 multiple-choice questions that cover the four CISM domains. The American National Standards Institute (ANSI) has accredited the CISM certification program under ISO/IEC 17024:2003, General Requirements for Bodies Operating Certification Systems of Persons.

Topics
  • Testing-Taking Tips & Study Strategies
  • Information Security Governance
  • Information Risk Management
  • Information Security Program Development & Management
  • Incident Management & Response
VIEW SCHEDULE & REGISTER

Practitioner Boot Camp is a five-day, intensive cyber security training course focused on more complex, technical cyber skills and scenarios. CSXP Boot Camp is an accelerated alternative to our more comprehensive three-week CSX Practitioner course series. CSXP Boot Camp is conducted in an adaptive, live cyber lab environment, enabling students to build critical technical skills by learning complex concepts and practice applying industry-leading methods. They will learn to utilize the latest open source tools within actual, real-world scenarios. CSXP Boot Camp is an ideal way to build complex and advanced technical skills essential for career advancement and will help students in preparing for the CSXP certification exam.

VIEW SCHEDULE & REGISTER

The Certified Authorization Professional (CAP) certification is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of authorizing and maintaining information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements and documentation. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals. The CAP credential is appropriate for commercial markets, civilian and local governments and the US Federal government including the State Department and the Department of Defense. Job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers as well as all senior system managers apply.

Topics
  • IT Security
  • Information Assurance
  • Information Risk Management
  • Certification
  • Systems Administration
  • Information Security Policy
  • NIST documentation
VIEW SCHEDULE & REGISTER

Attackers and researchers continue to expose new application vulnerabilities, and it’s no wonder that application vulnerabilities are ranked the #1 threat to cybersecurity professionals (according to the 2015 (ISC)2 Global Information Security Workforce Study). Web application security must be a priority for organizations to protect their business and reputation. For this reason, it is crucial that anyone involved in the software development lifecycle (SDLC) be knowledgeable and experienced in understanding how to build secure software. The CSSLP certification validates software professionals have the expertise to incorporate security practices – authentication, authorization and auditing – into each phase of the SDLC, from software design and implementation to testing and deployment. CSSLPs have proven proficiency.

Topics
  • Secure Software Concepts
  • Secure Software Concepts, Requirements, Design, Implementation/Coding & Testing
  • Software Acceptance
  • Software Deployment, Operations, Maintenance, & Disposal
  • Supply Chain & Software Acquisition
VIEW SCHEDULE & REGISTER

Emerging cloud computing demands individuals who understand its information security risks and mitigation strategies. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with the right cloud security knowledge and skills to be successful. Globally recognized and backed by the two leading non-profits focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)2, the CCSP credential denotes professionals with deep-seated knowledge and competency derived from hands-on experience with cyber, information, software and cloud computing infrastructure security. CCSPs help you achieve the highest standard for cloud security expertise and enable your organization to benefit from the power of cloud computing while keeping sensitive data secure.

VIEW SCHEDULE & REGISTER

As the rapidly evolving healthcare industry faces increasing challenges to keeping personal health information protected, there is a growing need to ensure knowledgeable and credentialed security and privacy practitioners are in place to protect this sensitive information. HCISPPs provide the frontline defense in protecting health information. Backed by (ISC)2, a global not-for-profit organization that delivers the gold standard for information security certifications, the HCISPP credential confirms a practitioner’s core knowledge and experience in security and privacy controls for personal health information.

VIEW SCHEDULE & REGISTER

The CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to build and maintain security programs to protecting organizations from growing sophisticated attacks. The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. Backed by (ISC)2®, the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/ IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.

This is an online training option for the CISSP prep course.

VIEW SCHEDULE & REGISTER

The CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to build and maintain security programs to protecting organizations from growing sophisticated attacks. The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. Backed by (ISC)2®, the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/ IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.

This is a classroom-based training option for the CISSP prep course.

VIEW SCHEDULE & REGISTER

The Certified Ethical Hacker (CEH) Certification Course certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. CEH certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A CEH is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Topics
  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Various types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sniffing techniques and how to defend against sniffing
  • Social Engineering techniques, identity theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
VIEW SCHEDULE & REGISTER

The Certified Ethical Hacker (CEH) Certification Course certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. CEH certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A CEH is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Topics
  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Various types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sniffing techniques and how to defend against sniffing
  • Social Engineering techniques, identity theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
VIEW SCHEDULE & REGISTER

The CHFI program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Topics
  • Computer Forensics in today’s world
  • Computer Forensic Investigation Process
  • Searching & Seizing Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigation Using AccessData FTK and Deleted Partitions
  • Forensics Investigation Using Access Data and EnCase
  • Steganography and Image File Forensics
  • Application Passwords Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs, and Investigating Network Traffic
  • Investigating Web and Wireless Attacks
  • Tracking Emails and Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
  • Becoming an Expert Witness
VIEW SCHEDULE & REGISTER

The ECSA penetration testing certification is a security credential like no other. This Certified Security Analyst penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

Topics
  • Security analysis & penetration testing methodologies
  • TCP IP packet analysis
  • Pre-penetration testing steps
  • Information gathering methodology
  • Vulnerability analysis
  • External & internal network penetration testing methodology
  • Firewall, IDs, web application, SQL, and database penetration testing
  • Wireless network, cloud, and mobile devices penetration testing methodology
  • Report writing and post-test actions
VIEW SCHEDULE & REGISTER

To earn the prestigious EC-Council LPT (Master) Credential, you must successfully pass our most challenging practical exam available. The LPT (Master) practical exam is the capstone to EC-Council’s entire information security track, from the Certified Ethical Hacker Program (C|EH) to the EC-Council Certified Security Analyst (E|CSA) Program. It all culminates with the ultimate test of your career as a penetration tester – the Licensed Penetration Tester practical exam.

VIEW SCHEDULE & REGISTER

EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.

Topics
  • Technical application of information security management principles from an executive management standpoint
VIEW SCHEDULE & REGISTER

Organizational focus on cyber defense is more important than ever as cyber breaches have a far greater financial impact and can cause broad reputational damage. Despite best efforts to prevent breaches, many organizations are still being compromised. Therefore organizations must have, as part of their defense mechanisms, trained network engineers who are focused on protecting, detecting, and responding to the threats on their networks.

Topics
  • Protect, detect, and respond approach to network security
  • Network security technologies and operations
VIEW SCHEDULE & REGISTER

IT success stories start with CompTIA A+ certification. It validates understanding of the most common hardware and software technolgies in business and certifies the skills necessary to support complex IT infrastrutures. CompTIA A+ is a powererful credential that helps IT professionals worldwide ignite their IT careers.
Held by over 1 million IT professionals worldwide, CompTIA A+ is the most essential IT certification for establishing an IT career. If you’re new to the IT industry, this will help you put your best foot forward. And if you’re already an IT professional, the CompTIA A+ certification validates your skills and can boost your career.

Our unique model follows a streamlined approach to workforce development and
skills attainment.

Assess: Assess each indvidual to determine existing skill sets
Educate: Deliver goal-specific training utilizing all delivery modalities
Mentor: Expose students to instructors and mentors with front-line IT can cybersecurity experience
Certify: Certify students with the requisite hands-on skills to perform the tasks related to their functional roles
Validate: Validate student abilities through performance analytics and real-world exercises hosted on a cyber range

VIEW SCHEDULE & REGISTER

The stakes are high. Data networks are more crucial for businesses than ever before.

They are the lifeline to the critical financial, healthcare and information services that need to function at the highest, most secure level. With a CompTIA Network+
certification, you will possess the key skills to troubleshoot, configure and manage
these systems and keep your company productive.

CompTIA Network+ is a vendor neutral networking certification that is trusted
around the world. It validates the essential knowledge and skills needed to
confidently design, configure, manage and troubleshoot any wired and wireless
networks. CompTIA Network+ certified individuals are in-demand worldwide.

VIEW SCHEDULE & REGISTER

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career. IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place. That’s where CompTIA Security comes in. Get this certification and employers are sure you’re ready for the hackers.

Topics
  • Network Architecture, Operations, and Security
  • Troubleshooting
  • Industrial Standards, Practices, and Network Theory
VIEW SCHEDULE & REGISTER

CompTIA Advanced Security Practitioner (CASP) meets the growing demand for advanced IT security in the enterprise. Recommended for IT professionals with at least 5 years of experience, CASP certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments. The current landscape of cybersecurity requires specialized skills to troubleshoot via customized hacks and build solid solutions. Each hack is unique and must be combated with master-level security skills and experience.

Topics

Enterprise Security
Risk management and incident response
Research and analysis
Integration of computing, communications, and business disciplines
Technical integration of enterprise components

Audience

IT professionals

VIEW SCHEDULE & REGISTER

CompTIA Certified Technical Trainer (CTT ) certification is for instructors who want to verify they have attained a standard of excellence in the training field. CTT validates the knowledge and use of tools and techniques necessary for successfully teaching in today’s learning environments. Earning the CTT certification designates you as an exceptional trainer in your field. As an instructor, you not only have to plan engaging classroom lectures, practice tasks and exams, but you must also be a knowledgeable and effective communicator. CTT certification provides comprehensive training standards to validate your skills in a traditional or virtual classroom environment, and ensures that you can teach effectively and step up to the front of the class with confidence.

VIEW SCHEDULE & REGISTER

Industry Cybersecurity Courses

As manufacturing becomes more advanced with integrated systems and technology that continually monitors and manipulates various aspects of production, the industry’s dependence on cyber will only intensify in the future. Cyber space is woven into every aspect of business, and companies must ensure that they have properly considered the impact and ramifications of an intentional or accidental cyber event for not only themselves, but also their supply chain.

The Cybersecurity for Manufacturing Executives classroom-based course provides awareness level training specifically to the manufacturing sector. The course will provide information on the cybersecurity threats endangering manufacturing businesses, particularly through the various Industrial Control Systems (ICS) in place throughout the industry. The course will provide guidance outlining the protective measures needed to reduce the vulnerability of these control systems and other business operations to malicious attacks and threats.

Prerequisite

There are no required prerequisites to attend this course; however, the DHS sponsored online courses AWR-169 Cyber Incident Analysis and Response, AWR-176 Business Information Continuity, and AWR-177 Information Risk Management are recommended.

Recommended

Learners should have the ability/authority to make improvements in their work area.

Topics
  • The integration of IT and Industrial Control Systems
  • Cyber threats
  • Business implications of a cyber incident
  • Preparing a cybersecurity program
  • Implementation of a cybersecurity program
  • Case studies
  • Resources
Audience

The Cybersecurity for Manufacturing Executives course is tailored for business owners, C-suite personnel, Operations managers, IT managers in the manufacturing environment.

VIEW SCHEDULE & REGISTER