Page 1

CYBER SECURITY: High-Performance Training & Implementation Solutions

DEFEND YOUR ORGANISATION FROM CYBER THREATS by Creating Alignment Between People, Organisational Processes & Technology

PEOPLE

PROCESS/ POLICY

TECHNOLOGY

A Holistic Approach to Optimise Your Workforce

GCHQ Certified Training Courses

National Cybersecurity Workforce Framework Workshop

Learn more

Learn more

Learn more

Optimizing IT Workforce Performance


CYBER SECURITY THREATS ARE ON THE RISE 90%

58%

2,000,000

90% of all reported security incidents are the result of human error

58% of CISOs said their IT systems were definitely or probably under attack without them knowing it

Shortage of 2,000,000 trained cyber security professionals by 2017

- National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented, U.S. Government Accountability Office

- Network World

- Core Security

Optimise Your Cyber Security Workforce by Creating Alignment Between People, Processes & Technology

PEOPLE

PROCESS/POLICY

TECHNOLOGY

Having a clear, up-to-date understanding of job roles and the competent people to fulfill those roles is essential for any organisation to function effectively in a cyber security environment.

Cyber attacks are evolving and striking organisations constantly. To continuously defend your organisation from these threats, your workforce needs to establish structured processes and implement best practices.

While new technology can be easy to acquire, your organisation will still be at risk of an attack until your people have the right security skills. By providing your workforce with the right cyber security training, your technology will be implemented at full potential.

Learning Tree Leverages Industry Frameworks GCHQ Certified Training & the IISP Skills Framework

National Cybersecurity Workforce Framework (NCWF) as Defined by NICE

The UK Government Communications Headquarters (GCHQ), one of the three UK Intelligence and Security Agencies, has developed the GCHQ Certified Training Scheme (GCT) to provide high quality, relevant Cyber Security training that is consistent with industry best practice and mapped to the Industry respected IISP Skills Framework. Accredited training delivery, content and customer service is assessed and accredited by APMG-International, the accreditors for the GCT Scheme.

The NCWF as defined NICE has seven categories, each comprised of several specialty areas. Each specialty area is comprised of tasks, as well as the Knowledge, Skills and Abilities (KSAs) required to complete the tasks.

National Institute of Standards & Technology (NIST) Framework With the NIST Cybersecurity Framework, an organisation can use its current process and overlay it onto the Framework to determine gaps in its current cyber security risk approach and develop a road map to improvement.


A HOLISTIC APPROACH TO OPTIMISE YOUR WORKFORCE DEFINE

Organisational Structure, Processes & Job Roles

ENHANCE

Knowledge, Skills & Abilities (KSAs)

ASSESS/MAP Knowledge, Skills & Abilities (KSAs)

› Develop a customised

› Leveraging the

National Cybersecurity Workforce Framework (NCWF), develop an optimal cyber security organisational design, including defined roles and job descriptions

› Based on your cyber

CYBER SECURITY ACCELERATION WORKSHOPS

security needs, ensure you have the proper policies and processes well-defined, using best practices from the NIST Cybersecurity Framework

IMPLEMENT

Process & Organisational Improvements

cyber security curriculum with individual Learning Plans to meet the needs of your staff and organisation

› Align the Knowledge,

Skills, and Abilities (KSAs) of your workforce to each role of the NCWF

› Provide programme

management of the training, coaching, and mentoring of your staff

› Determine the KSAs

of your existing staff and identify skill gaps using automated skills assessments

 enefit from GCHQ B Certified Training and Learning Tree exam resulting in an independent APMGInternational GCT Certificate Award

› Rapidly increase the

process maturity of your cyber security organisation with customised Acceleration Workshops

› Embed our expert

instructors to help your staff apply newly gained skills on the job

• Leverage the NCWF to identify the optimal cyber security organisational structure and job role descriptions • Improve threat identification and analysis in the organisation’s Security Operations Center (SOC) • Establish a cyber security forensics process for the organisation • Refine the organisation’s cyber security testing and certification approach • Establish an organisation risk management approach based on the NIST Cybersecurity Framework • Invest in training that has been validated as GCHQ Certified Training.

Optimizing IT Workforce Performance


Learning Tree Cyber Security Courses are Aligned Wi as Defined by NICE* and the IISP Skills Framework

Gain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, and ma

SECURELY PROVISION

Information Assurance Compliance

Software Security Engineering

Conceptualizing, Designing, and Building Secure IT Systems

} Cyber Security: Accessibility & Quality Course 3674 • 4 Days } Vulnerability Assessment Course 589 • 4 Days

}S  ecuring Web Applications, Services & Servers Course 940 • 4 Days }P  enetration Testing: Tools & Techniques Course 537 • 4 Days }M  obile Application & Device Security Course 2781 • 3 Days

OPERATE & MAINTAIN

Customer Service & Technical Support

Data Administration

Providing Support, Administration, and Maintenance of IT Systems

PROTECT & DEFEND Identification, Analysis, and Mitigation of Threats to Internal IT Systems or Networks

INVESTIGATE Investigation of Cyber Events and/or Crimes of IT Systems, Networks, and Digital Evidence

ANALYSE Review and Evaluation of Incoming Cyber Security Information

OVERSIGHT & DEVELOPMENT Providing Leadership, Management, Direction, and/or Development of Advocacy

}S  ystem & Network Security Introduction Course 468 • 4 Days }S  ocial Engineering Deceptions & Defenses Course 2012 • 3 Days }C  ompTIA A+ Certification Exam Prep Course 445 • 5 Days

}S  QL Server Introduction Course 2107 • 4 Days } SQL Server Database Administration Course 2108 • 4 Days }R  elational Database Design, Tools & Techniques* Course 382 • 4 Days

CND Analyst

CND Infrastructure Support

}C  yber Security: Accessibility & Quality Course 3674 • 4 Days }C  ompTIA Network+ Certification Exam Prep Course 2708 • 5 Days }C  ompTIA Cybersecurity Analyst CSA+ Exam Preparation Course 2047 • 5 Days }C  ertified Ethical Hacker (CEH) Certification Exam Prep Course 2031 • 5 Days } E C-Council Certified Hacking Forensic Investigator (CHFI) Exam Preparation Course 2023 • 4 Days

}S  ystem & Network Security Introduction Course 468 • 4 Days }D  efending the Perimeter from Cyber Attacks Course 2010 • 4 Days } E ndpoint Security & Network Access Control Course 2011 • 4 Days }C  ertified Network Defender (CND) Course 2032 • 5 Days

Digital Forensics

Investigation

} Penetration Testing: Tools & Techniques Course 537 • 4 Days } Digital Forensics: Tools & Techniques Course 2055 • 5 Days

}V  ulnerability Assessment Course 589 • 4 Days

All Source Intelligence

Exploitation Analysis

} E C-Council Certified Security Analyst (ECSA) Exam Preparation Course 2024 • 5 Days } E ssentials of Activity-Based Intel. (ABI)* Course 8101 • 1 Day }A  pplying Activity-Based Intel. Methods* Course 8205 • 5 Days

}C  ompTIA Security+ Certification Exam Prep Course 446 • 5 Days }P  enetration Testing: Tools & Techniques Course 537 • 4 Days

Information Systems Security Operations

Security Program Management

} Certified Information Systems Auditor (CISA) Exam Prep Course 2040 • 4 Days } Cyber Security Risk Assessment & Management Course 2013 • 4 Days } Certified Information Systems Security Professional (CISSP) Exam Prep Course 2058 • 5 Days } (ISC)² Certified Cloud Security Professional (CCSP) Exam Prep Course 1213 • 5 Days

}C  yber Security Risk Assessment & Management for the U.S. Government Course 2051 • 4 Days }S  trategic Thinking for Operational Management Course 3310 • 3 Days } Certified Information Security Manager (CISM) Exam Prep Course 2036 • 4 Days } E C-Council Certified Chief Information Security Officer (CCISO) Exam Preparation Course 2026 • 5 Days

LEARN MORE AT: LEARNINGTREE.CO.UK/CYBER OR CALL 0800 282 353


ith the NCWF*

COMPLIMENTARY WEBINAR ON DEMAND Cyber Security: Risk Management for the C-Suite Webinar On Demand 1068 • 1 Hour

steps any more!

SEE NEXT PAGE TO LEARN MORE }

Presented by RICHARD A. SPIRES CEO, Learning Tree

Systems Development

System Requirements Planning

}S  ecuring Web Applications, Services & Servers Course 940 • 4 Days }C  yber Security: Accessibility & Quality Course 3674 • 4 Days

}S  ystem & Network Security Introduction Course 468 • 4 Days }D  isaster Recovery Planning Course 289 • 4 Days } Identity Management Course 2056 • 4 Days

Network Services

System Administration

Systems Security Analysis

} Introduction to Networking Course 450 • 4 Days } Network Configuration & Troubleshooting Course 451 • 4 Days } CompTIA Network+ Certification Exam Prep Course 2708 • 5 Days

}W  indows Server Group Policy Management* Course 963 • 4 Days

}D  efending the Perimeter from Cyber Attacks Course 2010 • 4 Days }S  ocial Engineering Deceptions & Defenses Course 2012 • 3 Days } Endpoint Security & Network Access Control Course 2011 • 4 Days

Incident Response

Vulnerability Assessment & Management

}C  ompTIA Security+ Certification Exam Prep Course 446 • 5 Days }D  igital Forensics: Tools & Techniques Course 2055 • 5 Days } EC-Council Certified Incident Handler (ECIH) Exam Preparation Course 2025 • 5 Days

Threat Analysis }S  ocial Engineering Deceptions & Defenses Course 2012 • 3 Days

= GCT CERTIFIED

}V  ulnerability Assessment Course 589 • 4 Days }P  enetration Testing: Tools & Techniques Course 537 • 4 Days }A  dvanced Threats: Targeted Attacks/Defenses Course 2054 • 4 Days

Learning Tree has developed a learning path of 5 GCT Certified Application Level Courses mapped to the IISP Skills Framework: •S  ystem and Network Security Introduction Course 468 • 4 Days •C  yber Risk Assessment and Management Course 2013 • 4 Days •D  efending the Perimeter from Cyber Attacks Course 2010 • 4 days •S  ecuring Web Applications, Services and Servers Course 940 • 4 days •P  enetration Testing: Tools and Technique Course 537 • 4 days

* These courses are exclusively available for Private Team Training delivery at your preferred location

Optimizing IT Workforce Performance


COMPLIMENTARY WEBINAR ON DEMAND Cyber Security: Risk Management for the C-Suite

Presented by

Webinar On Demand 1068 • 1 Hour Key Objectives • Provide baseline knowledge of cyber security issues with a focus on its difficulty and scope • Highlight that cyber security is a risk management problem and recognise the need for a robust risk management process

RICHARD A. SPIRES

CEO, Learning Tree Former CIO at the U.S. Department of Homeland Security and the IRS

• Explain board and c-suite responsibilities in regards to cyber security

LEARN MORE AT: LEARNINGTREE.CO.UK/CYBERCSUITE

This course helps managers view the c-suite from a different perspective, and move into the mind set of cyber security. It provided a technical overview on the evolution process of cyber security, while balancing board-level strategy with technical detail. I would recommend both managers and c-level professionals take this course.

— Anonymous, Manager working with his CISO

— R. Svec, Director of Learning and Development Veris Group, LLC

I received an overview of cyber security topics, terms, and trends at just the right level of depth for its executive audience. I left impressed by the credentials and experience of the facilitator and armed with the right questions to ask my organisation.

APPLY THE NICE FRAMEWORK IN YOUR ORGANISATION National Cybersecurity Workforce Framework Workshop Workshop Course 3941 • 1 Day In this workshop, an expert advisor is embedded in your organisation to provide a practical demonstration of how to apply the National Cybersecurity Workforce Framework and address your specific cyber security needs.

LEARN MORE AT: LEARNINGTREE.CO.UK/3941

LEARN MORE AT: LEARNINGTREE.CO.UK/CYBER OR CALL 0800 282 353 Optimizing IT Workforce Performance


HIGH-PERFORMANCE TRAINING & IMPLEMENTATION SOLUTIONS FROM LEARNING TREE DATA & SECURITY

APPLICATION DEVELOPMENT

BUSINESS MANAGEMENT

NETWORKING

Activity-Based Intelligence

.NET / Visual Studio

Business Analysis

Cisco

Big Data

Adobe

Communication Skills

Cloud Computing

Business Intelligence

Agile & Scrum

Cyber Security

Apple Programming

IBM ITIL , COBIT  & TOGAF

Oracle

Java Programming

SQL Server

Mobile App Development

Leadership & Professional Development

Python, Perl & C++

Microsoft Office

Adobe

Software Development

Project Management

Cisco

Web Development

SharePoint

IBM

APPLICATION OPERATING SYSTEMS

®

®

Networking & Virtualisation

®

BRAND

Oracle

UNIX & Linux Windows Desktop Windows Systems

UK1701 CyberSec

For over 40 years, Learning Tree has been a Proven Market Leader Trusted Partner for 60,000+ Organisations

600+ Expert Advisors

Demonstrated Past Performance

serving national and multinational corporations, government agencies, education and non-profits

serving our global customer footprint and averaging 20+ years of diverse real-world experience

in offering end-to-end proven capabilities to provide all facets of Workforce Optimisation resulting in improved organisational alignment

Optimizing IT Workforce Performance

LEARNINGTREE.CO.UK/CYBER

0800 282 353

ITIL®, PRINCE2®, MSP® and PRINCE2 Agile® are registered trade marks of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. COBIT® is a registered trademark of Information Systems Audit and Control Association® (ISACA®). IIBA® is a registered trademark owned by International Institute of Business Analysis. CBAP® and CCBA® are registered certification marks owned by International Institute of Business Analysis. PMI, PMP, CAPM, PMI-ACP, and PMI-PgMP are marks of the Project Management Institute, Inc. APMG-International Change Management and AgilePM are trademarks of The APM Group Limited, used under permission of The APM Group Limited. All rights reserved.

Defend Your Organisation From Cyber Threats UK Edition  

Align your workforce with cyber security frameworks to protect your organisation against cyber threats.

Read more
Read more
Similar to
Popular now
Just for you