Beruflich Dokumente
Kultur Dokumente
Cyber threats are a serious economic and financial challenge facing the US today.
The best investment you can make to protect your critical data and information
Technology is rapidly changing and becoming more sophisticated, yet every day
right people with the right skills to tackle the ever-changing threat landscape is
These breaches result in access to and loss of vital information causing negative
publicity, a lack of trust, a drop in consumer confidence, and lost market share.
To get there, train with Global Knowledge. Let us help you prepare your cyber
workforce to respond to the latest threats and attacks.
cyber workforce. Educating and training your workforce to become cyber warriors
means giving them the expertise they need to hunt for and continuously monitor
networks for intrusions, think like cyber criminals, and reverse-engineer an attack.
According to Jim Gosler, NSA Visiting Scientist and founding director of CIAs
Clandestine Information Technology Office, only about 1,000 security specialists
in the United States have the specialized skills needed to operate effectively in
cyberspace; however, the United States needs about 10,000 to 30,000 such
individuals. What will it take to turn your team into cyber warriors?
CST-001
1-800-COURSES www.globalknowledge.com
Classify
Assess
Plan
Train
Validate
Evolve
Identify
Train
We can help you identify the roles, functions, and competencies your cyber work-
With your plan in place, we will progress to the critical training phase, building
force must possess to effectively carry out your organizations mission of complete
and maintaining the knowledge and skills of your cyber workforce. Our flexible and
and ongoing protection, while ensuring the confidentiality, integrity, and availability
scalable training approach ensures our training solution fits your unique needs.
of your critical data. We will accomplish this step through a number of methods,
Our premium content and expert instruction are delivered through our classrooms,
including job task analysis; reviewing standard operating procedures, policies, and
at your company, on the Internet, and on CD. Choose the right delivery method,
guidelines for mandating or supporting the importance of security at all levels; and
which may include a tailored, blended learning solution, that best meets your needs.
Our hands-on labs allow you to practice and learn in real-world scenarios without
putting your network at risk.
Classify
Once weve identified the associated roles, functions, and competencies, we can
Validate
We will work with your team to develop the appropriate validation solution:
one that best meets the needs of your workforce and supports your mission. Our
Assess
After identifying and classifying your cyber workforce, we can help you assess each
members expertise. Doing so provides an organizational view of your workforce
Evolve
As job roles, technologies, and training requirements change, we can help you
identify potential areas of security risk within the organization based on the current
workforce skills and job functions. We will identify each employees skills,
knowledge, and experience, and then we will identify individual skills gaps and
areas of focus needed to develop a comprehensive training plan that fits your
organizations needs. Based on years of training expertise, we will gain a full
understanding of the functions and roles within your organization and provide
assessments to profile your cybersecurity workforce against the competencies
required to fulfill their mission.
Using our cybersecurity learning framework, we can help ensure that you have
the right people with the right skills to protect your critical data and information
infrastructure today and beyond. Couple this framework with our comprehensive
portfolio of cybersecurity courses, and youll have the perfect combination for a
secure future.
Plan
Once we have identified the individual skills gaps, we will work with you to develop
a training plan that begins by closing them and evolves into a continuous training
program in which your cyber workforce will follow learning tracks against specific
competencies or roles.
2
1-800-COURSES www.globalknowledge.com
How Mastering These Disciplines Will Help You Protect and Defend
Whether you need general cyber security awareness, secure network design and implementation, continuous monitoring, network forensics and analysis, or smart and effective incident response training, we will prepare you to battle the latest cyber threats and attacks. Our cybersecurity training portfolio focuses on six major disciplines to help you strengthen
your workforce and defense capabilities and make your systems more resistant to malicious activity. This portfolio was developed as a result of listening to and understanding your
needs and strategic goals, and it aligns with government and industry-issued standards and guidelines. The disciplines include:
Security Disciplines
how they are tracked and managed: How are they secured? Who has access to
them? Are they tracked and managed? Do you have processes and procedures in
place to respond and recover from a security breach quickly?
Threat Management Whats coming at you?
Assess your vulnerabilities, threats, and risks. Work to mitigate this risk, and use
auditing and analysis to confirm your efforts. Humans can be your weakest link.
Ensure they have received adequate training to stay one step ahead of the attack.
Access Control Who gets in?
Control who has access by locking down your systems, including hosts, networks,
Asset Protection
Threat Management
Access Control
Incident Management
Configuration Management How do you manage the lifecycle?
Continuously managing changes to the IT landscape of your organization requires
due diligence to ensure your systems are optimally organized and interconnected.
Contingency Planning - How do you plan for failures?
Configuration Management
Contingency Planning
Ensure your organization has planned for continuity after an attack. Failures happen;
how best do you respond?
We have taken one step further within our portfolio to focus not only on disciplines,
but also on competencies within those disciplines.
1-800-COURSES www.globalknowledge.com
Cybersecurity Portfolio
Competencies
Disciplines
Security Awareness
Asset
Protection
Threat
Management
Access
Control
Incident
Management
Configuration
Management
Contingency
Planning
Cloud
Communications Security
Identity Management
Cryptography
Continuous Monitoring/SIEM
Business Alignment
Communication Plan
Information Assurance
Social Engineering
IDS/IPS/IDP
Forensics
Change Management
Threat Assessment
Hacking/Cyber Warfare
Operations Planning
Secure Coding
Vulnerability Assessment
Penetration Testing
Incident Response
Security Testing
Remote Access
Reverse Engineering
Virtualization
Conclusion
The constantly evolving cybersecurity landscape requires heavily armed IT security professionals whose skills are also constantly evolving. With our premium content, expert
instruction, flexible and scalable training approach, and comprehensive security curriculum, youll develop a team of cyber warriors who are prepared for battle.
Learn More
www.globalknowledge.com/security
1-800-COURSES