2019 Catalog

Total Page:16

File Type:pdf, Size:1020Kb

2019 Catalog IT + Cyber Training 2019 Catalog Cybersecurity and IT Training By 2020, 75 percent of organizations will experience visible business disruptions due to skills gaps in infrastructure and operations.* Our mission is to close that skills gap. Focused on the transformative power of education, CyberVista provides premium cybersecurity and IT training for developing the workforce—both individuals and organizations. Through comprehensive training, organizations can better develop human capital, acquire the best talent, and prepare to respond to today’s evolving threats. By bringing Kaplan IT Training, formerly Transcender, and its 25 years of IT training into our portfolio, we now offer a comprehensive offering to deliver on our promise to strengthen technical job skills with the highest quality learning and exam preparation products and address the workforce need from both the employer and practitioner perspectives. We understand the challenges facing today’s large organizations. We work with government and enterprise organizations, from entry-level to the board, to offer flexible and effective training programs. cybervista.net/enterprise * Source: csoonline.com 2 | cybervista.net A Message From Our CEO Our company was founded to help solve a big problem—the cybersecurity competency gap. As a company that evolved from education juggernaut Kaplan, CyberVista’s DNA is that of an education company first and foremost. We help build skills and provide quality training to all cybersecurity and IT professionals. One way we do this is through our Certify certification preparation courses. We ensure that students not only pass their cert exams, but also have learned the underlying know-how and are ready to apply it to their trade. Our Advance program redefines what it means to operate a high- performance cyber team through constant talent analytics and skills interventions. We help organizations hire, upskill, promote, and retain their security teams. Cybersecurity has more than a cyber practitioner skills problem. Our Resolve programs help fill the cyber competency gap in the boardroom and the executive suite. We teach cyber risk as an enterprise risk from the business perspective, and do so in a Amjed Saffarini | CEO, CyberVista practical way that assures an immediate shift to greater cyber resilience. We understand that working in businesses impacted by old cyber threats one minute and previously unknown ones the next requires constantly shifting the resilience playbook. However, most training programs are delivered in rigid fixed lengths and in-person modalities that are blunt instruments requiring massive employee downtime. Our modular practitioner and executive programs flex with the needs of your firm, and our multiple delivery modalities—ranging from live and in-person to online and on-demand —guarantee the easiest to deploy use of your employees’ time with us. We look forward to partnering with you and your organization. Sincerely, Amjed Saffarini | CEO, CyberVista Table of # | Resolve Contents # | Certify Cyber # | Certify IT # | Advance cybervista.net | 1 Contact us for more information on CyberVista’s Resolve programs [email protected] cybervista.net/resolve 2 | cybervista.net Board and Executive Cybersecurity Programs CYBERVISTA RESOLVE Today’s complex, cyber-insecure world requires boards and executives to think critically about the significant cyber issues facing their organizations. At CyberVista, we understand the unique roles, viewpoints, and responsibilities of boards, executives, and corporate leadership. Cyber risk, when well understood and aligned to your leadership role, can be mitigated as part of an organization’s broader enterprise risk management program. We offer a variety of programs to help you and your team increase their cyber literacy to confidently make decisions. Actionable Flexible Every participant leaves Resolve seminars We know your time is valuable. We offer programs with actionable takeaways that articulate the designed to work around your busy schedule. organization’s greatest cyber risks, its overall risk tolerance, and associated controls. Empower Specific Review our options for cyber risk seminars, executive Resolve seminars are designed to be specific to the cybersecurity awareness training, deep-dive sessions, respective roles that board and executive leaders and cyber breach simulations to determine which fulfill in a wide variety of organizations. options best serve your organizational needs. Confidential Cyber Governance Framework Select program options can be delivered on-site CyberVista’s Cyber Governance Framework provides at a location of your choosing. Specific information a structured approach for senior leaders. Our regarding your organization can be addressed framework is the amalgamation of cybersecurity directly and with discretion. frameworks and enterprise risk processes. Our training is also aligned to the FAIR Model and is Prepare endorsed by the FAIR Institute. Today’s most cyber resilient companies understand the business implications and nuanced cyber risk issues that affect their strategy, operations, stakeholders, and their bottom line. Role Specific Awareness Our cyber risk training is designed with business leaders in mind: Board of C-Suite Chief Information Business Unit Functional Directors Executives Security Officers Leaders Managers cybervista.net | 3 ON-DEMAND CyberVista Resolve IN-PERSON Cyber Risk Seminars LIVE ONLINE Holistic Cyber Training for Senior Leaders This executive-focused program provides senior leadership with Primary Objectives the knowledge necessary to understand, monitor, and manage • Understand cyber risk and the necessary executive actions to cyber risk as well as help meet compliance requirements. properly oversee it. CyberVista’s Cyber Risk Seminars help board directors, executives, • Implement best practices that aid leadership and and other senior leaders get up to speed, individually or as a team, organizations with risk decisions around cybersecurity legal on enterprise-wide cyber risk issues and actions. The program and regulatory issues (compliance). quickly increases leadership knowledge and confidence when • Keep apprised of cyber risk issues that have broader business making risk decisions for their organizations. implications. • Confidently tackle cyber risk. CyberVista uses relevant case studies and examples to guide an interactive dialogue that results in leaders articulating the Seminar Features: most critical aspects of their business prioritizing identified • 1.5 – 3 hours in length cyber risks, evaluating policies and controls to reduce those • Includes CyberVista Resolve workbook risks. To contextualize specific learning points, we will give you • Key questions & recommended actions a comprehensive cyber risk manual that contains key questions, • Incorporates case studies, role specific guidance, actionable tools, and content specifically focused on an and dynamic exercises executive audience. • Customized to your organization by aligning your specific cybersecurity policies, controls, and strategy into the training Cyber Governance Framework PREPARE / Assess Cyber Risk: We provide engaging content that Our Cyber Governance Framework provides a structured helps leadership identify relevant cyber risk scenarios and measure approach for senior leaders to view and manage cyber risk. the amount of risk associated with each. Our framework is the amalgamation of familiar enterprise risk management processes and the National Institute of Science & MONITOR / Maintain Cybersecurity Controls: This unit empowers Technology’s Cyber Security Framework (NIST-CSF). Likewise, this senior leaders to implement effective controls that help manage program also adheres to the FAIR standard, the only international cyber risk across people, process, technology, and environment. standard Value at Risk (VaR) model for quantifying cybersecurity and operational risk. Our approach simplifies cyber risk concepts REACT / Respond to a Crisis: By centrally focusing decisions across three main units: Prepare, Monitor, and React. Our training around enterprise risk themes and actions, this unit acts as a is deliberately sequenced in a manner that scaffolds the learning construct when navigating and planning for management of a process, making cyber risk issues easier to comprehend, govern, cybersecurity crisis from the executive perspective. and manage. 4 | cybervista.net CyberVista Resolve Cyber Risk Seminars Holistic Cyber Training for Senior Leaders Digital Cyber Risk Seminars: Included Resources CyberVista’s digital program is designed to be more than just a • Access to a digital learning management system available course, it’s a comprehensive resource comprised of 20+ relevant through any computer, iPad, tablet, or smartphone modules—covering everything from cyber’s role in M&A to CISO • High-quality, digestible video modules of 5-10 minutes in evaluation. Senior leaders use the program on an ongoing basis length to help oversee cyber risk and meet compliance requirements. • Bonus subject matter expert (SME) video interviews • Downloadable materials (PDF format) such as case studies, worksheets, recommended actions, key questions, and a cybersecurity glossary • Monthly executive-focused newsletters and video briefings tied to current events CyberVista Resolve Learning CyberVista Resolve Management System Mobile Experience After going through this program, I can go back to my boards and really engage at a different level. — Jean Birch CHAIRMAN,
Recommended publications
  • Provide Your Students with a Competitive Advantage
    Kaplan Credegree™ Provide your students with a competitive advantage The Kaplan Credegree is designed to enhance the job readiness and marketability of college students by partnering the traditional four-year degree program with Kaplan’s educational programs. This allows students to complete their four- year degree while also earning industry-recognized credentials that are highly valued by employers. The Kaplan Credegree appeals to employers Although the traditional academic experience creates a solid foundation for students, a recent Gallup study on higher education found that only 11% of business leaders strongly agree that college graduates are well- prepared for success in the workforce.* Considering that a more knowledgeable student has greater appeal to potential employers, it’s not surprising that a 2019 Quest Research Group survey found over 70% of respondents agreed that a Kaplan Credegree would help college students to have a more well-rounded education and overall skill set.** Universities also benefit from offering Kaplan Credegrees Right now, only 3% of institutions are making a major investment in alternative credentialing programs but 74% are at least experimenting.*** Kaplan works with universities to develop a customized mix of credential programs based on what makes the most sense for their respective degree programs and student needs. Universities that offer Kaplan Credegrees can benefit by: • Positioning graduates more effectively for future careers. • Increasing the tangible and perceived value of a graduate’s degree
    [Show full text]
  • Security Certifications - 2016 Security Certifications
    Security Certifications - 2016 Security Certifications Roy Gertig, CISSP SSCP CISA CISM Security+ SCSecA NSA-IAM/IEM PMP Project+ ITILv3 SSGB CVE4.0 TCC SCSA CIW-Pro Linux+ LPIC-1 SUSE-CLA Storage+ Server+ A+ N+ iNet+ CDIA+ Information current as of July 2016 © SAIC. All rights reserved. Disclaimer • The acronyms used throughout this presentation are either “registered®” or “trademarked™” and are a product of their respective companies • This presentation covers a multitude of certifications, but by no means is all inclusive • This presentation is to be used as a resource and the links throughout work as of today 3 S A IC.c om © SAIC. All rights reserved. | SAIC Communications Agenda • (ISC)2 and Test Builds • Government and Information Assurance • Overview of Security Certifications • Have some fun 4 S A IC.c om © SAIC. All rights reserved. | SAIC Communications First, a story • Reminiscence 5 S A IC.c om © SAIC. All rights reserved. | SAIC Communications What do these have in common? IRS / IG 6 S A IC.c om © SAIC. All rights reserved. | SAIC Communications Answer We’re here to help! 7 S A IC.c om © SAIC. All rights reserved. | SAIC Communications What do these have in common? (ISC) 2 / IRS 8 S A IC.c om © SAIC. All rights reserved. | SAIC Communications Answer They both want your money! 9 S A IC.c om © SAIC. All rights reserved. | SAIC Communications (ISC)2 Banquet . Workshop Timetable – Starts on a Friday AM, ends Sunday PM . NDA – 24 month limitation – Possible loss of CPE and Certs . Why hold workshops – Several times a year to update and refresh item test bank 10 S A IC.c om © SAIC.
    [Show full text]
  • Provide Your Students with a Competitive Advantage
    Provide your students with a competitive advantage. The Kaplan Credegree™ is designed to enhance the job readiness and marketability of college students by partnering the traditional degree program with Kaplan’s educational programs. This allows students to complete their degree while also earning industry-recognized credentials that are highly valued by employers. The Kaplan Credegree™ appeals to employers. Considering that a more knowledgeable student has greater appeal to potential employers, it’s not surprising that a 2019 Quest Research Group survey found over 70% of respondents agreed that a Kaplan Credegree would help college students to have a more well-rounded education and overall skill set.* Universities also benefit from offering Kaplan Credegree. Right now, only 3% of institutions are making a major investment in alternative credentialing programs but 74% are at least experimenting or have shown interest in alternative credentials.† Kaplan works with universities to develop a customized mix of credential programs based on what makes the most sense for their respective degrees and student needs. Universities that offer Kaplan Credegree can benefit by: • Positioning graduates more effectively for future careers • Increasing the tangible and perceived value of a graduate’s degree • Creating a consistent pipeline of work-ready graduates • Being positioned for corporate partnerships through the additional breadth and depth of offering * “Credegree Concept Survey,” Quest Research Group, December 12, 2019 † “The Changing Landscape of Online Education (CHLOE): Behind The Numbers,” CHLOE 3 Report, 2019 Why Kaplan? For over 80 years, Kaplan has been a trusted partner and provider of forward-thinking educational training programs. We offer programs for more than 80 different industry-recognized credentials and across a continually expanding portfolio of career tracks.
    [Show full text]
  • Robert Scocca Resume
    ROBERT SCOCCA [email protected] | https://robertscocca.com/ Technical Skills ● Internal network, External network, Web Application, Wireless and Active Directory pentesting ● Kali Linux, Metasploit, Nessus, Burp-Suite, Nmap, SQLmap and Wireshark ● Malware analysis and exploit development experience with Immunity Debugger and Ollydbg ● Installing and using Debian, CentOS, Windows XP, 7, 10, Windows Server and other systems ● Linux administration, Virtual Private Servers, Web hosting, VMware and Virtualbox ● Python, Bash, Powershell, C, C++, and Javascript Experience Cosaint Cyber · Remote - Cyber Security Intern May 2021 – Present ● Static and dynamic Malware Analysis of ransomware,Linux administration and Assembly coding. Trilogy · Remote - Technology Tutor April 2021 – Present ● Support students in learning cyber security related topics such as pentesting and linux Administration Anjolen · Utica, NY - Cyber Security Technician October 2020 – Present ● Vulnerability Scanning, report writing, technician services, IT and Help desk services. ● Penetration Testing including Web application, External and Internal network pentesting. Utica College · Utica, NY - Research Assistant February 2021 – Present ● Researching digital forensics for designing a practical course for law enforcement. ● Building information security capture the flag competition and designing CTF challenges. Utica College · Utica, NY - Teachers Assistant August 2019 – August 2020 ● Inspired students during classes and in using ethical hacking tools and writing reports.
    [Show full text]
  • DIR Course PDF for Website
    Texas Department of Information Resources (DIR) 101001001001010101010 101010010101010010101 100010101010101110100 001010110100010101001 010001111010101011010 111010111000110101010 101001001001010101010001010101010111010101 101010010101010010101001010100000101001010 100010101010101110100 001010110100010101001 010001111010101011010 111010111000110101010 001010101010111010101 001010100000101001010 InfoSec Academy Learning Tree provides the training and operational management services for DIR’s InfoSec Academy. The Texas DIR InfoSec Academy provides security and education training support to state of Texas agencies and institutions of higher education. The security certification training list below and exams are included in the program: CCSP Certification - Gain a thorough understanding of the information security risks and mitigation Certified Cloud Security strategies critical to data security in the cloud with this (ISC)² Certified Cloud Professional Training and Security Professional (CCSP) training. This course covers the six domains of the ® Certification Exam Prep Official (ISC)² CCSP Common Body of Knowledge (CBK ) and prepares you to pass the CCSP exam and become a Certified Cloud Security Professional. Course 1213 • 5 Days CHFI Certification - EC-Council’s Computer Hacking Forensic Investigator (CHFI) certification Computer Hacking Forensic course outlines a detailed, methodological approach to computer forensic and Investigator Exam Prep evidence analysis, including searching and seizing, chain-of-custody, acquisition, preservation,
    [Show full text]
  • Complete Certified Ethical Hacker Prospectus
    CAREER READY EDUCATION Complete Certified Ethical Hacker Prospectus GET YOUR HANDS ON THE TECH WORLD www.learningpeople.com.au We’re proud to have been supporting and nurturing students in their professional growth since 2010. The tech world is in constant demand for people with up-to-date skills. However, pinpointing the exact skills you need to fill the skills gap can be a challenging task. We’re here to help you identify and navigate through this world of opportunities, develop a career you’re passionate about and in turn provide the tech world with more qualified professionals. We will empower you to make informed choices about your future by giving you the information and support you need to move through your journey with confidence and ease. We are here to help you get your hands “on the tech world. Careers overview 1 CompTIA A+ 3 CompTIA Network+ 5 CompTIA Security+ 7 CompTIA PenTest+ 9 CEH - Certified Ethical Hacker 11 About us 13 Why choose us? 14 Student benefits 15 Supporting you 16 Why online learning? 18 FAQs 22 Connect with us 23 Contact us 24 Cyber Security Our cyber security courses provide you with the teaching and certifications that are necessary to be a successful security professional. The qualifications are some of the best in the industry and all stand out as the most widely recognised when it comes to dealing with cyber security issues within a business. People who will significantly benefit from this collection are security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure of an organisation.
    [Show full text]
  • WG1, State of the Art Syllabus: Overview of Existing Cybersecurity
    STATE OF THE ART SYLLABUS Overview of existing Cybersecurity standards and certification schemes v2 WG1 – Standardisation, certification, labelling and supply chain management DECEMBER 2017 ECSO State of the Art Syllabus v2 ABOUT ECSO The European Cyber Security Organisation (ECSO) ASBL is a fully self-financed non-for-profit organisation under the Belgian law, established in June 2016. ECSO represents the contractual counterpart to the European Commission for the implementation of the Cyber Security contractual Public-Private Partnership (cPPP). ECSO members include a wide variety of stakeholders across EU Member States, EEA / EFTA Countries and H2020 associated countries, such as large companies, SMEs and Start-ups, research centres, universities, end-users, operators, clusters and association as well as European Member State’s local, regional and national administrations. More information about ECSO and its work can be found at www.ecs-org.eu. Contact For queries in relation to this document, please use [email protected]. For media enquiries about this document, please use [email protected]. Disclaimer The document is intended for reference purposes by ECSO WG1 and is allowed to be distributed outside ECSO. Despite the authors’ best efforts, no guarantee is given that the information in this document is complete and accurate. Readers of this document are encouraged to send any missing information or corrections to the ECSO WG1, please use [email protected]. This document integrates the contributions received from ECSO members until October 2017. Cybersecurity is a very dynamic field. As a result, standards and schemes for assessing Cybersecurity are being developed and updated frequently.
    [Show full text]
  • Comptia Project+ Cert Guide: Exam PK0-004
    CompTIA Project+ Cert Guide Robin Abernathy 800 East 96th Street Indianapolis, Indiana 46240 USA CompTIA Project+ Cert Guide Editor-in-Chief Copyright © 2018 by Pearson Education, Inc. Mark Taub All rights reserved. No part of this book shall be reproduced, stored in Product Line Manager a retrieval system, or transmitted by any means, electronic, mechanical, Brett Bartow photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the Acquisitions Editor information contained herein. Although every precaution has been taken in Michelle Newcomb the preparation of this book, the publisher and author assume no respon- Development Editor sibility for errors or omissions. Nor is any liability assumed for damages Robin Drake resulting from the use of the information contained herein. ISBN-13: 978-0-7897-5883-5 Managing Editor ISBN-10: 0-7897-5883-0 Sandra Schroeder Library of Congress Control Number: 2017944115 Senior Project Editor Printed in the United States of America Tonya Simpson First Printing: July 2017 Copy Editor Robin Drake Trademarks All terms mentioned in this book that are known to be trademarks or ser- Indexer vice marks have been appropriately capitalized. Pearson IT Certifi cation Publishing Works, Inc. cannot attest to the accuracy of this information. Use of a term in this book Proofreader should not be regarded as affecting the validity of any trademark or service mark. Gill Editorial Services Technical Editor Warning and Disclaimer Ann Lang Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fi tness is implied.
    [Show full text]
  • A Guide to Cyber Security Career Development
    A GUIDE TO CYBER SECURITY CAREER DEVELOPMENT DIGITAL WORLD SHAPE IT Looking to upskill your knowledge and climb up the Cyber Security ladder? Confused by the industry certifications landscape and trying to decide which one is right for you? Check out our handy guide to Cyber Security Professional Certifications currently available in Scotland (as of June 2019) Cyber Cyber Cyber Cyber Cyber Cyber Security Cyber Cyber Forensic Security and Security Security Security Security Security Project Security Security DevSecOps Computer Incident Penetration Risk Compliance Security Analyst Architect Engineer Instructor Manager Manager Researcher Technician Developer Analyst Responder Tester Adviser Auditor Consultant • CASP+ • CASP+ • CASP+ • CASP+ • EC-Council • CASP+ • CREST Certified • CASP+ • (ISC)2 CISSP • GCTI • CREST Certified • CREST Certified • CASP+ • (ISC)2 CISSP • (ISC)2 CISSP • CREST • CCIE Security • CCIE Security • (ISC)2 CISSP CCISO • (ISC)2 CISSP Malware Reverse • (ISC)2 CISSP • GNFA Network Simulated Attack • ISACA CISA • ISACA CISA • ISACA CISA EXPERT Certified Threat • (ISC)2 CISSP • (ISC)2 CISSP • ISACA CISA • (ISC)2 CISSP Engineer Intrusion Analyst Manager • ISACA CISM • ISACA CISM (5+ YEARS’ Intelligence • ISACA CISM • ISACA CGEIT • (ISC)2 CISSP • CREST Certified EXPERIENCE) Manager • ISACA CISM • GCTI Incident • (ISC)2 CISSP Manager • CREST • CREST • CCNP Enterprise • CCNP Security • GSLC • GCPM • GREM • CCNP Enterprise • (ISC)2 CSSLP • GASF • CREST • CREST Certified • ISACA CRISC • GCCC • CCNP Security Registered Registered
    [Show full text]
  • Mohamed M. Abdulazeez It Network Engineer
    MOHAMED M. ABDULAZEEZ IT NETWORK ENGINEER CCNP R&S, CCNA R&S, CCNA CYBER OPS, CCNA SECURITY, CCNA ACADEMY, CISCO IT ESSENTIAL, CompTIA Security+, CompTIA N+, CompTIA A+, NGD LINUX Essentials, NGD LINUX Series, LINUX Unhatched, Linux LPI, IT For Business. Mohamed Mazen Abdulazeez Roya Towers, EDUCATION Erbil (2008 – 2011) +964 770 882 8800 BACHELOR OF COMPUTER ENGINEERING [email protected] DIJLA UNIVERSITY COLLEGE, BAGHDAD linkedin.com/in/mmazen Baghdad, Iraq My study included application and academic courses. RESUME SUMMARY EXPERIENCES “Experienced IT Engineer with vast IT knowledge. Skills include (2015 -2020) security, computer networking, analytical thinking and creative IT NETWORK ENGINEER problem solving. Able to apply CENTRAL BANK OF IRAQ customer service concepts to IT Baghdad, Iraq to improve user experience for • Network Administration, Maintenance and Security over network clients, employees and devices and servers. administration.” • Banks and customers evaluation for security and standard achievement. SKILLS • Support for infrastructure and employees. WORK (2015 - 2015) NETWORK IT NETWORK ENGINEER SERVERS TALIA LIMITED VERTUALIZATION Baghdad, Iraq LINUX • Team leader and IT Engineer. • VSAT systems install and maintenance. SECURITY • CCTV Installation and maintenance. • Server and LAN Administration. PERSONAL • Documentation and reporting. COMMUNICATION (2014 - 2015) ORGANIZATION IT NETWORK ENGINEER TEAM PLAYER CREATIVITY ATLAS FOR GIS AND SURVEYING SYSTEMS Baghdad, Iraq SOCIAL • Team Leader and IT Engineer. • Network installation and maintenance. LANGUAGES • Training for employees and customers. • Working on Iraqi National ID Project as Engineer Team lead. • Arabic: Mother Tongue. • Software and Hardware Engineer. • English: Work Proficiency. • Security and Server Admin. • Turkish: Primary Level. FREELANCE PROJECTS • QUMMIT AMOOD ENGINEERING MOHAMED IT Support Engineer • ALRAJIH TRAINING CENTER IT Support Engineer M.
    [Show full text]