Cyber Security Workforce Solutions
-
Upload
chris-brady -
Category
Documents
-
view
115 -
download
3
Transcript of Cyber Security Workforce Solutions
DEFEND YOUR ORGANIZATION FROM CYBER THREATSby Creating Alignment Between People, Organizational Processes & Technology
CYBER SECURITY: High-Performance Training & Implementation Solutions
PROCESS/POLICY
PEOPLE TECHNOLOGY
Optimizing IT Workforce Performance
THE THREAT OF CYBER SECURITY IS RISING
90%90% of all reported security incidents are the result of
human error
58%58% of CISOs said their
IT systems were definitely or probably under attack without them knowing it
2,000,000Shortage of 2,000,000 trained cyber security professionals by 2017
Optimize Your Cyber Security Workforce by Creating Alignment Between People, Processes & Technology
Learning Tree Leverages Two Industry Frameworks to Address the People and the Process/Policy
National Institute of Standards & Technology (NIST) Framework
With the NIST Cybersecurity Framework, an organization can use its current process and overlay it onto the Framework to determine gaps in its current cyber security risk approach and develop a road map to improvement.
National Cybersecurity Workforce Framework (NCWF) as Defined by NICE
The NCWF as defined NICE has seven categories, each comprised of several specialty areas. Each specialty area is comprised of tasks, as well as the Knowledge, Skills and Abilities (KSAs) required to complete the tasks.
- National Strategy, Roles, and Responsibilities Need to Be Better Defined
and More Effectively Implemented, U.S. Government Accountability Office
- Core Security
- Network World
PEOPLEHaving a clear, up-to-date
understanding of job roles and the competent people to fulfill those
roles is essential for any organization to function effectively in a cyber
security environment.
PROCESS/POLICYCyber attacks are evolving and
striking organizations constantly. To continuously defend your
organization from these threats, your workforce needs to establish
structured processes and implement best practices.
TECHNOLOGYWhile new technology can be easy to acquire, your organization will
still be at risk of an attack until your people have the right security skills.
By providing your workforce with the right cyber security training, your technology will be implemented at
full potential.
A HOLISTIC APPROACH TO OPTIMIZE YOUR WORKFORCE
IMPLEMENTProcess & Organizational
Improvements
ENHANCEKnowledge, Skills &
Abilities (KSAs)ASSESS/MAPKnowledge, Skills &
Abilities (KSAs)
DEFINEOrganizational Structure, Processes & Job Roles
› Leveraging the National Cybersecurity Workforce Framework (NCWF), develop an optimal cyber security organizational design, including defined roles and job descriptions
› Based on your cyber security needs, ensure you have the proper policies and processes well-defined, using best practices from the NIST Cybersecurity Framework
› Align the Knowledge, Skills and Abilities (KSAs) of your workforce to each role of the NCWF
› Determine the KSAs of your existing staff and identify skill gaps using automated skills assessments
› Develop a Customized Cyber Security Curriculum with individual Learning Plans to meet the needs of your staff and organization
› Provide program management of the training, coaching, and mentoring of your staff
› Rapidly increase the process maturity of your cyber security organization with customized Acceleration Workshops
› Embed our expert instructors to help your staff apply newly gained skills on the job.
CYBE
R SE
CURI
TYAC
CELE
RATI
ON W
ORKS
HOPS • Leverage the NCWF to identify the optimal cyber security
organizational structure and job role descriptions
• Improve threat identification and analysis in the organization’s SOC
• Establish a cyber security forensics process for the organization
• Refine the organization’s cyber security testing and certification approach
• Establish an organization risk management approach based on the NIST Cybersecurity Framework
Optimizing IT Workforce Performance
Learning Tree Cyber Security Courses are Aligned with the NCWF* as Defined by NICE*Gain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTia Security+, CISSP, CISA, CISM, and many more!
SECURELY PROVISIONConceptualizing, Designing and Building Secure IT Systems
Information Assurance Compliance1. Cyber Security: Accessibility & Quality2. Vulnerability Assessment 3. Advanced Security Auditing - Coming Soon
Software Security Engineering1. Securing Web Applications, Services and Servers2. Penetration Testing: Tools & Techniques3. Mobile Application & Device Security
OPERATE & MAINTAINProviding Support, Administration and Maintenance of IT Systems
Customer Service and Technical Support1. System & Network Security Introduction2. Social Engineering Deceptions & Defenses 3. CompTIA A+ Certification Exam Prep
Data Administration1. SQL Server Introduction2. SQL Server Database Administration3. Relational Database Design, Tools & Techniques
PROTECT & DEFENDIdentification, Analysis and Mitigation of Threats to Internal IT Systems or Networks
CND Analyst1. Cyber Security: Accessibility & Quality2. Continuous Diagnostic & Management/SIEM3. CompTIA Network+ Certification Exam Prep
CND Infrastructure Support1. System & Network Security Introduction2. Defending the Perimeter from Cyber Attacks 3. Endpoint Security & Network Access Control
INVESTIGATEInvestigation of Cyber Events and/or Crimes of IT Systems, Networks and Digital Evidence
Digital Forensics1. Penetration Testing: Tools & Techniques2. Digital Forensics: Windows Systems & Mobile 3. Adv. Investigations & Malware Analysis - Coming Soon
Investigation1. Vulnerability Assessment 2. Incident Response - Coming Soon 3. Advanced Investigations & Malware Analysis - Coming Soon
ANALYZEReview and Evaluation of Incoming Cyber Security Information
All Source Intelligence1. Essentials of Activity-Based Intel. (ABI)2. Applying Activity-Based Intel. Methods 3. Activity-Based Intelligence Analysis
Exploitation Analysis1. CompTIA Security+ Certification Exam Prep2. Penetration Testing: Tools & Techniques3. Exploitation Analysis - Coming Soon
OVERSIGHT & DEVELOPMENTProviding Leadership, Management, Direction and/or Development of Advocacy
Information Systems Security Operations1. Cyber Security Risk Assessment & Management2. Preparing for the CISA Exam - Coming Soon3. Preparing for the CISSP Exam
Security Program Management1. Cyber Security Risk Assessment & Management2. Strategic Thinking for Operational Management3. Preparing for the CISM Exam - Coming Soon
LEARN MORE AT: LEARNINGTREE.COM/CYBER OR CALL 1-800-843-8733
Learning Tree Cyber Security Courses are Aligned with the NCWF* as Defined by NICE*Gain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTia Security+, CISSP, CISA, CISM, and many more!
Systems Development1. Securing Web Applications, Services and Servers2. Cyber Security: Accessibility & Quality3. Cyber Security: Secure System Dev. - Coming Soon
System Requirements Planning1. System & Network Security Introduction2. Disaster Recovery Planning3. Identity Management
Network Services1. Introduction to Networking2. Network Configuration & Troubleshooting3. CompTIA Network+ Certification Exam Prep
System Administration1. Windows Server 2012 Administration2. Windows Server Group Policy Management3. Windows Server Active Directory Domain Svc.
Systems Security Analysis1. Defending the Perimeter from Cyber Attacks2. Social Engineering Deceptions & Defenses3. Endpoint Security & Network Access Control
Incident Response1. CompTIA Security+ Certification Exam Prep2. Digital Forensics: Windows Systems & Mobile3. Detecting Breaches & DDoS - Coming Soon
Vulnerability Assessment and Management1. Vulnerability Assessment 2. Penetration Testing: Tools & Techniques3. Advanced Threats: Targeted Attacks/Defenses
Threat Analysis1. Continuous Diagnostic & Management/SIEM2. Social Engineering Deceptions & Defenses3. Malware Analysis / Reverse Engineer - Coming Soon
How Learning Tree Cyber Security Courses Align with the NCWF as defined by NICEThe courses listed provide knowledge and skills vital for workers who must perform the tasks associated with “Computer Network Defense Infrastructure Support”.
SEE EXAMPLE BELOW:
CND Infrastructure SupportTraining that Fulfills Required KSAs*1. System and Network Security Introduction2. Defending the Perimeter from Cyber Attacks 3. Endpoint Security & Network Access Control
Computer Network Defense (CND) Infrastructure SupportKSAs* Required for Job Roles
Tests, implements, deploys, maintains, reviews and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.
* KSA: Knowledge, Skills, Abilities
* NICE: National Initiative for Cybersecurity Education
* NCWF: National Cybersecurity Workforce Framework
Optimizing IT Workforce Performance
HIGH-PERFORMANCE TRAINING & IMPLEMENTATION SOLUTIONS FROM LEARNING TREE
LEARNINGTREE.COM/CYBER 1-800-THE-TREE (843-8733)
NETWORK, DATA & SECURITY
Cyber Security
Networking & Virtualization
SQL Server & Oracle Databases
Cloud Computing
Big Data/Activity-Based Intelligence
Linux & UNIX
Cisco
WINDOWS SYSTEMS
Windows Desktop
Windows Server
Microsoft Unified Communications
Microsoft Office
APPLICATION DEVELOPMENT
Web Development
Mobile App Development & Mac Programming
Java Programming
Perl, Python & C++ Programming
Software Development
Agile & Scrum
.NET/Visual Studio
BUSINESS MANAGEMENT
Project Management
ITIL®, COBIT ® & SFIA Certifications
Business Analysis
SharePoint
Leadership & Professional Development
Trusted Partner for 60,000+ Organizations
serving national and multinational corporations;
government agencies; Education and Non-Profits
600+ Expert Advisorsserving our global customer footprint and averaging 20+ years of diverse real-world
experience
Demonstrated Past Performance
in offering end-to-end proven capabilities to provide all facets of Workforce Optimization resulting in improved organizational alignment
For over 40 years, Learning Tree has been a Proven Market Leader
Optimizing IT Workforce Performance
US16
03 C
yber
Sec_
A