Certification Programs



Similar documents
Certification Programs

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

What Directors need to know about Cybersecurity?

Top 10 Baseline Cybersecurity Controls Banks Aren't Doing

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

INFORMATION SECURITY FOR YOUR AGENCY

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Information Systems Security Certificate Program

Analysis One Code Desc. Transaction Amount. Fiscal Period

InfoSec Academy Pen Testing & Hacking Track

LINUX / INFORMATION SECURITY

Case 2:08-cv ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

The Protection Mission a constant endeavor

CYBERSECURITY HOT TOPICS

Cybersecurity. WBA Bank Executives Conference February 2 4, 2015 Milwaukee, WI

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

InfoSec Academy Application & Secure Code Track

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

SECURITY CONSIDERATIONS FOR LAW FIRMS

Get on First Base with your Regulators and Cyber Security

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Summary of the State of Security

EC-Council Certified Security Analyst (ECSA)

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

InfoSec Academy Forensics Track

INFORMATION SECURITY TRAINING CATALOG (2015)

Vinny Hoxha Vinny Hoxha 12/08/2009

Access FedVTE online at: fedvte.usalearning.gov

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Information Security solutions that protect your business

Hackers are here. Where are you?

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Versus Certification Training 2016 Guideline of Versus Technical Education Courses

Critical Controls for Cyber Security.

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

CAST Center for Advanced Security Training

CYBER SECURITY TRAINING SAFE AND SECURE

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Deep Security Vulnerability Protection Summary

Data Security for the Hospitality

Vulnerability Assessment & Compliance

PCI-DSS Penetration Testing

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Incident Response. Proactive Incident Management. Sean Curran Director

EC Council Certified Ethical Hacker V8

CSIS Academy Be Better

On Demand Unlimited Network Vulnerability Scanning. February 2013

Cisco & Big Data Security

What is Management Responsible For?

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Cybersecurity Governance Update on New FFIEC Requirements

Accenture Cyber Security Transformation. October 2015

Practical Steps To Securing Process Control Networks

AgriLife Information Technology IT General Session January 2010

CURRICULUM VITAE. Kodzo Gadzekpo ADOMEY

Security Training-as-a-Service (STr-aaS) Service Details & Features

Ashley Institute of Training Schedule of VET Tuition Fees 2015

McAfee Endpoint Protection Products

White Paper: Consensus Audit Guidelines and Symantec RAS

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Dealing with Big Data in Cyber Intelligence

Academic Calendars. Term I (20081) Term II (20082) Term III (20083) Weekend College. International Student Admission Deadlines

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

Principles of Information Assurance Syllabus

SANS Top 20 Critical Controls for Effective Cyber Defense

Compliance Services CONSULTING. Gap Analysis. Internal Audit

The fast track to top skills and top jobs in cyber. Guaranteed.

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Increase insight. Reduce risk. Feel confident.

Technology Risk Management

Digital Forensics Department Report Submission Date: 08 th March 2009

Walton Centre. Document History Date Version Author Changes 01/10/ A Cobain L Wyatt. Monitoring & Audit

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...

Hackers are here. Where are you?

Penetration testing & Ethical Hacking. Security Week 2014

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Cyber Security Metrics Dashboards & Analytics

2175 K Street NW, Suite K Street, NW, Suite 320 Phone: Phone: bobburke@gwu.edu

Table of Contents. Introduction. Audience. At Course Completion

Domain 1 The Process of Auditing Information Systems

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

New PCI Standards Enhance Security of Cardholder Data

Cybersecurity: Protecting Your Business. March 11, 2015

CRYPTOGEDDON: HEALTH CARE COMPROMISE. Todd Dow, CISA, PMP Founder,

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

2016 TÜBİTAK BİLGEM Cyber Security Institute

Transcription:

Certification Programs 2014

The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security threats. The certification programs offered by the institute are uniquely designed to address community banking needs, using community banking problems and solutions. Properly trained banking professionals will improve the security around customer data and other sensitive information entrusted to them. The certification communicates to management, the board, stakeholders, and examiners, that a professional can perform the necessary functions to manage and reduce risk to the bank. -1-

Dr. Kevin Streff Co-founder of SBS Institute Founder of Secure Banking Solutions Founder of InfraGard South Dakota Director of the Center for Information Assurance at Dakota State University Chad Knutson Co-founder of SBS Institute Co-founder Secure Banking Solutions VP SBS Institute Master of Science in Information Assurance with an emphasis in Banking & Finance Security CISSP, CISA, & CRISC certified Jon Waldman Co-founder of SBS Institute Co-founder of Secure Banking Solutions Senior Information Security Consultant Master of Science in Information Assurance with an emphasis in Banking & Finance Security CISA & CRISC certified -3-

Dr. Ashley Podhradsky Assistant Professor & MS Information Assurance program coordinator at Dakota State University Director of Training for BK forensic out of Philadelphia, PA Lead Forensic Investigator for Secure Banking Solutions Dr. Josh Pauli Ph.D in Software Engineering Associate Professor of Cyber Security at Dakota State University Published over 30 international journal and conference papers related to software security Author of The Basics of Web Hacking" with Syngress Publishing Invited to present at DEFCON, Black Hat Briefings, and the National Security Agency -4-

Certified Community Banking Vendor Manager The Certified Community Banking Vendor Manager Certification provides attendees with a solid foundation of theory, along with an understanding of the third party management process. There will be plenty of hands-on experience in selecting and managing vendor relationships, reviewing documentation, asking the right questions, and helping attendees make decisions regarding the risks of third party vendors, service providers, and outsourced business partners. Course Topics Vendor Breaches, Laws, and Regulations Information Security Program & Risk Assessment Selection of Vendors Ongoing Vendor Management Creating a Vendor Management Program Contract Structuring Audit & Exam Prep Who Should Attend Anyone who lives and breathes Compliance or Information Technology at small to medium-sized financial institutions will benefit from this certification. Those who have gone through the Third party Management Process and have struggled to build a comprehensive and valuable program, or professionals who are new to Vendor Management and are looking to learn about the process will especially benefit. Cost: $1,295 Online Schedule: * 12/8/2014 * 3/2/2015 * 6/1/2015 Registration: www.wyomingbankers.com Instructor: Jon Waldman -7-

Certified Community Banking Incident Handler The Certified Community Banking Incident Handler Certification includes lectures with a relevant topic related to common incidents banks face including BYOD, Incident Response Policies, CATO, Malware Analysis, Insider Threats, and data breach response. Course Topics Incident Response Overview & Regulations Incident Response Policy Preserving Evidence & Data RAM Acquisition Corporate Account Take Over Data Breach Insider Threats Who Should Attend Anyone with an interest in incident response and computer forensics will benefit from this course. Because the course requires very few prerequisites, it is ideal for beginners. However, the course pace is fast, and the knowledge is cumulative. Upon completion of the course attendees will have the ability to perform basic forensic imaging of hard drives and RAM. Cost: $1,295 Online Schedule: * 1/5/2015 * 5/18/2015 Registration: www.wyomingbankers.com Instructor: Dr. Ashley Podhradsky -8-

Certified Community Banking Ethical Hacker The Certified Community Banking Ethical Hacker Certification provides attendees with a solid foundation of theory and understanding along with plenty of keyboard experience in running the tools and interpreting the results of penetration testing and ethical hacking. Course Topics -9- A four step process including OSINT (Information Gathering) Scanning Exploitation Post Exploitation How attackers leverage the web Port scanning, fingerprinting, and versioning techniques Vulnerability Scanning with Nessus Exploitation and privilege escalation utilizing John the Ripper Exploitation with Metasploit Exploiting the human by hacking users Post exploitation with meterpreter Who Should Attend Anyone with an interest in hacking and penetration testing will benefit from this course. Because the course requires very few prerequisites, it is ideal for beginners. However, the course pace is fast, and the knowledge is cumulative. Upon completion of the course, attendees will have the ability to perform basic network assessment and the capability to perform multi-tool attacks similar to many attackers today. Cost: $1,295 Online Schedule: * 12/1/2014 * 4/6/2015 Registration: www.wyomingbankers.com Instructor: Dr. Josh Pauli

Certified Community Banking Technology Professional This Certified Community Banking Technology Professional Certification program provides a deep dive into critical components of an information security program to explore the technical design and implementation of security controls. The topics included in this program are critical to the successful implementation of an information security program, and will explore how they are all tied together. An understanding of risk management, documentation, and auditing will be explored in addition to possible solutions, implementation approaches, and technical considerations and configurations. Course Topics -10- System Hardening Penetration Testing Vulnerability Testing Patch Management Social Engineering Testing Perimeter Security Network Security Endpoint Security Mobile Device Management Data Backup & Replication Incident Response Procedures Who Should Attend The CCBTP certification is specially designed to benefit any professional working with information technology and security who is looking to explore and understand technical security controls, as well as learn how to utilize these controls within their institution. Bankers who are regularly involved in implementing, managing, or auditing technology controls will expand their knowledge level with this technical course, along with learning about useful tools to mitigate risk in their institution s. This course has hands on labs, technical demonstrations, and lectures explaining how security controls work. Cost: $1,295 Instructor: Chad Knutson Online Schedule: * 10/6/2014 * 1/12/2015 * 4/20/2015 * 7/6/2015 Registration: www.wyomingbankers.com

Certified Community Banking Board of Directors In the Certified Community Banking Board of Directors Certification, directors will learn the key elements of each critical component of an information security program. Understanding the results of risk assessment and audits will assist directors in asking the right questions, and providing informed directives. This certification program is customdeveloped for the unique backgrounds and needs of directors, to fill in the gaps around technology, information security and fraud concepts to protect the director, and to enhance their ability to perform their duties as a member of the board. Course Topics Risk Management Policy & Procedures Audit Programs Who Should Attend This course is designed for current directors of a financial institution, or people looking to moving into a director s position in the future. A background in information technology or information security is not required. This certification will prepare a director to make informed decisions regarding technology and security responsibility at their institution. Cost: $1,295 Online Schedule: * 10/20/2014 * 2/9/2015 * 6/8/2015 Registration: www.wyomingbankers.com Instructor: Dr. Kevin Streff -11-

Certified Community Banking Security Professional The Certified Community Banking Security Professional Certification program will enhance each attendee s skill set and knowledge base in the areas of information security to better demonstrate their abilities for risk management, information security program development, and auditing. It provides a framework for the entire information security program and demonstrates how to manage each component to ensure successful implementation with attendees' institutions. This program is a comprehensive set of curriculum that will assist any decision maker who participates in managing and guiding the information security program; it s not just for the Information Security Officer. Course Topics IT Risk Assessment IT Audit Enterprise Risk Management Third Party Risk Management Emergency Preparedness Security Awareness Programs Network Security Network Assessments Supporting Diagrams Social Engineering U.S. Information Security Running an effective Audit -12- Laws & Regulations Committee Preparing for your IT Layered Information Security Examinations Running an effective IT Committee Who Should Attend Programs This course is specifically designed to benefit any professional working with Information Technology and Information Security who has a direct responsibility for information. Additionally, those who support these individuals or serve on IT or Audit Committees can expand their understanding of security and help direct their institution s activities in improving their security program. Cost: $1,295 Online Schedule: * 11/3/2014 * 2/2/2015 * 5/4/2015 Registration: www.wyomingbankers.com Instructor: Chad Knutson

How are the courses delivered? Certifications can be delivered as both an Onsite and Online program depending on attendance and your specific needs. Online Programs includes: Kickoff Packet (1 week prior to start date) Welcome Letter Program Participation Instructions Printed Copy of Lecture Materials and Exercises List of required items for the program (hardware, software, etc.) Necessary configurations, files, or environments for labs and exercises 7 modules per certificate, each a 2 hour lecture, suggest that students complete one module per week Following the completion of the modules, students will be provided with a 100 question examination Student access to the program terminates 10 weeks from kickoff Online Program Schedule: 2014/2015 Schedule: Certs. CCBSP CCBTP CCBVM CCBIH CCBEH CCBBD Freq. Ev. 3 mo Ev. 3 mo Ev. 3 mo Ev. 4 mo Ev. 4 mo Ev.4 mo Aug 8/4 8/11 Sep 9/15 9 /8 Oct 10/6 10/20 Nov 11/3 Dec 12/8 12/1 Jan 1/12 1/5 Feb 2/2 2/9 Mar 3/2 Apr 4/20 4/6 May 5/4 5/18 Jun 6/1 6/8 Jul 7/6-13-

Certification Process: Students will be required to complete the following to become certified: Participate in all modules Complete lab exercises Pass the examination Maintaining the Certification: Certified professionals must complete the following to maintain the certification: Pay an annual membership fee of $295. $100 per extra cert. Complete 4 hours of qualifying continuing education via the SBS Institute or Association webinars and events. -14-

Registration Questions? Please contact us directly. P.O. Box 2190 (82003) 200 East 8th Ave., #201 Cheyenne, WY 82001 Cheryl@wyomingbankers.com (307) 638-5008 Register at: www.wyomingbankers.com