Can you find great candidates? 2018 Scholarship program for Cyber Master Training

We are starting a new program this year. Can you recommend great candidates?

Expanding Security Cyber Master Training

Scholarship program 2018

Everyone deserves an opportunity to become a cybersecurity master. We drove three major scholarship initiatives in the past 18 years. We bring that experience to bear on financial obstacles for early-in-career professionals. Expanding Security will offer approximately 20 scholarships in 2018. This represents up to $250,000 in scholarship opportunities. We need your help in finding suitable candidates. We expect 200-400 applicants.

We focus on cybersecurity practices, principles and real-world business application in Cyber Master Training. Each graduate will have the knowledge, skills, and abilities of a person with a Masters in cybersecurity. Each graduate will be able to perform the cybersecurity tasks of most organizations.

Tuition scholarships:

The full tuition for this program is $15,000. We are offering $10,000 tuition scholarships and $14,500 tuition scholarships to candidates. The requirement of all candidates is to commit to the program by paying for their own exams. Everyone involved must have something at stake.

Sponsorship:

Any student who has previously taken cybersecurity training with Dean Bushmiller in the last 8 years may sponsor a candidate. Sponsor may submit multiple candidates. Sponsor must vouch for each candidate. Sponsor are not required to work in the same company as the candidates.

While the candidate is in the program, sponsors must commit 15 minutes per month with instructor reviewing candidate progress and 15-30 minutes per month counseling their candidate.

Sponsors will put forth candidates who need advancement in their cybersecurity career but have little or no means. Sponsors will send anonymous resumes of candidates and email with a subject line of: Why this candidate?

Perfect candidate requirements*:

  • Associates or Bachelor’s degree
  • GPA of 3.0 or better
  • Work in Information Technology for more than 4 years but less than 8
  • Comptia Security Plus certification or equivalent.

 

*For any requirement deficit, Sponsor must address why their candidate should still be considered.

 

Exclusions from the scholarship program:

  • Anyone working for a training organization.
  • Anyone with an income greater than $100,000 gross.

Candidates must submit to their Sponsor:

  • Resume void of gender or race indicators.
  • Anonymous email address created with gmail.

Deadlines & Reduction rounds:

  • Feb 1 – Resumes Submitted by Sponsor and explanation email Subject: Why this candidate?
  • Feb 8 – First Technical exam (30 Minutes / 30 Questions)
  • Feb 15 –  Written essay live topic assigned with a 1-hour deadline
  • Feb 22 – Video interview online
  • Feb 28 – Offer letters sent
  • Mar 1 – Candidate response required

Program start date:

March 3, 2018 Saturday 12:00 Central time 

Scholarship requirements if accepted to the Cyber Master Training:

Students will work at a 90% mastery level. Any student not maintaining this level for more than a month will be retired from the program.

Students will meet online 3 times per week for 90 Sessions in 9 months. This program ends December 31, 2018.

Students will be required to submit weekly projects, pass exams, and maintain a working relationship with instructors and sponsors.

Disclaimers:

Any company or government regulations, policies, or requirements that conflict with this scholarship program must be resolved by sponsors and candidates before starting the scholarship program. This scholarship program is an agreement between the candidate and Expanding Security only. Expanding Security will only discuss the program with sponsors and candidates; no third parties are permitted to intercede.

Expanding Security reserves the right to revoke scholarship for any reason if the candidate is deemed unfit or inappropriate without explanation.

Expanding Security reserves the right to end the program at any time.

Expanding SecurityCyber Master Training

Which Direction?

There are 2000 I.T. certifications, 200 Security certifications, and 100’s of vendors.

What Path?

Self-study, online, live, social, video, on the job, and trial and error.

Who to Trust?

Yelp, Facebook, college, LinkedIn, vendors?

You need a stable cybersecurity foundation, for any topic, any test, any job.

What doesn’t work?

Wasting time and money. Most computer science degrees teach programming and algorithms, not practical security concepts, and not how to be a practitioner. You need 40 or more concepts when solving cybersecurity problems. But most of us have 3 or 4 strong concepts and follow a set of steps handed down from person to person. Step-by-step will not work.

Where is cybersecurity now?

The rest of the world is still using certifications like the CISSP, CASP, CSXP, and many others to define what you should know – according to the vendor. We must not get stuck in the cycle of cramming for the next certification and then promptly forget it all. This gets us nowhere. This is not stable.

Where is cybersecurity going?

Cybersecurity is being professionalized through NIST, NICE, and NICCS.  The U.S. Government has now defined the 55 cybersecurity work roles for the next 50 years. The OPM Office of Personnel Management formally matched skill sets of cybersecurity professionals to specific job codes. Professionalization is here.

Both are true now.

We cannot ignore the present, but we must prepare for the future. In Cyber Master Training we learn the concepts, the practical activities, and the business practices that will last for 50 years. Our program topics are selected based upon 10 years of NICCS research and the Framework of 2500 KSAT’s: Knowledge, Skills, Abilities, and Tasks. The resume, the boss, the one who makes the decisions needs proof; Certifications are still part of the Cyber Master Training program.

How can you get it done?

Cyber Master Training is faster than a degree and far better than bolted-together classes. This is a plan you can follow while working. 90 sessions; 1 hour each; 3 meetings per week; spread over a digestible length of time.

This is not exam preparation. This is cybersecurity foundation building. You can do it. Follow the plan.

High-level course overview

NICCS Categories:

Securely Provision, Oversee and Govern, Protect & Defend

NICCS Roles:

  • Information Systems Security Manager
  • Security Control Assessor
  • Cyber Policy and Strategy Planner
  • Cyber Defense Infrastructure Support Specialist
  • Cyber Defense Incident Responder
  • Vulnerability Assessment Analyst

Certifications covered in Cyber Master Training

  1. CISSP® from ISC2
  2. CASP® from CompTIA
  3. CSXP® from ISACA

Detailed Course Outline – 8 sections, 57 topics, 570 NICCS KSAT’s

VULNERABILITIES:(111)

  1. Common Vulnerabilities and Exploits
  2. Penetration Testing and Assessment*
  3. Testing Computer System Vulnerability

PROCESS:(99)

  1. Systems Security Engineering
  2. Identity Verification
  3. Mobile Applications
  4. Protecting Information
  5. Media Sanitization*
  6. Patch Management*
  7. Securing Systems
  8. Configuration Management

INCIDENTS:(131)

  1. Log Management*
  2. Continuous Monitoring
  3. Incident Handling
  4. Event Recovery
  5. Threat Information Sharing
  6. Forensics and Incident Response

TECHNOLOGY: (101)

  1. Protocols & Communications Analysis*
  2. Virtual Private Networking *
  3. Transport Layer Security*
  4. Trustworthy Email *
  5. Bring Your Own Device*
  6. Industrial Control Systems
  7. Internet of Things*
  8. Virtual Network*
  9. Virtualization*
  10. Cloud Computing*
  11. Mobile Devices*
  12. Wireless Networks*
  13. Wireless Authentication*
  14. IPv6
  15. Domain Name System*
  16. Intrusion Prevention Systems*
  17. Firewalls*
  18. Anti-Virus
  19. Secure Web Services*

RISK: (55)

  1. Personally Identifiable Information
  2. Risk Management Framework
  3. Managing Risk
  4. Supply Chain Risk Management
  5. Risk Assessments*

MANAGEMENT: (31)

  1. Developing Security Plans
  2. Contingency Planning*
  3. System Development Life Cycle
  4. Performance Measurement

CRYPTOLOGY: (37)

  1. Encryption*
  2. Block Cipher Modes
  3. Algorithms and Key Lengths
  4. Key Management Systems
  5. Digital Signatures
  6. Public-Key Cryptography*

OTHER: (5)

  1. OWASP top 10*
  2. Physical Security

*Indicates hands-on exercises

 

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.