cyber security training uk edition
DESCRIPTION
UK editionTRANSCRIPT
DEFEND YOUR ORGANISATION FROM CYBER THREATSby Creating Alignment Between People, Organisational Processes & Technology
CYBER SECURITY: High-Performance Training & Implementation Solutions
PROCESS/POLICY
PEOPLE TECHNOLOGY
Optimizing IT Workforce Performance
90%90% of all reported security incidents are the result of
human error
58%58% of CISOs said their
IT systems were definitely or probably under attack without them knowing it
2,000,000Shortage of 2,000,000 trained cyber security professionals by 2017
Optimise Your Cyber Security Workforce by Creating Alignment Between People, Processes & Technology
Learning Tree Leverages Two Industry Frameworks to Address the People and the Process/Policy
National Institute of Standards & Technology (NIST) Framework
With the NIST Cybersecurity Framework, an organisation can use its current process and overlay it onto the Framework to determine gaps in its current cyber security risk approach and develop a road map to improvement.
National Cybersecurity Workforce Framework (NCWF) as Defined by NICE
The NCWF as defined NICE has seven categories, each comprised of several specialty areas. Each specialty area is comprised of tasks, as well as the Knowledge, Skills and Abilities (KSAs) required to complete the tasks.
- National Strategy, Roles, and Responsibilities Need to Be Better Defined
and More Effectively Implemented, U.S. Government Accountability Office
- Core Security
- Network World
PEOPLEHaving a clear, up-to-date
understanding of job roles and the competent people to fulfill those
roles is essential for any organisation to function effectively in a cyber
security environment.
PROCESS/POLICYCyber attacks are evolving and
striking organisations constantly. To continuously defend your
organisation from these threats, your workforce needs to establish
structured processes and implement best practices.
TECHNOLOGYWhile new technology can be easy to acquire, your organisation will
still be at risk of an attack until your people have the right security skills.
By providing your workforce with the right cyber security training, your technology will be implemented at
full potential.
CYBER SECURITY THREATS ARE ON THE RISE
A HOLISTIC APPROACH TO OPTIMISE YOUR WORKFORCE
IMPLEMENTProcess & Organisational
Improvements
ENHANCEKnowledge, Skills &
Abilities (KSAs)ASSESS/MAPKnowledge, Skills &
Abilities (KSAs)
DEFINEOrganisational Structure, Processes & Job Roles
› Leveraging the National Cybersecurity Workforce Framework (NCWF), develop an optimal cyber security organisational design, including defined roles and job descriptions
› Based on your cyber security needs, ensure you have the proper policies and processes well-defined, using best practices from the NIST Cybersecurity Framework
› Align the Knowledge, Skills and Abilities (KSAs) of your workforce to each role of the NCWF
› Determine the KSAs of your existing staff and identify skill gaps using automated skills assessments
› Develop a Customised Cyber Security Curriculum with individual Learning Plans to meet the needs of your staff and organisation
› Provide programme management of the training, coaching, and mentoring of your staff
› Rapidly increase the process maturity of your cyber security organisation with customised Acceleration Workshops
› Embed our expert instructors to help your staff apply newly gained skills on the job.
CYBE
R SE
CURI
TYAC
CELE
RATI
ON W
ORKS
HOPS • Leverage the NCWF to identify the optimal cyber security
organisational structure and job role descriptions
• Improve threat identification and analysis in the organisation’s SOC
• Establish a cyber security forensics process for the organisation
• Refine the organisation’s cyber security testing and certification approach
• Establish an organisation risk management approach based on the NIST Cybersecurity Framework
Optimizing IT Workforce Performance
Learning Tree Cyber Security Courses are Aligned with the NCWF* as Defined by NICE*Gain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, and many more!
SECURELY PROVISIONConceptualising, Designing and Building Secure IT Systems
Information Assurance Compliance1. Cyber Security: Accessibility & Quality2. Vulnerability Assessment 3. Advanced Security Auditing - Coming Soon
Software Security Engineering1. Securing Web Applications, Services and Servers2. Penetration Testing: Tools & Techniques3. Mobile Application & Device Security
OPERATE & MAINTAINProviding Support, Administration and Maintenance of IT Systems
Customer Service and Technical Support1. System & Network Security Introduction2. Social Engineering Deceptions & Defences 3. CompTIA A+ Certification Exam Prep
Data Administration1. SQL Server Introduction2. SQL Server Database Administration3. Relational Database Design, Tools & Techniques
PROTECT & DEFENDIdentification, Analysis and Mitigation of Threats to Internal IT Systems or Networks
CND Analyst1. Cyber Security: Accessibility & Quality2. Continuous Diagnostic & Management/SIEM - Coming Soon3. CompTIA Network+ Certification Exam Prep
CND Infrastructure Support1. System & Network Security Introduction2. Defending the Perimeter from Cyber Attacks 3. Endpoint Security & Network Access Control
INVESTIGATEInvestigation of Cyber Events and/or Crimes of IT Systems, Networks and Digital Evidence
Digital Forensics1. Penetration Testing: Tools & Techniques2. Digital Forensics: Windows Systems & Mobile 3. Adv. Investigations & Malware Analysis - Coming Soon
Investigation1. Vulnerability Assessment 2. Incident Response - Coming Soon 3. Advanced Investigations & Malware Analysis - Coming Soon
ANALYSEReview and Evaluation of Incoming Cyber Security Information
All Source Intelligence1. Essentials of Activity-Based Intel. (ABI)2. Applying Activity-Based Intel. Methods 3. Activity-Based Intelligence Analysis
Exploitation Analysis1. CompTIA Security+ Certification Exam Prep2. Penetration Testing: Tools & Techniques3. Exploitation Analysis - Coming Soon
OVERSIGHT & DEVELOPMENTProviding Leadership, Management, Direction and/or Development of Advocacy
Information Systems Security Operations1. Cyber Security Risk Assessment & Management2. Preparing for the CISA Exam - Coming Soon3. Preparing for the CISSP Exam
Security Programme Management1. Cyber Security Risk Assessment & Management2. Strategic Thinking for Operational Management3. Preparing for the CISM Exam - Coming Soon
LEARN MORE AT: LEARNINGTREE.CO.UK/CYBER OR CALL 0800-282-353
Learning Tree Cyber Security Courses are Aligned with the NCWF* as Defined by NICE*Gain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, and many more!
Systems Development1. Securing Web Applications, Services and Servers2. Cyber Security: Accessibility & Quality3. Cyber Security: Secure System Dev. - Coming Soon
System Requirements Planning1. System & Network Security Introduction2. Disaster Recovery Planning3. Identity Management
Network Services1. Introduction to Networking2. Network Configuration & Troubleshooting3. CompTIA Network+ Certification Exam Prep
System Administration1. Windows Server 2012 Administration2. Windows Server Group Policy Management3. Windows Server Active Directory Domain Svc.
Systems Security Analysis1. Defending the Perimeter from Cyber Attacks2. Social Engineering Deceptions & Defences3. Endpoint Security & Network Access Control
Incident Response1. CompTIA Security+ Certification Exam Prep2. Digital Forensics: Windows Systems & Mobile3. Detecting Breaches & DDoS - Coming Soon
Vulnerability Assessment and Management1. Vulnerability Assessment 2. Penetration Testing: Tools & Techniques3. Advanced Threats: Targeted Attacks/Defences
Threat Analysis1. Continuous Diagnostic & Management/SIEM - Coming Soon2. Social Engineering Deceptions & Defences3. Malware Analysis / Reverse Engineer - Coming Soon
How Learning Tree Cyber Security Courses Align with the NCWF as defined by NICEThe courses listed provide knowledge and skills vital for workers who must perform the tasks associated with “Computer Network Defence Infrastructure Support”.
SEE EXAMPLE BELOW:
CND Infrastructure SupportTraining that Fulfills Required KSAs*1. System and Network Security Introduction2. Defending the Perimeter from Cyber Attacks 3. Endpoint Security & Network Access Control
Computer Network Defence (CND) Infrastructure SupportKSAs* Required for Job Roles
Tests, implements, deploys, maintains, reviews and administers the infrastructure hardware and software that are required to effectively manage the computer network defence service provider network and resources. Monitors network to actively remediate unauthorised activities.
* KSA: Knowledge, Skills, Abilities
* NICE: National Initiative for Cybersecurity Education
* NCWF: National Cybersecurity Workforce Framework
Optimizing IT Workforce Performance
HIGH-PERFORMANCE TRAINING & IMPLEMENTATION SOLUTIONS FROM LEARNING TREE
WINDOWS SYSTEMS
Windows Server
Windows Desktop
Microsoft Office
APPLICATION DEVELOPMENT
Web Development
Mobile App Development & Mac Programming
Java Programming
Python, Perl & C++ Programming
Software Development
Agile & Scrum
.NET/Visual Studio
Trusted Partner for 60,000+ Organisations
serving national and multinational corporations;
government agencies; Education and Non-Profits
600+ Expert Advisorsserving our global customer footprint and averaging 20+ years of diverse real-world
experience
Demonstrated Past Performance
in offering end-to-end proven capabilities to provide all facets of Workforce Optimisation resulting in improved organisational alignment
For over 40 years, Learning Tree has been a Proven Market Leader
Optimizing IT Workforce Performance
UK16
03 C
yber
Sec
LEARNINGTREE.CO.UK/CYBER 0800-282-353
NETWORK, DATA & SECURITY
Cyber Security
Big Data
Cloud Computing
SQL Server & Oracle Databases
Business Intelligence
Networking & Virtualisation
Cisco
Linux & UNIX
BUSINESS MANAGEMENT
ITIL®, COBIT ® & SFIA Certifications
Project Management
SharePoint
Business Analysis
Leadership & Professional Development