cyber security training uk edition

6
DEFEND YOUR ORGANISATION FROM CYBER THREATS by Creating Alignment Between People, Organisational Processes & Technology CYBER SECURITY: High-Performance Training & Implementation Solutions PROCESS/ POLICY PEOPLE TECHNOLOGY

Upload: learningtree-international

Post on 24-Jul-2016

226 views

Category:

Documents


0 download

DESCRIPTION

UK edition

TRANSCRIPT

DEFEND YOUR ORGANISATION FROM CYBER THREATSby Creating Alignment Between People, Organisational Processes & Technology

CYBER SECURITY: High-Performance Training & Implementation Solutions

PROCESS/POLICY

PEOPLE TECHNOLOGY

Optimizing IT Workforce Performance

90%90% of all reported security incidents are the result of

human error

58%58% of CISOs said their

IT systems were definitely or probably under attack without them knowing it

2,000,000Shortage of 2,000,000 trained cyber security professionals by 2017

Optimise Your Cyber Security Workforce by Creating Alignment Between People, Processes & Technology

Learning Tree Leverages Two Industry Frameworks to Address the People and the Process/Policy

National Institute of Standards & Technology (NIST) Framework

With the NIST Cybersecurity Framework, an organisation can use its current process and overlay it onto the Framework to determine gaps in its current cyber security risk approach and develop a road map to improvement.

National Cybersecurity Workforce Framework (NCWF) as Defined by NICE

The NCWF as defined NICE has seven categories, each comprised of several specialty areas. Each specialty area is comprised of tasks, as well as the Knowledge, Skills and Abilities (KSAs) required to complete the tasks.

- National Strategy, Roles, and Responsibilities Need to Be Better Defined

and More Effectively Implemented, U.S. Government Accountability Office

- Core Security

- Network World

PEOPLEHaving a clear, up-to-date

understanding of job roles and the competent people to fulfill those

roles is essential for any organisation to function effectively in a cyber

security environment.

PROCESS/POLICYCyber attacks are evolving and

striking organisations constantly. To continuously defend your

organisation from these threats, your workforce needs to establish

structured processes and implement best practices.

TECHNOLOGYWhile new technology can be easy to acquire, your organisation will

still be at risk of an attack until your people have the right security skills.

By providing your workforce with the right cyber security training, your technology will be implemented at

full potential.

CYBER SECURITY THREATS ARE ON THE RISE

A HOLISTIC APPROACH TO OPTIMISE YOUR WORKFORCE

IMPLEMENTProcess & Organisational

Improvements

ENHANCEKnowledge, Skills &

Abilities (KSAs)ASSESS/MAPKnowledge, Skills &

Abilities (KSAs)

DEFINEOrganisational Structure, Processes & Job Roles

› Leveraging the National Cybersecurity Workforce Framework (NCWF), develop an optimal cyber security organisational design, including defined roles and job descriptions

› Based on your cyber security needs, ensure you have the proper policies and processes well-defined, using best practices from the NIST Cybersecurity Framework

› Align the Knowledge, Skills and Abilities (KSAs) of your workforce to each role of the NCWF

› Determine the KSAs of your existing staff and identify skill gaps using automated skills assessments

› Develop a Customised Cyber Security Curriculum with individual Learning Plans to meet the needs of your staff and organisation

› Provide programme management of the training, coaching, and mentoring of your staff

› Rapidly increase the process maturity of your cyber security organisation with customised Acceleration Workshops

› Embed our expert instructors to help your staff apply newly gained skills on the job.

CYBE

R SE

CURI

TYAC

CELE

RATI

ON W

ORKS

HOPS • Leverage the NCWF to identify the optimal cyber security

organisational structure and job role descriptions

• Improve threat identification and analysis in the organisation’s SOC

• Establish a cyber security forensics process for the organisation

• Refine the organisation’s cyber security testing and certification approach

• Establish an organisation risk management approach based on the NIST Cybersecurity Framework

Optimizing IT Workforce Performance

Learning Tree Cyber Security Courses are Aligned with the NCWF* as Defined by NICE*Gain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, and many more!

SECURELY PROVISIONConceptualising, Designing and Building Secure IT Systems

Information Assurance Compliance1. Cyber Security: Accessibility & Quality2. Vulnerability Assessment 3. Advanced Security Auditing - Coming Soon

Software Security Engineering1. Securing Web Applications, Services and Servers2. Penetration Testing: Tools & Techniques3. Mobile Application & Device Security

OPERATE & MAINTAINProviding Support, Administration and Maintenance of IT Systems

Customer Service and Technical Support1. System & Network Security Introduction2. Social Engineering Deceptions & Defences 3. CompTIA A+ Certification Exam Prep

Data Administration1. SQL Server Introduction2. SQL Server Database Administration3. Relational Database Design, Tools & Techniques

PROTECT & DEFENDIdentification, Analysis and Mitigation of Threats to Internal IT Systems or Networks

CND Analyst1. Cyber Security: Accessibility & Quality2. Continuous Diagnostic & Management/SIEM - Coming Soon3. CompTIA Network+ Certification Exam Prep

CND Infrastructure Support1. System & Network Security Introduction2. Defending the Perimeter from Cyber Attacks 3. Endpoint Security & Network Access Control

INVESTIGATEInvestigation of Cyber Events and/or Crimes of IT Systems, Networks and Digital Evidence

Digital Forensics1. Penetration Testing: Tools & Techniques2. Digital Forensics: Windows Systems & Mobile 3. Adv. Investigations & Malware Analysis - Coming Soon

Investigation1. Vulnerability Assessment 2. Incident Response - Coming Soon 3. Advanced Investigations & Malware Analysis - Coming Soon

ANALYSEReview and Evaluation of Incoming Cyber Security Information

All Source Intelligence1. Essentials of Activity-Based Intel. (ABI)2. Applying Activity-Based Intel. Methods 3. Activity-Based Intelligence Analysis

Exploitation Analysis1. CompTIA Security+ Certification Exam Prep2. Penetration Testing: Tools & Techniques3. Exploitation Analysis - Coming Soon

OVERSIGHT & DEVELOPMENTProviding Leadership, Management, Direction and/or Development of Advocacy

Information Systems Security Operations1. Cyber Security Risk Assessment & Management2. Preparing for the CISA Exam - Coming Soon3. Preparing for the CISSP Exam

Security Programme Management1. Cyber Security Risk Assessment & Management2. Strategic Thinking for Operational Management3. Preparing for the CISM Exam - Coming Soon

LEARN MORE AT: LEARNINGTREE.CO.UK/CYBER OR CALL 0800-282-353

Learning Tree Cyber Security Courses are Aligned with the NCWF* as Defined by NICE*Gain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, and many more!

Systems Development1. Securing Web Applications, Services and Servers2. Cyber Security: Accessibility & Quality3. Cyber Security: Secure System Dev. - Coming Soon

System Requirements Planning1. System & Network Security Introduction2. Disaster Recovery Planning3. Identity Management

Network Services1. Introduction to Networking2. Network Configuration & Troubleshooting3. CompTIA Network+ Certification Exam Prep

System Administration1. Windows Server 2012 Administration2. Windows Server Group Policy Management3. Windows Server Active Directory Domain Svc.

Systems Security Analysis1. Defending the Perimeter from Cyber Attacks2. Social Engineering Deceptions & Defences3. Endpoint Security & Network Access Control

Incident Response1. CompTIA Security+ Certification Exam Prep2. Digital Forensics: Windows Systems & Mobile3. Detecting Breaches & DDoS - Coming Soon

Vulnerability Assessment and Management1. Vulnerability Assessment 2. Penetration Testing: Tools & Techniques3. Advanced Threats: Targeted Attacks/Defences

Threat Analysis1. Continuous Diagnostic & Management/SIEM - Coming Soon2. Social Engineering Deceptions & Defences3. Malware Analysis / Reverse Engineer - Coming Soon

How Learning Tree Cyber Security Courses Align with the NCWF as defined by NICEThe courses listed provide knowledge and skills vital for workers who must perform the tasks associated with “Computer Network Defence Infrastructure Support”.

SEE EXAMPLE BELOW:

CND Infrastructure SupportTraining that Fulfills Required KSAs*1. System and Network Security Introduction2. Defending the Perimeter from Cyber Attacks 3. Endpoint Security & Network Access Control

Computer Network Defence (CND) Infrastructure SupportKSAs* Required for Job Roles

Tests, implements, deploys, maintains, reviews and administers the infrastructure hardware and software that are required to effectively manage the computer network defence service provider network and resources. Monitors network to actively remediate unauthorised activities.

* KSA: Knowledge, Skills, Abilities

* NICE: National Initiative for Cybersecurity Education

* NCWF: National Cybersecurity Workforce Framework

Optimizing IT Workforce Performance

HIGH-PERFORMANCE TRAINING & IMPLEMENTATION SOLUTIONS FROM LEARNING TREE

WINDOWS SYSTEMS

Windows Server

Windows Desktop

Microsoft Office

APPLICATION DEVELOPMENT

Web Development

Mobile App Development & Mac Programming

Java Programming

Python, Perl & C++ Programming

Software Development

Agile & Scrum

.NET/Visual Studio

Trusted Partner for 60,000+ Organisations

serving national and multinational corporations;

government agencies; Education and Non-Profits

600+ Expert Advisorsserving our global customer footprint and averaging 20+ years of diverse real-world

experience

Demonstrated Past Performance

in offering end-to-end proven capabilities to provide all facets of Workforce Optimisation resulting in improved organisational alignment

For over 40 years, Learning Tree has been a Proven Market Leader

Optimizing IT Workforce Performance

UK16

03 C

yber

Sec

LEARNINGTREE.CO.UK/CYBER 0800-282-353

NETWORK, DATA & SECURITY

Cyber Security

Big Data

Cloud Computing

SQL Server & Oracle Databases

Business Intelligence

Networking & Virtualisation

Cisco

Linux & UNIX

BUSINESS MANAGEMENT

ITIL®, COBIT ® & SFIA Certifications

Project Management

SharePoint

Business Analysis

Leadership & Professional Development