Cyber Masters Training

$15,000.00

Category:

Description

Expanding Security Cyber Master Training

This high-level masters course is offered only twice per year for 9 months.  Next class begins late October 2018.  Contact Dean Bushmiller to discuss possible participation 443-865-3265.

Full tuition includes 3 exam vouchers.

In Cyber Master Training we learn the concepts, the practical activities, and the business practices that will last for 50 years. Our program topics are selected based upon 10 years of NICCS research and the Framework of 2500 KSAT’s: Knowledge, Skills, Abilities, and Tasks. The resume, the boss, the one who makes the decisions needs proof; Certifications are still part of the Cyber Master Training program.

How can you get it done?

Cyber Master Training is faster than a degree and far more substantive than bolted-together classes. This is a plan you can follow while working. 90 sessions LIVE ONLINE; 1 hour each; 3 meetings per week; spread over a digestible length of time.

This is not exam preparation. This is cybersecurity foundation building.

Our Cyber Masters program runs deep, wide, and long.  It’s concentrated and specifically designed and laid out in a doable plan over just nine months.  You can do it. Follow the plan.

“The key distinction that will set you apart from the field is a commitment to mastery.

To truly master a field of study, you’ve got to go deep. These days, most people stay in the shallow end. Everyone seems to know a little about a lot. They dabble. They’ve got all kinds of pins and badges and likes and dislikes…

…Listen to me: That’s not good enough.

When you decide to become a master in the subject area that you are passionate about you’ve got to take massive action. You must be committed to learn everything humanly possible about that subject matter. You need to know it wider and better than anyone else, and most importantly, you have to use that knowledge to serve something greater than yourself.” Tony Robbins – 2018 Speech to Graduates

High-level course overview

NICCS Categories:

Securely Provision, Oversee and Govern, Protect & Defend

NICCS Roles:

  • Information Systems Security Manager
  • Security Control Assessor
  • Cyber Policy and Strategy Planner
  • Cyber Defense Infrastructure Support Specialist
  • Cyber Defense Incident Responder
  • Vulnerability Assessment Analyst

Certifications covered in Cyber Master Training

  1. CISSP® from ISC2
  2. CASP® from CompTIA
  3. CSXP® from ISACA

Detailed Course Outline – 8 sections, 57 topics, 570 NICCS KSAT’s

VULNERABILITIES:(111)

  1. Common Vulnerabilities and Exploits
  2. Penetration Testing and Assessment*
  3. Testing Computer System Vulnerability

PROCESS:(99)

  1. Systems Security Engineering
  2. Identity Verification
  3. Mobile Applications
  4. Protecting Information
  5. Media Sanitization*
  6. Patch Management*
  7. Securing Systems
  8. Configuration Management

INCIDENTS:(131)

  1. Log Management*
  2. Continuous Monitoring
  3. Incident Handling
  4. Event Recovery
  5. Threat Information Sharing
  6. Forensics and Incident Response

TECHNOLOGY: (101)

  1. Protocols & Communications Analysis*
  2. Virtual Private Networking *
  3. Transport Layer Security*
  4. Trustworthy Email *
  5. Bring Your Own Device*
  6. Industrial Control Systems
  7. Internet of Things*
  8. Virtual Network*
  9. Virtualization*
  10. Cloud Computing*
  11. Mobile Devices*
  12. Wireless Networks*
  13. Wireless Authentication*
  14. IPv6
  15. Domain Name System*
  16. Intrusion Prevention Systems*
  17. Firewalls*
  18. Anti-Virus
  19. Secure Web Services*
  20. RISK: (55)
    1. Personally Identifiable Information
    2. Risk Management Framework
    3. Managing Risk
    4. Supply Chain Risk Management
    5. Risk Assessments*

    MANAGEMENT: (31)

    1. Developing Security Plans
    2. Contingency Planning*
    3. System Development Life Cycle
    4. Performance Measurement

    CRYPTOLOGY: (37)

    1. Encryption*
    2. Block Cipher Modes
    3. Algorithms and Key Lengths
    4. Key Management Systems
    5. Digital Signatures
    6. Public-Key Cryptography*

    OTHER: (5)

    1. OWASP top 10*
    2. Physical Security

    *Indicates hands-on exercises