cyber security workforce solutions

6
DEFEND YOUR ORGANIZATION FROM CYBER THREATS by Creating Alignment Between People, Organizational Processes & Technology CYBER SECURITY: High-Performance Training & Implementation Solutions PROCESS/ POLICY PEOPLE TECHNOLOGY

Upload: chris-brady

Post on 11-Apr-2017

119 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Cyber Security Workforce Solutions

DEFEND YOUR ORGANIZATION FROM CYBER THREATSby Creating Alignment Between People, Organizational Processes & Technology

CYBER SECURITY: High-Performance Training & Implementation Solutions

PROCESS/POLICY

PEOPLE TECHNOLOGY

Optimizing IT Workforce Performance

Page 2: Cyber Security Workforce Solutions

THE THREAT OF CYBER SECURITY IS RISING

90%90% of all reported security incidents are the result of

human error

58%58% of CISOs said their

IT systems were definitely or probably under attack without them knowing it

2,000,000Shortage of 2,000,000 trained cyber security professionals by 2017

Optimize Your Cyber Security Workforce by Creating Alignment Between People, Processes & Technology

Learning Tree Leverages Two Industry Frameworks to Address the People and the Process/Policy

National Institute of Standards & Technology (NIST) Framework

With the NIST Cybersecurity Framework, an organization can use its current process and overlay it onto the Framework to determine gaps in its current cyber security risk approach and develop a road map to improvement.

National Cybersecurity Workforce Framework (NCWF) as Defined by NICE

The NCWF as defined NICE has seven categories, each comprised of several specialty areas. Each specialty area is comprised of tasks, as well as the Knowledge, Skills and Abilities (KSAs) required to complete the tasks.

- National Strategy, Roles, and Responsibilities Need to Be Better Defined

and More Effectively Implemented, U.S. Government Accountability Office

- Core Security

- Network World

PEOPLEHaving a clear, up-to-date

understanding of job roles and the competent people to fulfill those

roles is essential for any organization to function effectively in a cyber

security environment.

PROCESS/POLICYCyber attacks are evolving and

striking organizations constantly. To continuously defend your

organization from these threats, your workforce needs to establish

structured processes and implement best practices.

TECHNOLOGYWhile new technology can be easy to acquire, your organization will

still be at risk of an attack until your people have the right security skills.

By providing your workforce with the right cyber security training, your technology will be implemented at

full potential.

Page 3: Cyber Security Workforce Solutions

A HOLISTIC APPROACH TO OPTIMIZE YOUR WORKFORCE

IMPLEMENTProcess & Organizational

Improvements

ENHANCEKnowledge, Skills &

Abilities (KSAs)ASSESS/MAPKnowledge, Skills &

Abilities (KSAs)

DEFINEOrganizational Structure, Processes & Job Roles

› Leveraging the National Cybersecurity Workforce Framework (NCWF), develop an optimal cyber security organizational design, including defined roles and job descriptions

› Based on your cyber security needs, ensure you have the proper policies and processes well-defined, using best practices from the NIST Cybersecurity Framework

› Align the Knowledge, Skills and Abilities (KSAs) of your workforce to each role of the NCWF

› Determine the KSAs of your existing staff and identify skill gaps using automated skills assessments

› Develop a Customized Cyber Security Curriculum with individual Learning Plans to meet the needs of your staff and organization

› Provide program management of the training, coaching, and mentoring of your staff

› Rapidly increase the process maturity of your cyber security organization with customized Acceleration Workshops

› Embed our expert instructors to help your staff apply newly gained skills on the job.

CYBE

R SE

CURI

TYAC

CELE

RATI

ON W

ORKS

HOPS • Leverage the NCWF to identify the optimal cyber security

organizational structure and job role descriptions

• Improve threat identification and analysis in the organization’s SOC

• Establish a cyber security forensics process for the organization

• Refine the organization’s cyber security testing and certification approach

• Establish an organization risk management approach based on the NIST Cybersecurity Framework

Optimizing IT Workforce Performance

Page 4: Cyber Security Workforce Solutions

Learning Tree Cyber Security Courses are Aligned with the NCWF* as Defined by NICE*Gain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTia Security+, CISSP, CISA, CISM, and many more!

SECURELY PROVISIONConceptualizing, Designing and Building Secure IT Systems

Information Assurance Compliance1. Cyber Security: Accessibility & Quality2. Vulnerability Assessment 3. Advanced Security Auditing - Coming Soon

Software Security Engineering1. Securing Web Applications, Services and Servers2. Penetration Testing: Tools & Techniques3. Mobile Application & Device Security

OPERATE & MAINTAINProviding Support, Administration and Maintenance of IT Systems

Customer Service and Technical Support1. System & Network Security Introduction2. Social Engineering Deceptions & Defenses 3. CompTIA A+ Certification Exam Prep

Data Administration1. SQL Server Introduction2. SQL Server Database Administration3. Relational Database Design, Tools & Techniques

PROTECT & DEFENDIdentification, Analysis and Mitigation of Threats to Internal IT Systems or Networks

CND Analyst1. Cyber Security: Accessibility & Quality2. Continuous Diagnostic & Management/SIEM3. CompTIA Network+ Certification Exam Prep

CND Infrastructure Support1. System & Network Security Introduction2. Defending the Perimeter from Cyber Attacks 3. Endpoint Security & Network Access Control

INVESTIGATEInvestigation of Cyber Events and/or Crimes of IT Systems, Networks and Digital Evidence

Digital Forensics1. Penetration Testing: Tools & Techniques2. Digital Forensics: Windows Systems & Mobile 3. Adv. Investigations & Malware Analysis - Coming Soon

Investigation1. Vulnerability Assessment 2. Incident Response - Coming Soon 3. Advanced Investigations & Malware Analysis - Coming Soon

ANALYZEReview and Evaluation of Incoming Cyber Security Information

All Source Intelligence1. Essentials of Activity-Based Intel. (ABI)2. Applying Activity-Based Intel. Methods 3. Activity-Based Intelligence Analysis

Exploitation Analysis1. CompTIA Security+ Certification Exam Prep2. Penetration Testing: Tools & Techniques3. Exploitation Analysis - Coming Soon

OVERSIGHT & DEVELOPMENTProviding Leadership, Management, Direction and/or Development of Advocacy

Information Systems Security Operations1. Cyber Security Risk Assessment & Management2. Preparing for the CISA Exam - Coming Soon3. Preparing for the CISSP Exam

Security Program Management1. Cyber Security Risk Assessment & Management2. Strategic Thinking for Operational Management3. Preparing for the CISM Exam - Coming Soon

LEARN MORE AT: LEARNINGTREE.COM/CYBER OR CALL 1-800-843-8733

Page 5: Cyber Security Workforce Solutions

Learning Tree Cyber Security Courses are Aligned with the NCWF* as Defined by NICE*Gain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTia Security+, CISSP, CISA, CISM, and many more!

Systems Development1. Securing Web Applications, Services and Servers2. Cyber Security: Accessibility & Quality3. Cyber Security: Secure System Dev. - Coming Soon

System Requirements Planning1. System & Network Security Introduction2. Disaster Recovery Planning3. Identity Management

Network Services1. Introduction to Networking2. Network Configuration & Troubleshooting3. CompTIA Network+ Certification Exam Prep

System Administration1. Windows Server 2012 Administration2. Windows Server Group Policy Management3. Windows Server Active Directory Domain Svc.

Systems Security Analysis1. Defending the Perimeter from Cyber Attacks2. Social Engineering Deceptions & Defenses3. Endpoint Security & Network Access Control

Incident Response1. CompTIA Security+ Certification Exam Prep2. Digital Forensics: Windows Systems & Mobile3. Detecting Breaches & DDoS - Coming Soon

Vulnerability Assessment and Management1. Vulnerability Assessment 2. Penetration Testing: Tools & Techniques3. Advanced Threats: Targeted Attacks/Defenses

Threat Analysis1. Continuous Diagnostic & Management/SIEM2. Social Engineering Deceptions & Defenses3. Malware Analysis / Reverse Engineer - Coming Soon

How Learning Tree Cyber Security Courses Align with the NCWF as defined by NICEThe courses listed provide knowledge and skills vital for workers who must perform the tasks associated with “Computer Network Defense Infrastructure Support”.

SEE EXAMPLE BELOW:

CND Infrastructure SupportTraining that Fulfills Required KSAs*1. System and Network Security Introduction2. Defending the Perimeter from Cyber Attacks 3. Endpoint Security & Network Access Control

Computer Network Defense (CND) Infrastructure SupportKSAs* Required for Job Roles

Tests, implements, deploys, maintains, reviews and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.

* KSA: Knowledge, Skills, Abilities

* NICE: National Initiative for Cybersecurity Education

* NCWF: National Cybersecurity Workforce Framework

Optimizing IT Workforce Performance

Page 6: Cyber Security Workforce Solutions

HIGH-PERFORMANCE TRAINING & IMPLEMENTATION SOLUTIONS FROM LEARNING TREE

LEARNINGTREE.COM/CYBER 1-800-THE-TREE (843-8733)

NETWORK, DATA & SECURITY

Cyber Security

Networking & Virtualization

SQL Server & Oracle Databases

Cloud Computing

Big Data/Activity-Based Intelligence

Linux & UNIX

Cisco

WINDOWS SYSTEMS

Windows Desktop

Windows Server

Microsoft Unified Communications

Microsoft Office

APPLICATION DEVELOPMENT

Web Development

Mobile App Development & Mac Programming

Java Programming

Perl, Python & C++ Programming

Software Development

Agile & Scrum

.NET/Visual Studio

BUSINESS MANAGEMENT

Project Management

ITIL®, COBIT ® & SFIA Certifications

Business Analysis

SharePoint

Leadership & Professional Development

Trusted Partner for 60,000+ Organizations

serving national and multinational corporations;

government agencies; Education and Non-Profits

600+ Expert Advisorsserving our global customer footprint and averaging 20+ years of diverse real-world

experience

Demonstrated Past Performance

in offering end-to-end proven capabilities to provide all facets of Workforce Optimization resulting in improved organizational alignment

For over 40 years, Learning Tree has been a Proven Market Leader

Optimizing IT Workforce Performance

US16

03 C

yber

Sec_

A