cypher path catalog for state department

39
2011-2012 Cybersecurity Course Catalog Cyber Warfare, Cyber Terrorism, Cyber Espionage, CBRNE Cybersecurity Training

Upload: kevinrogers6489

Post on 09-Mar-2015

42 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cypher Path Catalog for State Department

2011-2012 Cybersecurity

Course Catalog

Cyber Warfare, Cyber Terrorism, Cyber Espionage, CBRNE

Cybersecurity Training

Page 2: Cypher Path Catalog for State Department

 

Cybersecurity Education

Introduction

4 Welcome Letter 5 Cypherpath HQ’s 6 Kevin Coleman BIO 7 Kevin Coleman Signature Author

Cyber Warfare , Espionage, and Terrorism Training

8 Cyber Warfare Distance Learning 9 Cyber Warfare 3 day Onsite 10 Cyber Terrorism, Emergency Services 11 Counter Terrorism CBRNE+ 12 Cyber Terrorism, Critical Infrastructure 13 Cybersecurity Assessment Tool

Cybersecurity Training

14 Role-based, Certifications, & Custom 15 Certified Information Systems Auditor (CISA) 16 Certified Information Systems Manager CISM) 17 Incident Response, Planning and Defense 18 Beyond the CISSP 19 Certified Advanced Security Practitioner 20-21 SpyOps Briefs, Certifications and Virtual Training 22-23 Agent Surefire, Immersive 3D IA learning

Are you CyberReady?

1

Page 3: Cypher Path Catalog for State Department

 

2

Monthly Advisories

24-25 Cyber Intelligence Advisory & Cyber Terrorism Review

Virtual Labs

26 Virtual Lab OnDemand Introduction 27 Lab OnDemand Benefits 28-29 Virtual lab delivery services

Learning Management Services

30-31 Precision Path Platform 32-33 Cyber Intelligence Portal (coming soon) Information

34-35 Cypherpath Learning Credits 36-37 About Cypherpath  

 

Cyber Intelligence Advisory

All students attending any courses will get free yearly subscription to the Cyber Intel-ligence Advisory. This a $289 value.

Free Offer

Page 4: Cypher Path Catalog for State Department

Greetings! The cyber threat to the United States affects all as-pects of society, business, and government, but there is neither a broad cadre of cyber experts nor an established cyber career field to build up, par-ticularly within the Federal government.

As thought leaders in the training and education in cybersecurity and technology for 20 years, we have gained the insight to clearly define the executable strategies, and resulting outcomes that produce the needed solutions to address these important questions in cybersecurity education. Over the last several years we have worked closely with the Fed-eral Intelligence community, DoD, DHS, and many other entities to formulate cybersecurity human capital plans that map to our Federal cybersecurity standards. A critical element of a comprehensive cybersecurity strategy is to have the precise people at every level to classify, assess, train, validate, and deploy defenses to reduce the risk to our nations organizations.

The Cyber Intelligence Series is comprised of rele-vant courses that focus on today’s issues while we forecast future threats to reduce organizational risk. We bring valuable and relevant insight on the latest topics in the areas of; Cyber Espionage, Cyber Warfare, and Cyber Terrorism which enables organizations to create a stronger cybersecurity posture.

Kevin Rogers President, CEO, and Founder Cypherpath

 3

Page 5: Cypher Path Catalog for State Department

About Cypherpath

Cypherpath innovation helps organizations create CyberAware and CyberReady individuals through highly effective training and education programs

4

Page 6: Cypher Path Catalog for State Department

Kevin Coleman Cypherpath Signature Author

Kevin G. Coleman is a seasoned technology executive with a compre-hensive background in cyber security. Having twenty years of success in the development and implementation of cutting-edge technology strategies, he continues to work with innovative leaders in business, government and industry on strategic issues of critical importance. Coleman served for six years as a Science and Technology Advisor to the Johns Hopkins University Applied Physics Lab, an institution known for conducting nearly $1.3 billion in advanced research on topics in-cluding Asymmetric Warfare, Cyber Warfare, Unrestricted Warfare and other areas. In addition, he has briefed executives in more than 20 countries around the world.. With strong expertise in security assessments, analysis, design, develop-ment and implementation, Coleman has built a reputation for solving strategic client’s issues in the area of enterprise security, risk manage-ment and innovation. Currently, he advises clients with combined reve-nues nearing $100 billion as well as numerous government agencies. Coleman has personally briefed over 30 boards of directors and spoken at numerous corporate and industry events. In addition, he has twice briefed U.S. STRATCOM, participated in multiple studies with them and worked on recommendations to address the cyber breach that struck the Pentagon/ CENTCOM in November of 2008. His work on cyber terrorism is highly regarded and is referenced in the U.S. Army’s Cyber Operations and Cyber Terrorism Handbook as well as their Critical Infrastructure Threats and Terrorism Handbook.

HbpmioeCwtp

Ad

5

Page 7: Cypher Path Catalog for State Department

He has testified twice before Congressional Commissions in addition to briefing over fifty members from the U.S. Intelligence Community, and has presented on cyber terrorism at the United Nations, as well as briefing nu-merous Wall Street analysts on the impact of cyber warfare on the defense ndustry. Additionally, in October of 2009 he presented at the FBI’s briefing on Cyber Espionage. He has lectured at Harvard’s Kennedy School of Gov-ernment, Senior Executive Program addressing National and International Cyber Security. Most recently, he participated in a U.S. Army War College working group exploring cyber situational awareness, cyber deterrence and the integration of cyber operations throughout the Department of Defense program.

A Kellogg School of Management Executive Scholar, Coleman has authored dozens

6

Page 8: Cypher Path Catalog for State Department

8

Page 9: Cypher Path Catalog for State Department

9

Page 10: Cypher Path Catalog for State Department

10

Page 11: Cypher Path Catalog for State Department

11

Page 12: Cypher Path Catalog for State Department

12

Page 13: Cypher Path Catalog for State Department

13

Page 14: Cypher Path Catalog for State Department

 

Ideal Training for Executives, Managers, Intelligence Officers, & Technical Experts

Role-based, Certification, & Custom Training

Benefits

Insight into domestic and international cybersecurity is-sues that affect your mission

A course curriculum specifically tailored to your organi-zations needs

Industry recognized thought leaders that can provide relevant deep dive experiences and insights to the class

Flexible length: We can deliver targeted one-day brief-ings, comprehensive week-long programs, and anything in between.

Our experts will work with you to tailor a program to

your strategic mission.

Contact Information Cypherpath Phone: 855-297-4377 21010 Southbank Street, Suite 470 [email protected] Potomac Falls, VA 20165 www.cyperhapth.com

14

Page 15: Cypher Path Catalog for State Department

Certification Training

Over 25 Courses Available

Coming Q4 2011

New Cybersecurity Role-based Training and Certifications

15

Page 16: Cypher Path Catalog for State Department

16

Page 17: Cypher Path Catalog for State Department

17

30 Hour Course

Delivery Formats

On-site Virtual Instructor-led

What You'll Learn in CISM 1. Information Security Governance 2. Information Risk Management 3. Information Security Program De-velopment 4. Information Security Program Management 5. Incident Management and Re-sponse

CISM Prerequisites Five years of experience with audit, IT systems, and security of infor-mation systems; systems admin-istration experience; familiarity with TCP/IP; and an understanding of UNIX, Linux, and Windows. This ad-vanced course also requires inter-mediate-level knowledge of the se-curity concepts covered in our Secu-rity+ Prep Course.

   

Page 18: Cypher Path Catalog for State Department

18

12 Hour Course

Delivery Formats

Virtual Instructor-led What You'll Get in IRPD Expert Level Instruction The IRPD Review Manual 2011 Reference Charts and Tables Course Related Readings Exercises to Reinforce Memory Recall

What You'll Learn in IRPD Incident Response Malware Search and Destroy Forensics Fundamentals Forensics Tool Kit

IRPD Prerequisites Systems administration experi-ence, familiarity with TCP/IP, and an understanding of UNIX, Linux, and Windows.

 

 

Page 19: Cypher Path Catalog for State Department

19

30 Hour Course

Delivery Formats

Virtual Instructor-led What You'll Get in Beyond the CISSP Expert Level Instruction The I Beyond the CISSP Review Man-ual 2011 Course Related Readings Exercises to Reinforce Memory Recall

What You'll Learn in Beyond the CISSP Risk Management

Writing and enforcing policies

Incident management

Integrated ISMS essentials

Beyond CISSP Prerequisites Five years of experience with audit, IT systems, and security of information systems; systems administration expe-rience; familiarity with TCP/IP; and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Prep Course.

Page 20: Cypher Path Catalog for State Department

SpyOps Training Briefs, Certifications, & Virtual Instructor-led Training

Spy-Ops Provides Individual Training Briefs on a variety of top-ics. Our Training Briefs provide a comprehensive and in-depth review of a topic that is directly related to current events and targeted threats. Each course takes approximately one and one half hours to com-plete and includes: A list of objectives An Abstract (note: abstracts for all available briefs are included in

this course catalog) A 6-20 page brief – which provides detailed information on the top-

ic at hand. Course summary. List of key words, and a glossary of terms. Current facts, alerts, notes, etc. that are applicable to the brief topic. Reference List A 5 question multiple choice examination. An on-line exercise to reinforce key learning objectives. Upon successful completion of the exam as well as the on-line exer-

cise, continuing education units and a certificate of completion.

 20

Page 21: Cypher Path Catalog for State Department

 SpyOps Certifications Counter-Terrorism

Corporate Crime - Business Professionals

Industrial Safety & Security Corporate Security & Safety

Personal Protection for Elected Officials

Personal Protection for Executives

Advanced Security Services

Private Investigation Services

Executive Protection Services (for use by Body Guards)

Personal Protection for Individuals

School Violence Educator Threat Awareness

Anti-Money Laundering

Un-restricted Warfare

Tradecraft 101

Computer and Information Security

Mortgage Fraud

Terrorism: Chemical - Biological - Radiation - Nuclear - Explosives

Enterprise Risk Management

Certificate in Cyber Warfare

Custom Certification Program

Specialty CD Gift Certificate 21

Page 22: Cypher Path Catalog for State Department

Protecting from the Insider Threat Imagine if you could place each employee in a virtual learning environment sceeach user has to instinctively find over 100 different vulnerabilities in an office ethat can be customized to meet your organizations needs.

Imagine that you can achieve this in day and weeks and not months. Agent suonly Information Awareness platform in the world that offers hundreds of elthe ability to tailor the platform around your organizations requirements withprogrammer.

Are you CyberR

22

Page 23: Cypher Path Catalog for State Department

enario where environment

urefire is the ements and

hout being a

Benefits

Linear learning is replaced with immersive multi-sensory learning that increases long term retention to 90% and keeps learners engaged up to 400% longer.

Custom vulnerability development with continuous injection into the platform that enhances the learn-ing experience.

We guarantee your employees will learn and retain critical IA knowledge better than any other Infor-mation awareness e-course or we will give you 100% of your money back.

Features

Multi-layer interaction within screens and monitors • The "Self-talk" narrative to increase learning retention • Musical narrative system to engage learner • User-specific action logging to keep accurate reporting • Enhanced Scoring system which enhances learning • Web-based delivery, easy to deploy • Section 508 compliant • Logging behavior for each action • Enhanced reporting capabilities • Impression counter Detailed reporting with LMS enables

organizational analysis

Ready?

23

Page 24: Cypher Path Catalog for State Department

Global Terrorism Re

24

Page 25: Cypher Path Catalog for State Department

eview & Cyber Intelligence Advisory 

Subscribe to our monthly publica ons wri en by the foremost au-thorita ve experts in the Cyber  Intelligence and Cybersecurity sector.  Our monthly publica ons are provoca ve, informing, and are wri en from a terrorist view point.  These briefs are designed to update Execu ves  on the need to know informa on.  The Cyber Intelligence Advisory is a  five minute  on the cri cal  cyber a acks facing our Na on.  The Global  Terrorism Review Is an in-depth look at the world wide treads that impact our security. 

25

Page 26: Cypher Path Catalog for State Department

Virtual Hands-On Training for Cybersecurity Enterprise Training

You, your customers and your partners no longer have the budgetrequired to train and attend live training sessions. But everyone stineeds to know how to install and use your complex enterprisproducts. Cypherpath provides automated virtual labs for hands-oaccess and granular control of complex cybersecurity and MissioCritical Operating Systems.

Not just virtual machines, but heterogeneous environments that include installation of complex devices, such as high-end networswitches, SANs, virtual tape libraries, and firewalls. Students and instructors can interact in ways not even possible in a traditional classroom, such as private student-instructor communications, or instructor control and broadcast of a student lab (not just their owdesktop).

 

Our In

Cypherpath Lab Lock Technology Guaranteed to be 100% secure

26

Page 27: Cypher Path Catalog for State Department

ts ill e n n

n-rk n-s-n-n

Are you CyberReady?

nnovative cybersecurity virtual labs require no scheduling

OnDemand whenever, wherever you need it, 24/7/365 Deliver instructor-led and self-paced training using the same equipment Globally to anyone, anytime, and anywhere Accelerate training and demo reload cycles from days to minutes Eliminate travel and equipment costs Scheduled in advance or on-demand Fully automated provisioning and reset Lab delivery that scales from 1 to 10,000 concurrent labs

v

Request your free login today www.cypherpath.net [email protected]

27

Page 28: Cypher Path Catalog for State Department

Instructor-Led

Cypherpath has the ability to schedule one-to-many remote complex hardware training sessions, with granular level control of physical de-vices. Multiple instructors in a single lab do not need to be co-located. Level of collaboration can be managed dynamically by the instructor. For example, an instructor can control and share a students' lab with the entire class during a session, or instructors can monitor a student's progress unobtrusively using "over the shoulder" tools.

Self-Paced

Students can independently access labs between or after training ses-sions for additional practice. These sessions can be initiated ad hoc by the student, but the duration can be constrained by the trainer if re-quired. Self-paced training is offered over the web to enable self-paced learning.

Customization Need to deploy your own labs? Use the Cypherpath Lab OnDemand Platform to build and launch your own labs. We offer two levels of lab deployment; Level One Customization– A learning sandbox with your lab images hosted and deployed quickly and effectively. No need to invest into Hardware or critical resources. Level Two—elearning environment built with you images and lab guides are embedded into the learning. Creating the ultimate learning experience.

  

 28

Page 29: Cypher Path Catalog for State Department

Certification Tracking

Many enterprises build a profit center around policy proficiency

certification. Certification increases product adoption rates, im-

proves product visibility, and provides value for both the student

and the enterprise. Cypherpath allows you to track, record, and

report certification progress in real-time and allows you to com-

bine this data with in-house customer demographics.

Virtual Labs

29

Page 30: Cypher Path Catalog for State Department

Cyber Intelligence Portal Your single source for unclassified and sensitive information pertaining to Cybersecurity and Cyberintelligence! 

Cybersecurity and CyberIntel Portals

Headlines

Mr. KevinUS Cert inResponse

Dr. Steven Carter Forensics Expert 

Dr. Susan Jones Cybersecurity Policy Expert 

Precision Path Platform 

Your single source for unclassified and sensitive information pertaining to Cyber

My Learning        My Lab OnDemand

 

Live Lab—six server config Red Team/Blue Team  Complete by August 15, 2011 

Whitepapers, Blogs, & Wikis 

Self-paced learning Cyber terrorism using malware Complete by August 5, 2011  

Assess Cyber Competencies 

CyberIntel Analyst 

Take a virtual class Advanced Forensics September 11-13, 2011 

   

Live Lab— PenTest Live Cyber Defender 101  Complete by August 19, 2011 

Cypherpath Lab Lock Technology Guaranteed to be 100% secure

Espionage  Terrorism  Warfare   Cri cal Skills      Awareness       My Role 

30

Page 31: Cypher Path Catalog for State Department

n Klien  ncident e Expert 

Mr. Bob White Cyber Intel Analyst 

rsecurity and Cyber intelligence! 

September 11, 2011 Time: 21:05

 

 

Cypherpath’s Precision Path Learning Solu ons deliver superior 

cybersecurity training because it is: role-based, con nuous, pro-

ac ve, and validated. 

Role-based – each learner gets training, both 

knowledge and skill-based labs, that is specific to their 

job role.  

Con nuous – since cyberspace is ever changing, con-

tent and labs are con nuously updated to stay fresh 

and to deal with emerging cyberthreats. 

Proac ve – the organiza on can proac vely reach out 

to the team to assess competencies and/or role-play 

cybersecurity situa ons and keep skills well honed. 

Validated – skills and competencies are con nuously 

validated to provide the organiza on with measure-

ments on the ability of team members to perform re-

quired skills at any given  me. 

 

31

Page 32: Cypher Path Catalog for State Department

Cybersecurity and CyberIntel Portals

Headlines

Mr. KevinUS Cert inResponse

Dr. Steven Carter Forensics Expert 

Dr. Susan Jones Cybersecurity Policy Expert 

Cyber Intelligence Portal  Your single source for unclassified and sensitive information pertaining to Cyber

Espionage  Terrorism  Warfare   Cri cal Skills      Awareness       My Role 

32

Page 33: Cypher Path Catalog for State Department

n Klien  ncident e Expert 

Mr. Bob White Cyber Intel Analyst 

rsecurity and Cyber intelligence! 

CyberCop’s mission is to pro-vide individuals an ultra-secure web-based environment to pro-mote and facilitate the sharing

of sensitive information among a cohesive net-work of law enforcement, first responders, home-land defense, intel, and law enforcement related professionals from all levels of government; inter-national, federal, state, local and the private sec-tor, regardless of department affiliation and juris-dictional boundaries.

CyberCop is committed to providing a safe and secure environment where ideas can be freely ex-changed to aid individual efforts and to foster co-operative efforts in the fight against crime, terror-ism and the security of our homeland. In 2009, CyberCop passed a stringent testing and auditing by the U.S. Government demonstrating leader-ship in providing a secure collaboration platform.

Benefits

The CyberCop Portal demonstrates the potential for highly secure collaboration among users from diverse organizations without the expense and administrative burdens of VPN’s or similar securi-ty strategies. By combining the use of 256-bit U.S. Government Certified Encryption (supporting 128 bit for less capable browsers), security hardened operating environments, and tools with highly granular access controls, the portal can be se-curely accessed from organizations over which the sponsors have no systems configuration con-trol and with no need to install and maintain client software.

September 11, 2011 Time: 21:05

33

Page 34: Cypher Path Catalog for State Department

How Does it Work Don’t run out of time to meet your Cybersecurity training requirements. The 2012 year promises to be s difficult budget year. Maximize your downtime by investing in Learning credits. Learning credits can be applied towards every product, service, and solution offered by Cypherpath. You can lock in the savings today and see how easy it is to manage your team's training throughout the next 12-24 months using your learning credits. Our learning credits neverexpire! The flexibility continues with your choice of delivery options. Choose from ourexpert Instructor-led Classroom, Virtual Instructor-led Training, Labs OnDemand, or Self-Paced e-Learning delivery method. Pricing Learning Credit Value = $100.00

Invest in the Future Purchase Cypherpath Learning Credits

Quantity of Credits Investment Discount Cost per Credit

250-499 $25,000-$49,999 10% $90.00

500-999 $50,000-$99,999 15% $85.00

1000-1999 $100,000-$199,000 22% $78.00

2000+ $200,000+ 33% $67.00

34

Page 35: Cypher Path Catalog for State Department

v-

r

 

Special Year End—Purchase by August 15th and get a free 12 month subscription to the Cyber Intelligence Advisory valued at $289.00

Learning Credits can be used towards: Assessments Lab OnDemand All Cypherpath Courses Certification Testing Testing Vouchers 8570 CEU yearly subscriptions Program Management Tracking & Reporting /Continuing Education Training Post Training/Testing LMS Development Subscription services Cypherpath Course Books Custom Lab Development Agent Surefire 3D IA learning game

Maximize Year-End Training Dollars

Terms and Conditions This offer is available only to US CONUS and OCONUS personnel. Learning must be purchased between July 1, 2011 and September 30, 2011. Courses must be completed by December 31, 2012. Full payment is due upon billing. Courses are subject to availability. Cypherpath assumes no responsibility.

35

Page 36: Cypher Path Catalog for State Department

 

Who is Cypherpath?

We are a group of thought leaders that bring value to

the education & training to any individual that may suf-

fer from a cyber breach. Our thought leaders offer de-

tailed insight in Cybersecurity, Cyber warfare, Cyber ter-

rorism and Cyber espionage.

We help organizations starting with the fundamental

levels of cybersecurity and physical awareness training

leading to the development of the technical and man-

agement staffs critical knowledge, skills, and abilities.

Our Precision Path platform enables us to deliver the

right content to each individual while saving time and

money by only charging the organization for what each

individuals consume. This valuable service keeps skills

fresh and serves as valuable tool to help organizations

identify and validate their workforce. 36

Page 37: Cypher Path Catalog for State Department

Our Team & Advisory Board Our Team

Kevin Rogers, CEO and President

Art Payne, Senior VP of Sales

Brenda Oldfield, VP of Cybersecurity Programs

Matt Donlon, Director of Business Development

Rick Thompson, VP of Marketing

Greg Yerger, Director of Products and Services

Sharon Clarke, Senior Marketing Manager

Phillip Sparks, Cybersecurity SME

Dan Shoemaker, Director of Content Strategy and Delivery

Nora Roth, Accountant

Advisory Board

Miriam Browning, Rick Smith, Ken Wasnock,

Tony Matthews, Kevin Coleman

37

Page 38: Cypher Path Catalog for State Department

 

Unmanned Aerial Vehicles

Armored Vehicles

Human Intelligence Gathering Techniques

Digital Spying

Interrogation

Long Range Microphones

Biological Warfare

Chemical Weapons

Introduction to Intelligence Technology

Domestic Terrorism

Directed Energy Weapons

Digital Footprints

Secret Intelligence

Extremist Groups

Scenario Based Intelligence Analysis

Terrorism - Strategies & Tactics

Money Laundering

Information Warfare

Gang Activity

Personal Protection

Situational Awareness

Smuggling

Nuclear Weapons

International Law Warfare

Critical Infrastructure Protection

Technology Warfare

Psychological Warfare

Environmental Warfare

Cultural Warfare

Resource Warfare

Mortgage Fraud

Transient Electro-Magnetic Devices (TEDs)

Body Language

Insider Threats

Suicide Bombers

Fraud in Business

Secret Codes and Encryptions

S t llit I

Cypherpath LLC [email protected] 1-855-cypherpath

Cybersecurity Training

Are you CyberReady?

Page 39: Cypher Path Catalog for State Department