building the cybersecurity workforce - fbcinc.com (certified ethical hacker) it 388: ......

15
November 2017 Building the Cybersecurity Workforce

Upload: dangthu

Post on 30-Mar-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

November 2017

Building the Cybersecurity Workforce

2

Measuring Kaplan University’s Educational Impact – For every career pathOur Global Footprint

+1MM students annually served

Facilities in 30+ countries

Over 19,000 employees worldwide

Kaplan University dates back to 1937 when the American Institute of Commerce was founded

All of our degree programs are regionally accredited by the Higher Learning Commission (HLC)

• 7 accredited schools and colleges

• Over 180 degree and certificate programs

• Certificate, Associate’s, Bachelor’s, Master’s, Professional Law, and Doctorate degrees

• ~40,000 students attending online or at 16 ground campuses (84% attend online)

• ~10,000 military affiliated students (25.5% of total University census; 28.3% of KUO census)

3

We continue to Innovate

We can help you:

1. Get the best people in the door

• Our students are being developed in classes built to industry and skill needs help attract top talent

2. Develop the Talent you Have

• Better educated employees improve performance, customer service, and loyalty

• Education enables your people to gain skills, grow, and advance in their career

3. Hold on to the Talent you Want

• Learning as an employee benefit boosts retention

• The degree means something to them

4

Increase ROI Through The Right Education Program

5

Kaplan Cybersecurity Programs

• Maps to critical certifications recognized by the Information Assurance community, and for DoD personnel, mandated by DoD Directive 8570

• CompTIA Network+, Security+, CEH, CISSP & CCNA

• Faculty with industry experience and certifications that provide support of student career paths

• Active Cybersecurity Club that provides networking opportunities and certification study groups

6

Kaplan Cybersecurity ProgramsSeveral courses in the program will help you prepare for industry certifications. The recommended timing/sequence for pursuing certifications follows: After completing: Take Exam:

IT 273: Networking Concepts; IT 278: Network Administration & IT283 Networking with TCP/IP

CompTIA Network+

IT 286: Introduction to Network Security CompTIA Security+

IT 104: Introduction to CybersecurityIT 273: Networking ConceptsIT 277: CISSP IIT 278: Network AdministrationIT 279: CISSP IIIT 286: Introduction to Network SecurityIT 410: CISSP IIIIT 412: Information Systems Security

(ISC)2 - CISSP (Certified Information Systems Security Professional) Certification (students must have completed all stages)*

IT 262: Certified Ethical Hacking IIT 390: Intrusion Detection and Incidence ResponseIT 395: Certified Ethical Hacking II

CEH (Certified Ethical Hacker)

IT 388: Routing and Switching IIT 471: Routing and Switching II (elective)

CCNA - Routing and Switching*

7

Kaplan Cybersecurity Programs

CompTIA Network+ IT 273: Networking Concepts

CompTIA Security+ IT 286: Introduction to Network Security

(ISC)2 - CISSP (Certified Information Systems Security Professional) Certification (students must have completed all stages)

IT 104: Introduction to CybersecurityIT 273: Networking ConceptsIT 277: CISSP IIT 278: Network AdministrationIT 279: CISSP IIIT 286: Introduction to Network SecurityIT 410: CISSP IIIIT 412: Information Systems Security

Microsoft Certified Solutions Expert (MCSE) Microsoft Certified or Solutions Associate (MCSA) Associate level for Windows Server 2012 or 2016

IT 375: Windows Enterprise Administration

MCTS (Microsoft Certified Technology Specialist) IT 278: Network Administration

CEH (Certified Ethical Hacker) IT 262: Certified Ethical Hacking IIT 390: Intrusion Detection and Incidence ResponseIT 395: Certified Ethical Hacking II

EnCase - EnCE (EnCase Certified Examiner) Certification (students must have completed Phase 1 & 2)

IT 411: Digital Forensics

GIAC - GCIH (Certified Incident Handler) Certification IT 390: Intrusion Detection and Incidence Response

Industry certification holders can jump start their BSC degree and earn course credit as follows:

8

Kaplan Cybersecurity Programs

Lockstep Program: • Promotes community vs. alienation• Affords opportunities for student

leadership• Social networking • Implications for alumni employment

9

Kaplan Cybersecurity Programs

• Targets management in Cybersecurity and the unique combination of technical and managerial skills required

• Helps to prepare graduates for higher level certifications such as CSSLP and CISM

• Includes coursework to enable managers to evaluate risks and costs associated with Cybersecurity for their organizations

• Provides option for students to complete a capstone project or publish a comprehensive thesis

10

Master of Science in Cybersecurity Management

IT513 Writing and Critical Thinking for the IT Professional

IT530 Computer Networks

IT537 Introduction to Cybersecurity

IT527 Foundations in Data Analytics

IT528 Quantitative Risk Analysis

IT540 Management of Information Security

IT541 Computer and Network Security

IT542 Ethical Hacking and Network Defense

IT550 Computer Forensics and Investigations

IT590 Legal and Ethical Issues in IT

IT544 Platforms, Applications and Data Security

IT545 Wireless, Mobile, and Cloud Security

IT591 IT Security Auditing and Assessments

IT592 Financial Management of Cybersecurity

IT595 Master's Capstone for Cybersecurity Management

15 courses 60 credits total, 36 credits in common with the MSIT program

• The Master of Science in Cybersecurity Management will prepare graduates for leadership roles directing and protecting critical information infrastructures. You will learn to develop, implement, evaluate, and update the cybersecurity policies and practices that allow an organization to effectively respond to the dynamic cybersecurity landscape. Graduates will be adept in the management of information continuity, asset classification and control, compliance management, and the secure administration of IT infrastructure, as well as incident response.

Model Implementations - Cybersecurity

11

• Build awareness of Kaplan University Cybersecurity Programs to companies and organizations that have a need or talent gap

• Aggressively promote the ManTech success story to a targeted list of companies with similar needs to create multiple partnerships with similar solutions

• Engage targeted individuals including HR managers and CLOs though multiple channels to enable an initial conversation for new prospective partnerships

12

Kaplan Partnership Services

12

13

Kaplan Can Tailor A Program To Meet The Needs Of Your Organization

Employee Benefit Program Custom Degree Programs Strategic Corporate Solutions

Specialized Pricing Models (Tuition Caps)

Customization of Delivery

EDAIM: Discovery and Diagnostic Process

Customized Solution

☑Speed to Degree: Detailed Articulation

Tuition Discounts ✔

✔ ✔

The Kaplan ‘Stacking Approach’ We combine past training, learning, and experience to reduce costs and accelerate degrees.

14

X%

X%

X%

X%

X%Courses Remaining

Prior Learning

Corporate Training

Transfer Credit

Portfolios

15

Modular Articulation: Process OverviewKaplan University makes it possible to earn credit for what you already know without having to retake courses or relearn material.

How it works1 2 3

Kaplan gets to know your business and understand the needs of your workforce with the goal of optimization in mind.

You share your training with us and we map it to our existing modularized courses and curriculum.

We prepare a program that enables your employees to take relevant, impactful courses to achieve the desired degree.