Sie sind auf Seite 1von 4

Global Knowledge Cybersecurity Training

Your Solution for a Skilled Cyber Workforce


Securing Cyberspace: Are You Ready?

Building Skills and Knowledge for a Secure Cyberspace

Cyber threats are a serious economic and financial challenge facing the US today.

The best investment you can make to protect your critical data and information

Technology is rapidly changing and becoming more sophisticated, yet every day

systems is to build a skilled and knowledgeable cyber workforce. Having the

brings new reports of high-profile organizations suffering significant data breaches.

right people with the right skills to tackle the ever-changing threat landscape is

These breaches result in access to and loss of vital information causing negative

paramount. Keeping your workforce exceptionally skilled is crucial to safeguarding

publicity, a lack of trust, a drop in consumer confidence, and lost market share.

your information and information systems, and it requires continual training.

Businesses and government organizations will lose an average


of $5.9 million to cybercrime in 201156% more than in
2010according to a recent study by Ponemon Institute.

To get there, train with Global Knowledge. Let us help you prepare your cyber
workforce to respond to the latest threats and attacks.

A Training Solution to Keep Your Cyber Workforce Ready


Learning framework for developing an effective learning program

The bridge from technology to a secure cyberspace is a skilled and well-equipped

Comprehensive portfolio of courses delivered by real-world security practitioners

cyber workforce. Educating and training your workforce to become cyber warriors

Security competencies that align to industry-issued standards and guidelines

means giving them the expertise they need to hunt for and continuously monitor
networks for intrusions, think like cyber criminals, and reverse-engineer an attack.
According to Jim Gosler, NSA Visiting Scientist and founding director of CIAs
Clandestine Information Technology Office, only about 1,000 security specialists
in the United States have the specialized skills needed to operate effectively in
cyberspace; however, the United States needs about 10,000 to 30,000 such
individuals. What will it take to turn your team into cyber warriors?

CST-001

1-800-COURSES www.globalknowledge.com

2011 Global Knowledge Training LLC. All rights reserved.

A Flexible and Scalable Training Approach


Our flexible cybersecurity learning framework is a component-based, phased training system. It enables us to effectively identify, classify, and assess the needs of your organization
and the competencies of your cyber workforce; develop a plan for skills building, maintenance, and evolution; and provide the training and skills validation your cyber workforce
needs for long-term success. We can help you invoke one, a few, or all components of the framework.
Where ever your team is in the process, we use the latest learning and development tools, career tracks, and learning plans to achieve your workforce development goals and
objectives, helping to on-board and advance cyber workers through their careers.

Global Knowledge Cybersecurity Learning Framework


Identify

Classify

Assess

Plan

Train

Validate

Evolve

Identify

Train

We can help you identify the roles, functions, and competencies your cyber work-

With your plan in place, we will progress to the critical training phase, building

force must possess to effectively carry out your organizations mission of complete

and maintaining the knowledge and skills of your cyber workforce. Our flexible and

and ongoing protection, while ensuring the confidentiality, integrity, and availability

scalable training approach ensures our training solution fits your unique needs.

of your critical data. We will accomplish this step through a number of methods,

Our premium content and expert instruction are delivered through our classrooms,

including job task analysis; reviewing standard operating procedures, policies, and

at your company, on the Internet, and on CD. Choose the right delivery method,

guidelines for mandating or supporting the importance of security at all levels; and

which may include a tailored, blended learning solution, that best meets your needs.

developing an organizational competency model.

Our hands-on labs allow you to practice and learn in real-world scenarios without
putting your network at risk.

Classify
Once weve identified the associated roles, functions, and competencies, we can

Validate

help you classify them based on level of responsibility or authority as it relates to

We will work with your team to develop the appropriate validation solution:

information systems or the computing environment in which an individual operates.

one that best meets the needs of your workforce and supports your mission. Our

These position levels are also called bands.

framework encompasses a blended approach covering product/vendor certifications,


industry-neutral security certifications, skills-based emulation/simulations, and

Assess

in-class and virtual lab scenario-based skills verification.

After identifying and classifying your cyber workforce, we can help you assess each
members expertise. Doing so provides an organizational view of your workforce

Evolve

that allows us to determine overarching gaps in education or knowledge and to

As job roles, technologies, and training requirements change, we can help you

identify potential areas of security risk within the organization based on the current

continuously evolve your training program to ensure a world-class security team

workforce skills and job functions. We will identify each employees skills,

into the future.

knowledge, and experience, and then we will identify individual skills gaps and
areas of focus needed to develop a comprehensive training plan that fits your
organizations needs. Based on years of training expertise, we will gain a full
understanding of the functions and roles within your organization and provide
assessments to profile your cybersecurity workforce against the competencies
required to fulfill their mission.

Using our cybersecurity learning framework, we can help ensure that you have
the right people with the right skills to protect your critical data and information
infrastructure today and beyond. Couple this framework with our comprehensive
portfolio of cybersecurity courses, and youll have the perfect combination for a
secure future.

Plan
Once we have identified the individual skills gaps, we will work with you to develop
a training plan that begins by closing them and evolves into a continuous training
program in which your cyber workforce will follow learning tracks against specific
competencies or roles.

2

1-800-COURSES www.globalknowledge.com

Our Comprehensive Cybersecurity Portfolio


Our comprehensive portfolio of security courses includes key partnerships with industry-leading organizations to ensure that you receive the strongest curriculum, featuring
cutting-edge technologies and best practices.

How Mastering These Disciplines Will Help You Protect and Defend
Whether you need general cyber security awareness, secure network design and implementation, continuous monitoring, network forensics and analysis, or smart and effective incident response training, we will prepare you to battle the latest cyber threats and attacks. Our cybersecurity training portfolio focuses on six major disciplines to help you strengthen
your workforce and defense capabilities and make your systems more resistant to malicious activity. This portfolio was developed as a result of listening to and understanding your
needs and strategic goals, and it aligns with government and industry-issued standards and guidelines. The disciplines include:

Asset Protection What do you have?


In order to protect your assets, you must first know where they are and understand

Security Disciplines

how they are tracked and managed: How are they secured? Who has access to
them? Are they tracked and managed? Do you have processes and procedures in
place to respond and recover from a security breach quickly?
Threat Management Whats coming at you?
Assess your vulnerabilities, threats, and risks. Work to mitigate this risk, and use
auditing and analysis to confirm your efforts. Humans can be your weakest link.
Ensure they have received adequate training to stay one step ahead of the attack.
Access Control Who gets in?
Control who has access by locking down your systems, including hosts, networks,

Asset Protection

applications, and data flows.


Incident Management How do you handle failures?
Perform continuous monitoring with event management tools and maximize
your ability to provide an immediate response. Use strong policies that are well

Threat Management
Access Control

communicated for a consistent and uniform reaction.

Incident Management
Configuration Management How do you manage the lifecycle?
Continuously managing changes to the IT landscape of your organization requires
due diligence to ensure your systems are optimally organized and interconnected.
Contingency Planning - How do you plan for failures?

Configuration Management
Contingency Planning

Ensure your organization has planned for continuity after an attack. Failures happen;
how best do you respond?
We have taken one step further within our portfolio to focus not only on disciplines,
but also on competencies within those disciplines.

1-800-COURSES www.globalknowledge.com

Global Knowledge Cybersecurity Competency Training


Each company, department, and federal agency has a similar but slightly different approach to security. Our competency mapping is based on the commonality of a number of
government- and industry-issued standards and guidelines, including:
NIST 800-53, 800-37, 800-16
FIPS 200 (EBK)
CISSP Common Body of Knowledge (ANSI ISO/IEC Standard 17024:2003)
These guidelines have driven a logically organized and expanded map to all competencies, and they drive each commercial company, agency, or department to align their standards
and processes for compliancy requirements.

Cybersecurity Portfolio

Competencies

Disciplines

Security Awareness
Asset
Protection

Threat
Management

Access
Control

Incident
Management

Configuration
Management

Contingency
Planning

Cloud

Audit and Analysis

Communications Security

Audit and Log Analysis

Architecture and Design

Business Impact Analysis

Identity Management

Risk Assessment and Mitigation

Cryptography

Continuous Monitoring/SIEM

Business Alignment

Communication Plan

Information Assurance

Social Engineering

IDS/IPS/IDP

Forensics

Change Management

Continuity of Operations Plan

Public Key Infrastructure

Threat Assessment

Logging and Monitoring

Hacking/Cyber Warfare

Operations Planning

Disaster Recovery Plan

Secure Coding

Vulnerability Assessment

Penetration Testing

Incident Response

Security Testing

Remote Access

Reverse Engineering

Virtualization

Certification and Accreditation

Conclusion
The constantly evolving cybersecurity landscape requires heavily armed IT security professionals whose skills are also constantly evolving. With our premium content, expert
instruction, flexible and scalable training approach, and comprehensive security curriculum, youll develop a team of cyber warriors who are prepared for battle.

Learn More
www.globalknowledge.com/security
1-800-COURSES

Das könnte Ihnen auch gefallen