Cyber Learning Solutions



Similar documents
OVERVIEW DEGREES & CERTIFICATES

Cybersecurity on a Global Scale

CyberNEXS Global Services

CAST Center for Advanced Security Training

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

Information Security Engineering

CYBER SECURITY TRAINING SAFE AND SECURE

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

Course Descriptions November 2014

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Advanced Threat Protection with Dell SecureWorks Security Services

Cybersecurity Delivering Confidence in the Cyber Domain

Introduction to Cybersecurity Overview. October 2014

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Protecting against cyber threats and security breaches

Cyber Watch. Written by Peter Buxbaum

e-discovery Forensics Incident Response

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

- 5 days (30 PDUs) ITIL V3 Intermediate Capability - Planning, Protection and Optimization... 14

CYBER SECURITY, A GROWING CIO PRIORITY

Global Headquarters: 5 Speen Street Framingham, MA USA P F

CyberSecurity Solutions. Delivering

The enemies ashore Vulnerabilities & hackers: A relationship that works

Access FedVTE online at: fedvte.usalearning.gov

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

SCADA Security Training

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Certification Programs

FREQUENTLY ASKED QUESTIONS

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Cyber Security Evolved

Contestant Requirements:

Security Intelligence Services. Cybersecurity training.

Careers in Cyber Operations. Defence Signals Directorate

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

EC-Council. Certified Ethical Hacker. Program Brochure

Cybersecurity: Mission integration to protect your assets

STUDENT LEARNING ASSESSMENT REPORT MS Cybersecurity

ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Certification Programs

Talent & Organization. Organization Change. Driving successful change to deliver improved business performance and achieve business benefits

Manned Information Security

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Getting real about cyber threats: where are you headed?

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Simulation and Training Solutions

The Next Generation of Security Leaders

(BDT) BDT/POL/CYB/Circular

Talent & Organization. Organization Change. Driving successful change to deliver improved business performance and achieve business benefits

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

EC-Council Certified Security Analyst (ECSA)

The fast track to top skills and top jobs in cyber. Guaranteed.

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Defensible Strategy To. Cyber Incident Response

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

THE CHALLENGES OF CYBERSECURITY TRAINING

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Training & Certification Allegro University

Defending against modern threats Kruger National Park ICCWS 2015

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Hackers are here. Where are you?

Technical Testing. Network Testing DATA SHEET

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

IT and Cyber Security Training Courses

Microsoft s cybersecurity commitment

WEBSENSE TRITON SOLUTIONS

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

The fast track to top skills and top jobs in cyber. Guaranteed.

RETHINKING CYBER SECURITY

Design Your Security

DoD Strategy for Defending Networks, Systems, and Data

Cyber Adversary Characterization. Know thy enemy!

Combating a new generation of cybercriminal with in-depth security monitoring

POLICIES TO MITIGATE CYBER RISK

CYBER SECURITY Audit, Test & Compliance

Information Systems and Tech (IST)

Cyber Range Training Services

Transcription:

Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog

CONTENTS The Raytheon Difference... 3 Executive Courses... 4 Manager Courses... 4 Practitioner Courses... 5 Exercise and Capstone Courses... 8 Cyber Background Series Courses... 8 Course DevelopmenT... 9 2014, Raytheon Company. All rights reserved. Federal copyright law prohibits the reproduction, distribution, public performance, or public display of copyrighted materials without the express and written permission of the copyright owner. The course materials and descriptions in this catalog are provided solely for the purpose of evaluating Raytheon s products and services for purchase by government agencies, private companies and individuals. All other uses are prohibited. 2 Raytheon Cyber Learning Solutions 2014 Catalog

THE RAYTHEON DIFFERENCE A full spectrum of solutions THE ONLY VIRTUAL FULL- SPECTRUM CYBER OPERATIONS TRAINING CAPABILITY FOR GOVERNMENT AND COMMERCIAL ORGANIZATIONS WORLDWIDE Raytheon s Cyber Operations Training curriculum stems from unmatched expertise, the kind that can only come from one of the largest training and technology organizations in the world. Raytheon delivers proven training programs and best practices across the entire cyber operations spectrum, and integrates cyber operations training into hybrid mission planning to optimize operational effects. We partner with an extensive network of industry experts to translate deep technical knowledge about the latest threats, exploitation techniques, malware and advance defensive strategies into relevant, up-to-date training. Cyber Operations Training s customizable offerings include executivelevel training, frontline mission management training, specific training for cyber practitioners, and broad-based training for the overall workforce. We address the full spectrum of topics related to cyber operations including trusted sourcing/supply chain management, software development, engineering and information assurance. Our learning environments include classroom, web-based/distance learning and mobile training teams for continuing education. Performance that s proven Raytheon s Cyber Operations Training programs are utilized within our own global workforce in order to manage computer network operations and defenses, as well as to enhance the skills and situational awareness of our personnel across multiple disciplines within the company. Benefits and a commitment that endure Raytheon is committed to building partnerships that are centered around continuous learning, so we remain engaged with customers even after formal training is complete. This ensures our customers are continually updated on new threats, vulnerabilities and best practices. We offer access to our most innovative and secure virtual platform to provide simple to complex simultaneous learning and a mechanism for up-to-date training and solutions to real time problem sets. The global training leader Raytheon Company is one of the world s largest training organizations and is responsible for some of the industry s most complex multi-year training programs. Our proven processes focus on customer requirements to address our customers most difficult challenges. Customer success is our mission and that mission never rests. Raytheon: Continuously adapts training programs and techniques to reflect new and emerging threats and operational vulnerabilities Offers secure and scalable virtual training environments to deliver exercises for multiple individual or team participants simultaneously Provides training for all members of an organization that must function as an integrated team to combat cyber operations Leverages world-class expertise to deliver solutions that are focused toward an operational perspective 3 Raytheon Cyber Learning Solutions 2014 Catalog

EXECUTIVE COURSES C100-2014-01 Cyberexecutive (1 Day) A one-day abridgement of our cyberexecutive curriculum, this course will focus on selected issues of interest to executive audiences while focusing on specific industry/organization needs. Instructional teams will work with the customer to determine the depth and range of topics. Instructor Led; 1 Day (On Site) C107-2012-01 Cyberexecutive (3 Hour) This course presents the most critical cybersecurity issues in a format and duration accessible to senior executives. The course is also ideal for larger audiences or for management retreats and conferences where a brief, fast-paced introduction to cyber is desired. Topics are presented in three, one-hour segments: 1. The Cyber Landscape 2. The Technology Threat 3. The Human Threat Instructor Led; 3 hours (On Site) MANAGER COURSES C200-2014-01 Cybermanager Course (2 Day) The cyberexecutive course provides leaders and decision makers with a detailed introduction to current issues facing industry and government in the field of cyber security and the tools to make smart decisions about an organization s vulnerabilities, risks and response posture to the most pressing and sophisticated cyber attacks. Who benefits from this course? Executives/senior managers, senior technical staff, technical and non-technical teams requiring an in-depth introduction to cyber security. What Students Will Learn Issues relating to the cyber landscape, hacker tools and techniques, human and social cyber, current events, planning and integrating cyber security into an organization. Course Outline 1. The Cyber Landscape 2. Finding Vulnerabilities 3. Getting on Networks 4. Achieving Network Effects 5. Human Cyber Techniques 6. Advanced Persistent Threats 7. Social Network Security 8. Hactivism 9. Technology Outsourcing 10. Law, Ethics and Privacy Instructor Led; 2 Days (On Site) 4 Raytheon Cyber Learning Solutions 2014 Catalog

PRACTITIONER COURSES C300-2014-01 CyberPractitioner Course (5 Day) The cyber manager s course is a week-long introduction to offensive and defensive cyber security with an emphasis on the technical fundamentals required to effectively manage cyber security professionals and operations. This course is tailored for practitioners and technically savvy managers. Who benefits from this course? Direct leaders and supervisors of IT security/cyber security/cyber operations requiring a detailed technical introduction to the domain in a one week format. What Students Will Learn Tools and techniques employed by hackers and defenders in the current cyber security landscape, as well as emerging issues related to managing cyber projects. Course Outline 1. Fundamentals of Cyber 2. Terms, Tasks and Targets 3. Using an Exploit 4. Examining Network Traffic 5. Format, System and Web Vulnerabilities 6. Network and Application Security Tools 7. Reverse Engineering 8. Human Cyber Techniques 9. Law, Ethics and Privacy 10. Cyber Resource Planning and Human Capital Management The course includes hands-on exercises culminating in a three hour Hacker Jeopardy challenge exercise. Instructor Led; 5 Days (On Site) C300-2012-01 Cyberprofessional Course Our signature course for technical practitioners, the cyberprofessional course teaches the tools and techniques used by attackers and defenders in all critical aspects of the cyber domain. The course builds on fundamentals in reverse engineering, attack techniques, and human dimensions of cybersecurity to design sophisticated attack and defense scenarios. The course culminates in a three-day capstone exercise that simulates a diversity of real-world cyber attacks. Who benefits from this course? IT security professionals seeking to hone their cyber attack and defense skills, operational cyber practitioners working in a national security context, software engineers looking to understand cybersecurity in order to develop advanced defenses Course Outline 1. Week One: Fundamentals a. What is Cyber? b. Vulnerabilities c. Security Tools and Techniques d. Reverse Engineering e. Human Cyber Techniques 2. Week Two: Applications a. Gaining Access b. Collection and Effects c. Communication and Stealth d. Counter Adversary CNO e. Forensics 3. Week Three: Advanced Topics and Exercises a. Social Cyber 5 Raytheon Cyber Learning Solutions 2014 Catalog

What Students Will Learn Hands-on techniques for attacking and defending a computer network against cyber attacks ranging from sophisticated malware to Hactivist and social engineering vulnerabilities. b. Mobile and Wireless Security c. Capstone The course includes a three day hands-on capstone experience that presents students with twenty technical challenges from all aspects of cyber. A realistic narrative based on a defense, industrial or government scenario keeps students engaged; a capture-the-flag style contest keeps them challenged to learn and have fun! Instructor Led; 15 Days (On Site) C308-2014-01 Cyberprofessional Course (Blended Learning) This course integrates our Cyberprofessional content into a blended learning approach. Students receive instruction on-site for the first and final weeks of the course. During the interim, they complete learning modules online and exercises at their own pace. The approach is ideal for students who cannot be away from their duty station for a full three week course. Instructor Led; Blended Cyberprofessional Course Outline 6 Raytheon Cyber Learning Solutions 2014 Catalog

7 Raytheon Cyber Learning Solutions 2014 Catalog

EXERCISE AND CAPSTONE COURSES Prerequisite for this course is the 3 week CyberProfessional course. C400-2014-01 Cyber Capstone Course This fast-paced, five day exercise course tests students ability to solve realistic problems in the cyber domain while competing in teams to earn points and have fun. Twenty technical challenges ranging from vulnerability discovery to insider threat detection, forensics and social network analysis are combined with a fullydeveloped narrative that allows students to play the role of an IT professional, cyber warrior or critical decision maker. Gameplay can be scaled between easy, medium and hard challenges within the same learning objectives. Who benefits from this course? Students who have completed introductory and advanced cyber training who want an exercise course to fully integrate their learning, and teams desiring a practical exercise to assess and develop their cyber skills. What Students Will Learn How to apply practical learning in a range of cyber topics to a realistic, fast-paced set of technical challenges. Technical Challenges Include: Vulnerability Discovery Reverse Engineering Incident Forensics Insider Threat Malware Social Network Analysis Crisis Response Instructor Led; Exercise; 5 Days (On Site); This course will be finalized upon customer request. CYBER BACKGROUND SERIES COURSES About Cyber Background Series Courses The national need for cyber skills cannot be not be fully met by professionals with the prerequisite knowledge and experience to proceed directly to advanced learning. Unfortunately, many entry-level certificate programs jump directly to technical application without teaching the foundational knowledge needed to succeed in the cyber domain. The Cyber Background Series provides an alternate path to this foundational knowledge for students without formal education in computer science, network security or a related discipline. These five-day, instructorled courses follow a traditional lecture, text and exercise format. 8 Raytheon Cyber Learning Solutions 2014 Catalog

C600-2014-01 Assembly Programming C600-2014-02 Binary Exploitaiton Course Format/Availability Instructor Led; 5 Day (On Site) Course Format/Availability Instructor Led; 5 Day (On Site) C600-2014-03 Phonenix C600-2014-04 Reverse Engineering Course Format/Availability Instructor Led; 5 Day (On Site) Course Format/Availability Instructor Led; 5 Day (On Site) COURSE DEVELOPMENT Instructional Design and Development Services from Raytheon Raytheon is the world s leading developer and provider of full service, integrated training solutions for government agencies and the largest commercial organizations. We have successfully managed some of the most complex training outsourcing programs in the world. We deliver a comprehensive menu of training solutions and services based on proven training expertise and processes that help our customers achieve measurable operational advantages, improved readiness and enhanced performance, while optimizing efficiencies and reducing costs. While each engagement is unique, our promise remains the same: to improve organizational performance and personnel effectiveness efficiently, cost-effectively and exponentially. Our proven value comes from our approach. Because every organization and every training challenge is different, we partner with customers to 9 Raytheon Cyber Learning Solutions 2014 Catalog

deliver solutions specifically tailored to their needs. This highly customized approach is unique to Raytheon and allows us to deliver significant, measurable and targeted results while making the most of an organization s training budget driving down costs per training event and improving training efficiency. 10 Raytheon Cyber Learning Solutions 2014 Catalog