Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis, or smart and effective incident response training, we can prepare you and your team to battle the latest cyber threats and attacks. Our broad cybersecurity training portfolio was developed as a result of listening to and understanding the needs and strategic goals of enterprises across countries and aligns to government and industry-issued standards and guidelines. Based on these standards and guidelines, we have created a logically organised map of high-level security disciplines, each including competencies and relevant courses to build IT security acumen. What do you have? What s coming at you? Security Disciplines Security Disciplines Who gets in? How do you handle failures? How do you manage the lifecycle? How do you plan for failures? From skills building to certification preparation, we offer training to meet every learning level and need. The corresponding competencies and sample of courses per discipline are highlighted in this document. aetraining@globalknowledge.ae www.globalknowledge.ae 2014 Training LLC. All rights reserved.
What do you have? To protect your assets, you must first know where they are and understand how they are tracked and managed: How are they secured? Who has access to them? Are they tracked and managed? Do you have processes and procedures in place to respond and recover from a security breach quickly? Cloud Cloud Computing Essentials RSA Cloud Security Fundamentals Data Center Infrastructure Management VMware vcloud Director: Install, Configure & Manage VMware vcloud: Overview Business Analysis Essentials Virtualisation VMware vsphere: Install, Configure, Manage VMware vcenter Configuration Manager for Virtual Infrastructure Enterprise Virtualisation using Microsoft Hyper-V Red Hat Enterprise Virtualisation Virtualisation Essentials Virtual Project Management Public Key Infrastructure (PKI) Security+ Prep Course Implementing Active Directory Federation Services 2.0 Information Assurance CSFI: Cyberspace Operations Strategist and Planning Acceptance Testing for Quality Success Cyber Security Compliance & Mobility Certification & Authorization Professional Prep Information Systems Security Engineering Professional Information Assurance Overview Cloud/Virtualisation Vendor Training Citrix, VMware, AppSense, Red Hat, Cisco, Microsoft, HP, IBM Secure Coding Foundstone Building Secure Software Foundstone Writing Secure Code Understanding Web Application Security Overview Secure Application Development Seminar Secure Web Application Development Seminar Secure Software Design aetraining@globalknowledge.ae www.globalknowledge.ae 2014 Training LLC. All rights reserved.
What s coming at you? Assess your vulnerabilities, threats and risks. Work to mitigate this risk and use auditing and analysis to confirm your efforts. Humans can be your weakest link. Ensure they have received adequate training to stay one step ahead of the attack. Audit & Analysis Troubleshooting TCP/IP Networks with Wireshark CISA Prep Course CISM Prep Course Information Systems Security Engineering Professional Visualise, Prioritise and Secure your Network Cybersecurity Investigations and Network Forensics Analysis: Practical Techniques for Analysing Suspicious Network Traffic ITIL Service Capability: Operational Support and Analysis Risk Assessment and Mitigation Certified Authorization Professional Information Systems Security Engineering Professional RSA Archer Administration Risk Management Deploying Cisco ASA Firewall Solutions Implementing Cisco Intrusion Prevention System Cyber Security Compliance & Mobility Foundstone Risk Assessment Principles and Practices Threat Assessment CEH - Certified Ethical Hacker CHFI - Computer Hacking Forensic Investigator Cybersecurity Investigations and Network Forensics Analysis: Practical Techniques for Analysing Suspicious Network Traffic Practical Techniques for Analysing VoIP Traffic Practical Techniques for Analysing Wi-Fi Traffic Vulnerability Assessment Wireless LAN Security and Analysis Advanced VoIP: Securing UC Networks Foundstone Building Secure Software Foundstone Writing Secure Code Social Engineering Social Media Security Professional Social Media Engineering & Forensics Professional Social Media Management & Governance Professional Security+ Prep Course Cybersecurity Foundations Cyber Security Compliance & Mobility aetraining@globalknowledge.ae www.globalknowledge.ae 2014 Training LLC. All rights reserved.
Who gets in? Control who has access by locking down your systems, including hosts, networks, applications and data flows. Communication Security Advanced VoIP: Securing UC Networks Wireless LAN Security and Analysis Troubleshooting TCP/IP Networks with Wireshark SIP Protocol Essentials Cisco Secure System Deploying Cisco ASA VPN Solutions Cisco Advanced SSL VPN Dell SonicWALL Secure Remote Access Basic Administrator (SRABA) IPv6 Security Migration HDI Knowledge Management Foundations: KCS Principles Cybersecurity Compliance & Mobility ITIL Service Lifecycle: Planning, Protection, and Optimisation Global Communications Remote Access Cisco Secure System Implementing Cisco IOS Network Security Deploying Cisco ASA VPN Solutions Check Point Security Expert R75 Junos Security Communication and Remote Access Vendors Cisco, Juniper,Blue Coat, F5, Checkpoint, Dell SonicWall, Citrix, Microsoft Logging and Monitoring Requirements Validation and Testing Unix Fundamentals ITIL Service Capability: Release, Control, and Validation Penetration Testing Certified Ethical Hacker Advanced VoIP: Securing UC Networks Foundstone Ultimate Hacking Cryptography Security+ Prep Course CISSP Foundstone Writing Secure Code IDS/IPS/IDP Implementing Cisco Intrusion Prevention System aetraining@globalknowledge.ae www.globalknowledge.ae 2014 Training LLC. All rights reserved.
How do you handle failures? Perform continuous monitoring with event management tools and maximise your ability to provide an immediate response. Use strong policies that are well communicated for a consistent and uniform reaction. Continuous Monitoring/Security Incident and Event Management (SIEM) CSFI - Cyberspace Operations Strategist and Planning Agile Project Management ITIL Service Capability: Operational Support and Analysis Leading Complex Projects Forensics Foundstone Forensics & Incident Response Computer Hacking Forensic Investigator Troubleshooting TCP/IP Networks with Wireshark Cybersecurity Investigations and Network Forensics Analysis: Practical Techniques for Analysing Suspicious Network Traffic Practical Techniques for Analysing VoIP Traffic Practical Techniques for Analysing Wi-Fi Traffic Incident Response Foundstone Forensics & Incident Response Computer Hacking Forensic Investigator Kepner Tregoe Foundation (Enterprise only) ITIL Service Capability: Operational Support and Analysis Enterprise Incident Response Management Advanced Memory Forensics in Incident Response Reverse Engineering Foundstone Forensic and Incident Response Hacking & Cyber Warfare Certified Ethical Hacker Foundstone Ultimate Hacking Database Hacking and Security Training: Securing Databases aetraining@globalknowledge.ae www.globalknowledge.ae 2014 Training LLC. All rights reserved.
How do you manage the lifecycle? Continuously managing changes to the IT landscape of your organisation requires due diligence to ensure your systems are optimally organised and interconnected. Architecture & Design RSA Archer Administration Introduction to IPv6: Protocols, Services, and Migration Advanced IPv6 Migration IPv6 Security Migration IPv6 Fundamentals, Design, and Deployment Acceptance Testing for Quality Success ITIL Foundations ITIL Service Lifecycle: Service Design Application Security & Development Secure Software Design Building Secure Software Building a Quality Software Architecture Creating the Systems Architecture Understanding Secure SOA: A Technical Overview Change Management Schedules and Costs Controls Business Analysis Essentials Certification & Authorisation Professional Prep ITIL Service Lifecycle: Service Transition Operations Planning CSFI: Cyberspace Operations Strategist and Planning ITIL Foundations ITIL Service Capability: Service Offerings and Agreements CISSP Prep Course ITIL Service Lifecycle: Service Transition Security Testing Certified Ethical Hacker Acceptance Testing for Quality Success CISA Prep Course Adopting Agile Software Development Practices Business Alignment ITIL Service Lifecycle: Continual Service Improvement Business Process Analysis CISM Prep Course aetraining@globalknowledge.ae www.globalknowledge.ae 2014 Training LLC. All rights reserved.
How do you plan for failures? Ensure your organisation has planned for continuity after an attack. Failures happen; how best do you respond? Business Impact Analysis Schedules and Cost Control Business Analysis Essentials ITIL Service Lifecycle: Service Design Communication Plan Disaster Recovery Data Domain System Administration Symantec Backup Exec 12.x for Windows Servers:Administration Performance Analysis on Data ONTAP Cybersecurity Foundations CISSP Prep Course ITIL Service Lifecycle: Continual Service Improvement Continuity of Operations Business Analysis Essentials Agile Project Management Certification Workshop ITIL Service Cabability: Planning, Protection, and Optimisation The courses listed are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually add premium content to our curriculum. Contact us today to learn more. Conclusion The constantly evolving cybersecurity landscape requires heavily armed IT security professionals whose skills are also constantly evolving. Our security curriculum is constantly evolving to keep pace with the threat landscape and the needs of organisations big or small. We are your source for IT security skills building and offer a robust security curriculum ranging from novice to expert. Couple this with premium content, expert instruction and training for every learning style and budget. Contact us today and we will develop a learning plan to best meet your needs for today and tomorrow. Learn More www.globalknowledge.net/security aetraining@globalknowledge.ae www.globalknowledge.ae 2014 Training LLC. All rights reserved.
EMEA HQ - UK: Thames Valley Training Centre Mulberry Business Park, Fishponds Rd, Wokingham, Berkshire, RG41 2GY T +44 (0) 1189 777700 F +44 (0) 1189 777767 E info@globalknowledge.net Egypt: 16 Moustafa Refaat St. Block 1137, Sheraton Heliopolis, Cairo T +20 2 2269 1982 or 16142 F +20 2 2269 2041 E training@globalknowledge.com.eg Saudi Arabia - Dammam Corniche Plaza Tower (Centre Point Building), Al Corniche Road, Al Jawhara Area Office 103 3rd Floor, Dammam 31429 P.O. BOX 36622 T +966 3 830 7757 or 7737 F +966 3 830 7720 E training@globalknowledge.com.sa Austria: Gutheil-Schoder-Gasse 7a A-1101 Vienna T +43 (1) 66 55 655-0 F +43 (1) 66 55 655-6 E info@globalknowledge.at Abu Dhabi: Office 606A, Park Rotana Office Complex, Khalifa Park, Sector E-48, PO Box 769254, Abu Dhabi T +971 2 234 4020/19 F +971 4 366 4554 E training@globalknowledge.ae France: 100, Avenue Albert 1er 92500 Rueil-Malmaison T +33 (0)1 78 15 34 00 F +33 (0)1 78 15 33 90 E info@globalknowledge.fr Ireland: 3rd Floor Jervis House Millennium Walkway Dublin 1 T +353 (0)1 814 8200 F +353 (0)1 814 8210 E info@globalknowledge.ie Saudi Arabia - Riyadh: Al Oruba street, Bldg,# 393, Al Worood, Riyadh 3140. P.O. Box 17969 Riyadh 11494 T +966 92000 9278 F +966 92000 9278 Ext: 3323 E training@globalknowledge.com.sa Spain: Edificio Indocentro Calle de la Retama 7, 6a planta 28045 - Madrid, ES T +34 91 425 06 60 F +34 91 579 55 95 E info.cursos@globalknowledge.es Belgium: Zandvoortstraat 1 2800 Mechelen T +32 15 27 65 35 F +32 15 20 49 50 E info@globalknowledge.be Netherlands: Iepenhoeve 5 3438 MR Nieuwegein T +31 (0)30 60 89 311 F +31 (0)30 60 61 652 E info@globalknowledge.nl Sweden: Vretenvägen 13, plan 3 Box 6031 171 54 Solna (Stockholm) T +46 8 445 16 60 F +46 8 28 14 07 E info@globalknowledge.se Denmark: Stamholmen 110, 2650 Hvidovre T 44 88 18 00 F 44 88 18 42 E training@globalknowledge.dk Dubai: Dubai Knowledge Village Block 2A, first floor, Office F-68, PO Box 500716 T +971 4 446 4987/72 F +971 4 366 4554 E training@globalknowledge.ae Norway: Grenseveien 97, N-0663 Oslo, Postboks 6256 Etterstad, N-0603 Oslo, Norway T +47 2295 6600 F +47 22 95 6601 E info@globalknowledge.no UK: Thames Valley Training Centre Mulberry Business Park, Fishponds Rd, Wokingham, Berkshire, RG41 2GY T +44 (0)1189 123456 F +44 (0)1189 195109 E info@globalknowledge.co.uk Copyright 2014 Training LLC. All rights reserved. reserves the right to change pricing, registration terms and conditions, course content, products or program, course events or cancel a course at any time without notice or liability. Whilst every effort has been made to ensure the accuracy of the information contained within the publication will not accept responsibility for any inadvertent errors. For complete terms and conditions, visit www.globalknowledge.com.sa and the logo are trademarks of Training LLC. All other trademarks mentioned are the property of their respective owners.