Page 1

CYBER SECURITY: High-Performance Training & Implementation Solutions

DEFEND YOUR ORGANIZATION FROM CYBER THREATS by Creating Alignment Between People, Organizational Processes & Technology

PEOPLE

PROCESS/ POLICY

TECHNOLOGY

A Holistic Approach to Optimize Your Workforce

Cyber Security Courses Aligned With the NCWF

National Cybersecurity Workforce Framework Workshop

Learn more

Learn more

Learn more

Optimizing IT Workforce Performance


CYBER SECURITY THREATS ARE ON THE RISE 90%

58%

2,000,000

90% of all reported security incidents are the result of human error

58% of CISOs said their IT systems were definitely or probably under attack without them knowing it

Shortage of 2,000,000 trained cyber security professionals by 2017

- National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented, U.S. Government Accountability Office

- Network World

- Core Security

Optimize Your Cyber Security Workforce by Creating Alignment Between People, Processes & Technology

PEOPLE

PROCESS/POLICY

TECHNOLOGY

Having a clear, up-to-date understanding of job roles and the competent people to fulfill those roles is essential for any organization to function effectively in a cyber security environment.

Cyber attacks are evolving and striking organizations constantly. To continuously defend your organization from these threats, your workforce needs to establish structured processes and implement best practices.

While new technology can be easy to acquire, your organization will still be at risk of an attack until your people have the right security skills. By providing your workforce with the right cyber security training, your technology will be implemented at full potential.

Learning Tree Leverages Two Industry Frameworks to Address the People & the Process/Policy National Cybersecurity Workforce Framework (NCWF) as Defined by NICE

National Institute of Standards & Technology (NIST) Framework

The NCWF as defined NICE has seven categories, each comprised of several specialty areas. Each specialty area is comprised of tasks, as well as the Knowledge, Skills, and Abilities (KSAs) required to complete the tasks.

With the NIST Cybersecurity Framework, an organization can overlay the Framework across current processes to determine gaps in its current cyber security risk approach and develop a road map to improvement.


A HOLISTIC APPROACH TO OPTIMIZE YOUR WORKFORCE

DEFINE

Organizational Structure, Processes & Job Roles

ENHANCE

Knowledge, Skills & Abilities (KSAs)

ASSESS/MAP Knowledge, Skills & Abilities (KSAs)

› Leveraging the

National Cybersecurity Workforce Framework (NCWF), develop an optimal cyber security organizational design, including defined roles and job descriptions

› Based on your cyber

CYBER SECURITY ACCELERATION WORKSHOPS

security needs, ensure you have the proper policies and processes well-defined, using best practices from the NIST Cybersecurity Framework

IMPLEMENT

Process & Organizational Improvements

› Develop a customized

cyber security curriculum with individual learning plans to meet the needs of your staff and organization

› Align the Knowledge,

Skills, and Abilities (KSAs) of your workforce to each role of the NCWF

› Determine the KSAs

› Provide program

of your existing staff and identify skill gaps using automated skills assessments

management of the training, coaching, and mentoring of your staff

› Rapidly increase the

process maturity of your cyber security organization with customized Acceleration Workshops

› Embed our expert

instructors to help your staff apply newly gained skills on the job

• Leverage the NCWF to identify the optimal cyber security organizational structure and job role descriptions • Improve threat identification and analysis in the organization’s Security Operations Centre (SOC) • Establish a cyber security forensics process for the organization • Refine the organization’s cyber security testing and certification approach • Establish an organization risk management approach based on the NIST Cybersecurity Framework

Optimizing IT Workforce Performance


Learning Tree Cyber Security Courses are Aligned With the NCWF as Defined by NICE

Using defined learning paths, gain the right skills to protect and defend your organization toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, CCSP, a

SECURELY PROVISION

Information Assurance Compliance

Software Security Engineering

Conceptualizing, Designing, and Building Secure IT Systems

} Cyber Security: Accessibility & Quality Course 3674 • 4 Days } Vulnerability Assessment Course 589 • 4 Days

}S  ecuring Web Applications, Services & Servers Course 940 • 4 Days }P  enetration Testing: Tools & Techniques Course 537 • 4 Days }M  obile Application & Device Security Course 2781 • 3 Days

OPERATE & MAINTAIN

Customer Service & Technical Support

Data Administration

Providing Support, Administration, and Maintenance of IT Systems

PROTECT & DEFEND Identification, Analysis, and Mitigation of Threats to Internal IT Systems or Networks

INVESTIGATE Investigation of Cyber Events and/or Crimes of IT Systems, Networks, and Digital Evidence

ANALYZE Review and Evaluation of Incoming Cyber Security Information

OVERSIGHT & DEVELOPMENT Providing Leadership, Management, Direction, and/or Development of Advocacy

}S  ystem & Network Security Introduction Course 468 • 4 Days }S  ocial Engineering Deceptions & Defenses Course 2012 • 3 Days }C  ompTIA A+ Certification Exam Prep Course 445 • 5 Days

}S  QL Server Introduction Course 2107 • 4 Days } SQL Server Database Administration Course 2108 • 4 Days }R  elational Database Design, Tools & Techniques* Course 382 • 4 Days

CND Analyst

CND Infrastructure Support

}C  yber Security: Accessibility & Quality Course 3674 • 4 Days }C  ompTIA Network+ Certification Exam Prep Course 2708 • 5 Days }C  ompTIA Cybersecurity Analyst CSA+ Exam Preparation Course 2047 • 5 Days }C  ertified Ethical Hacker (CEH) Certification Exam Prep Course 2031 • 5 Days } E C-Council Certified Hacking Forensic Investigator (CHFI) Exam Preparation Course 2023 • 4 Days

}S  ystem & Network Security Introduction Course 468 • 4 Days }D  efending the Perimeter from Cyber Attacks Course 2010 • 4 Days } E ndpoint Security & Network Access Control Course 2011 • 4 Days }C  ertified Network Defender (CND) Course 2032 • 5 Days

Digital Forensics

Investigation

}P  enetration Testing: Tools & Techniques Course 537 • 4 Days } Digital Forensics: Tools & Techniques Course 2055 • 5 Days

}V  ulnerability Assessment Course 589 • 4 Days

All Source Intelligence

Exploitation Analysis

} E C-Council Certified Security Analyst (ECSA) Exam Preparation Course 2024 • 5 Days } E ssentials of Activity-Based Intel. (ABI)* Course 8101 • 1 Day }A  pplying Activity-Based Intel. Methods* Course 8205 • 5 Days

}C  ompTIA Security+ Certification Exam Prep Course 446 • 5 Days }P  enetration Testing: Tools & Techniques Course 537 • 4 Days

Information Systems Security Operations

Security Program Management

}C  ertified Information Systems Auditor (CISA) Exam Prep Course 2040 • 4 Days } Cyber Security Risk Assessment & Management Course 2013 • 4 Days }C  ertified Information Systems Security Professional (CISSP) Exam Prep Course 2058 • 5 Days } (ISC)² Certified Cloud Security Professional (CCSP) Exam Prep Course 1213 • 5 Days

}C  yber Security Risk Assessment & Management for the U.S. Government Course 2051 • 4 Days }S  trategic Thinking for Operational Management Course 3310 • 3 Days } Certified Information Security Manager (CISM) Exam Prep Course 2036 • 4 Days } E C-Council Certified Chief Information Security Officer (CCISO) Exam Preparation Course 2026 • 5 Days

LEARN MORE AT: LEARNINGTREE.CA/CYBER OR CALL 1-800-843-8733


COMPLIMENTARY WEBINAR ON DEMAND Cyber Security: Risk Management for the C-Suite

n. Plus, take steps and many more!

Webinar On Demand 1068 • 1 Hour

Presented by RICHARD A. SPIRES CEO, Learning Tree

SEE NEXT PAGE TO LEARN MORE }

Systems Development

System Requirements Planning

}S  ecuring Web Applications, Services & Servers Course 940 • 4 Days }C  yber Security: Accessibility & Quality Course 3674 • 4 Days

}S  ystem & Network Security Introduction Course 468 • 4 Days }D  isaster Recovery Planning Course 289 • 4 Days } Identity Management Course 2056 • 4 Days

Network Services

System Administration

Systems Security Analysis

} Introduction to Networking Course 450 • 4 Days } Network Configuration & Troubleshooting Course 451 • 4 Days } CompTIA Network+ Certification Exam Prep Course 2708 • 5 Days

}W  indows Server Group Policy Management* Course 963 • 4 Days

}D  efending the Perimeter from Cyber Attacks Course 2010 • 4 Days }S  ocial Engineering Deceptions & Defenses Course 2012 • 3 Days } Endpoint Security & Network Access Control Course 2011 • 4 Days

Incident Response

Vulnerability Assessment & Management

}C  ompTIA Security+ Certification Exam Prep Course 446 • 5 Days }D  igital Forensics: Tools & Techniques Course 2055 • 5 Days } EC-Council Certified Incident Handler (ECIH) Exam Preparation Course 2025 • 5 Days

}V  ulnerability Assessment Course 589 • 4 Days }P  enetration Testing: Tools & Techniques Course 537 • 4 Days }A  dvanced Threats: Targeted Attacks/Defenses Course 2054 • 4 Days

How Learning Tree Cyber Security Courses Align With the NCWF as defined by NICE Threat Analysis }S  ocial Engineering Deceptions & Defenses Course 2012 • 3 Days

As an example, the courses listed below provide knowledge and skills vital for workers who must perform the tasks associated with “Computer Network Defence Infrastructure Support”.

CND Infrastructure Support Training that Fulfills Required KSAs 1. System and Network Security Introduction Course 468 • 4 Days 2. D  efending the Perimeter from Cyber Attacks Course 2010 • 4 Days 3. E ndpoint Security & Network Access Control Course 2011 • 4 Days

Computer Network Defence (CND) Infrastructure Support KSAs Required for Job Roles Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defence service provider network and resources. Monitors network to actively remediate unauthorized activities.

* These courses are exclusively available for Private Team Training delivery at your preferred location

Optimizing IT Workforce Performance


COMPLIMENTARY WEBINAR ON DEMAND Cyber Security: Risk Management for the C-Suite

Presented by

Webinar On Demand 1068 • 1 Hour Key Objectives • Provide baseline knowledge of cyber security issues with a focus on its difficulty and scope • Highlight that cyber security is a risk management problem and recognize the need for a robust risk management process

RICHARD A. SPIRES

CEO, Learning Tree Former CIO at the U.S. Department of Homeland Security and the IRS

• Explain board and c-suite responsibilities in regards to cyber security

LEARN MORE AT: LEARNINGTREE.CA/CYBERCSUITE

This course helps managers view the c-suite from a different perspective, and move into the mind set of cyber security. It provided a technical overview on the evolution process of cyber security, while balancing board-level strategy with technical detail. I would recommend both managers and c-level professionals take this course.

— Anonymous, Manager working with his CISO

— R. Svec, Director of Learning and Development Veris Group, LLC

“ “

I received an overview of cyber security topics, terms, and trends at just the right level of depth for its executive audience. I left impressed by the credentials and experience of the facilitator and armed with the right questions to ask my organization.

APPLY THE NICE FRAMEWORK IN YOUR ORGANIZATION National Cybersecurity Workforce Framework Workshop Workshop Course 3941 • 1 Day In this workshop, an expert advisor is embedded in your organization to provide a practical demonstration of how to apply the National Cybersecurity Workforce Framework and address your specific cyber security needs.

LEARN MORE AT: LEARNINGTREE.CA/3941

LEARN MORE AT: LEARNINGTREE.CA/CYBER OR CALL 1-800-843-8733 Optimizing IT Workforce Performance


HIGH-PERFORMANCE TRAINING & IMPLEMENTATION SOLUTIONS FROM LEARNING TREE DATA & SECURITY

APPLICATION DEVELOPMENT

BUSINESS MANAGEMENT

NETWORKING

Activity-Based Intelligence

.NET / Visual Studio

Business Analysis

Cisco

Big Data

Adobe

Communication Skills

Cloud Computing

Business Intelligence

Agile & Scrum

Cyber Security

Apple Programming

IBM ITIL , COBIT  & TOGAF

Oracle

Java Programming

SQL Server

Mobile App Development

Leadership & Professional Development

Python, Perl & C++

Microsoft Office

Adobe

Software Development

Project Management

Cisco

Web Development

SharePoint

IBM

APPLICATION OPERATING SYSTEMS

®

®

Networking & Virtualization

®

BRAND

Oracle

UNIX & Linux Windows Desktop Windows Systems

CA1701 CyberSec

For over 40 years, Learning Tree has been a Proven Market Leader Trusted Partner for 60,000+ Organizations

600+ Expert Advisors

Demonstrated Past Performance

serving national and multinational corporations, government agencies, education and non-profits

serving our global customer footprint and averaging 20+ years of diverse real-world experience

in offering end-to-end proven capabilities to provide all facets of Workforce Optimization resulting in improved organizational alignment

Optimizing IT Workforce Performance

LEARNINGTREE.CA

1-800-THE-TREE (843-8733)

ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. COBIT ® is a registered trademark of Information Systems Audit and Control Association ® (ISACA ®).

Defend Your Organization From Cyber Threats CA Edition  

Align your workforce with cyber security frameworks to protect your organization against cyber threats.

Read more
Read more
Similar to
Popular now
Just for you