cyber academy - northrop grumman corporation academy developing the cyber workforce ... ration of...
TRANSCRIPT
www.northropgrumman.com© 2014 Northrop Grumman Systems Corporation.All rights reserved. Approved for Public Release: 14-1372IS10350314UK
For more information,please contact:
Northrop Grumman Information Systems
Northrop Grumman has more than 30 years experience in cyber security and information assurance, and brings unparalleled expertise in managing and protecting networks and delivering complex information assurance and security solutions to high-risk customers including government and critical infrastructure industries. It is developing the next-generation of advanced cyber solutions, which touch on policy, governance requirements, software application, network development, training and operational support, and is responsive to emerging cyber security needs. Northrop Grumman invests in leading-edge research and development, and accesses cutting-edge technology through affiliation with academia and small to medium enterprises. The company is a major sponsor of school, university and professional cyber competitions worldwide. For more information about Northrop Grumman in cyber security, visit www.northropgrumman.com/cyber.
CyberAcademy
Developing the Cyber Workforce
Cyber Academy PartnershipsNorthrop Grumman continually develops relationships and partners with thought leaders in cyber security, academic insti-tutions, industry and the client community to enhance Cyber Academy offerings and learning opportunities. Partnerships focus on cyber/information assurance certifications and training in specialised areas of cybersecurity including next generation technologies and tools.
Cyber CertificationProgrammeThe Cyber Academy assists employees in their pursuit of certifications, including those accepted by the industry. Employees may follow defined pathways to certification, take advantage of training opportu-nities, and participate in exam preparation cohorts for specific certifications available through university and vendor partner-ships. Northrop Grumman’s Ed-ucation Assistance Programme provides funding for employees to participate in related prepa-ration courses and exams.
The Cyber Academy provides training courses, learning opportunities, and career
and certification pathways to increase the level of knowledge in cyber security and cyber warfare. The Cyber Academy helps ensure Northrop Grumman has the most qualified talent available to take on the full spectrum of cyber challenges for our customers.
CurriculumOverview offerings provide leaders, decision makers and technologists a high-level view of the technical curriculum, while additional Cyber Academy courses provide aware-ness and specialised training for both technical and non-technical audiences:
• Overview Courses (2 or 4 hours) – These overview courses review cyber security and its impact on your organisation, to include a summary of methodologies, tools, and techniques used by today’s computer attackers.
• Cyber Awareness & Hands-on Lab (4 days) – In-depth discussion, demon-stration, and hands-on training in a virtual lab environment, with students gaining an understanding of attack methodologies and preparing the defence of their machine to expose and reduce vulnerabilities.
• Cyber Security for Business Developers/Programme Managers (4 hours) - Cyber security fundamentals and guidance on integrating into business development and
programmes. The course uses pictorial perspectives that facilitates communications throughout the programme lifecycle.
• Network Security Essentials (1 day) – Provides an overview of net-working, the Open System Interconnection (OSI) Reference Model, and the necessary security measures used to protect a network against attacks.
• Software Security Engineering (1 day) – Teaches how and where to build security into the Software De-velopment Lifecycle including techniques for threat modelling, architecture & design, and methodologies for secure coding/testing.
• Secure Architecture Analysis & Application (2 days) – Provides an understanding of cyber architecture, the role of cyber architecture and the role of cyber architects, and intro-duces various cyber artefacts, capabilities, and frameworks enabling students to develop repeatable cyber architecture solutions.
• Reverse Engineering (2 weeks) This course provides an explo-ration of Reverse Engineering as it pertains to malicious code, viruses, and other categories of malware. Through in-depth discussions, as well as hands-on practical application through the use of tools such as IDA and Obfuscator, participants will gain a foundational under-
Cyber Academy: Developing the Cyber Workforce
as the Security Monitoring Team, the Cyber Incident Response Team, and the Forensic Investigative Security Team, in preparation for an entry-level position as a CSOC analyst.
• Introduction to Offensive Security (2 days) – This two-day course provides an introductory look at offen- sive cyber security, and serves as a foundation for continued learning into more specific areas of pro-active security assessments. This course explores not only the cate-gories of offensive security activities, but also the ethical and legal considerations often confronted during real-world security assessments. Ranging from topics such as Ethical Hacking, Penetration Testing, Vulnerability Assessments, authorized attack planning, and report writing, students who participate in this course will be better prepared to
explore the more technical topics covered in our follow-on of-fensive security courses (e.g. Ethical Hacking Fundamentals, Fundamentals of Penetration Testing).
• Ethical Hacking Fundamentals (5 days) – This course provides a compre-hensive view into the various stages of ethical hacking from reconnaissance to system attack and post-attack clean-up. Through in-depth discussion and demonstration the course covers the advanced computer and network concepts used by ethical hackers during penetration testing. Students will be introduced to the concepts and terminology found in common ethical hacking exams such as the EC Council CEH exam.
• Penetration Testing (3 days) - This course provides students with the opportunity to gain a comprehensive view of penetra-tion testing through hands-on application of methodologies and the use of advanced com-puter and networking concepts used during testing, including: security assessment planning and preparation, network reconnaissance, attack plan-ning and execution, maintaining stealth, and report generation.
Cyber AcademyTraining FrameworkThe foundation for Cyber Academy training and development includes business needs, cyber skills and competencies, industry and academic partnerships, and technology/research. Each level of the training framework aims to meet specific training and development needs for Northrop Grumman, customers, and potential client audiences.
standing of the concepts be-hind Reverse Engineering, as well as how it is performed in a real-world cyber security envi-ronment. This knowledge will help prepare participants for roles in a Digital Forensic Inves-tigation lab or a Cyber Security Operations Center, and will also help software engineers and programmers develop more secure code by providing real-world examples of code disassembly, code hardening, and code obfuscation.
• Introduction to Cyber Defence (2 days) – This two-day course provides an introductory look at defen-sive cyber security, and serves as a foundation for continued learning into the more specific areas of setting up and main-taining an Enterprise Defence-In-Depth programme. This course explores not only the categories of defensive security activities, but also the Defence-In-Depth framework (The Northrop Grumman FAN™), security controls, and risk management.
• CSOC Overview (2 hours) – This course provides an intro-ductory look at a Northrop Grumman Cyber Security Operations Center (CSOC). The course explores the primary day-to-day operational activities conducted by a CSOC, including the various CSOC elements, the incident response process, and the digital forensic investigation process. Students will become familiar with the func-tions and roles of teams such
Fundamentals of •Cyber Security
Cyber Executive •Overview
Awareness/Basic Training
Certifications
Specialisation
Pen Testing •Incident Handling/ •
Intrusion Detection Digital Forensics •
SCADA •
Software Security •Engineering
Architecture Analysis •and Application
Industry accepted CERTsSecurity + CISSP, etc.
Skills
Cyber Training and Education
Specialtytraining
to addressAdvanced
Threat challenges
Skill development focusedon delivery of secure
capabilities/solutions
Certifications based on business/skillsaligned with ISO 27000 requirements
Awareness education and training for all levels
Advanced Specialty Training
Secure Architecture Design & Engineering
Certification
Basic Awareness Education / Training