InfoSec Academy Forensics Track



Similar documents
InfoSec Academy Application & Secure Code Track

InfoSec Academy Pen Testing & Hacking Track

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

CERTIFIED DIGITAL FORENSICS EXAMINER

e-discovery Forensics Incident Response

The Next Generation of Security Leaders

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Certified Digital Forensics Examiner (CDFE)

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Certified Cyber Security Analyst VS-1160

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Bellevue University Cybersecurity Programs & Courses

EC-Council Ethical Hacking and Countermeasures

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Table of Contents. Introduction. Audience. At Course Completion

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Information Systems Security Certificate Program

CESG Certification of Cyber Security Training Courses

Security + Certification (ITSY 1076) Syllabus

EC-Council. Certified Ethical Hacker. Program Brochure

(Instructor-led; 3 Days)

Certification Programs

Information Security Specialist Training on the Basis of ISO/IEC 27002

Domain 1 The Process of Auditing Information Systems

Network Segmentation

CFIR - Finance IT 2015 Cyber security September 2015

Chapter 1 The Principles of Auditing 1

Computer Hacking Forensic Investigator v8

Information Security Services

KEY TRENDS AND DRIVERS OF SECURITY

Certification Programs

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Case Study: Hiring a licensed Security Provider

Certified Cyber Security Analyst VS-1160

Jort Kollerie SonicWALL

Introduction to Cyber Security / Information Security

Certified Information Systems Auditor (CISA)

Field of Study Area of Expertise Certification Vendor Course

LINUX / INFORMATION SECURITY

Presented by Evan Sylvester, CISSP

CAST Center for Advanced Security Training

Hands-On How-To Computer Forensics Training

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Hackers are here. Where are you?

SecureAge SecureDs Data Breach Prevention Solution

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

North Texas ISSA CISO Roundtable

information security and its Describe what drives the need for information security.

How To Get A Computer Hacking Program

Critical Controls for Cyber Security.

SECURITY CONSIDERATIONS FOR LAW FIRMS

Hackers are here. Where are you?

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

An enterprise grade information security & forensic technical team

Access FedVTE online at: fedvte.usalearning.gov

Security Transcends Technology

CYBERSECURITY EXAMINATION SWEEP SUMMARY

CISA TIMETABLE (4 DAYS)

Security Training Programs

Securing Data on Microsoft SQL Server 2012

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Presented by Frederick J. Santarsiere

Executive Management of Information Security

Securing your Corporate Infrastructure What is really needed to keep your assets protected

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

IINS Implementing Cisco Network Security 3.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS)

Network Security Administrator

Programme In Information Security Management

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

Defending Against Data Beaches: Internal Controls for Cybersecurity

HOW SECURE IS YOUR PAYMENT CARD DATA?

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Certification for Information System Security Professional (CISSP)

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Information Technology Policy

How To Manage Security On A Networked Computer System

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

SOC & HIPAA Compliance

Transcription:

Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security & Policy Assurance Soft Skills Certified Security Sentinel Certified Information Systems Security Officer Certified Digital Forensics Examiner C)DFE Certified Network Forensics Examiner C)NFE Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) Certified Ethical Hacker (CEH)

Texas Security Policy & Assurance Course Upon successful completion of this course, the participant will be prepared to ISOs & CISOs Module 1: Texas Rules and Legislation apply the state rules regarding information security in the state of Texas within their agency. Modules 2: Data Classification Module 3: Security Framework Module 4: Agency Security Plans Modules 5: Reports Modules 6: Security Services Soft Skills Course (examples): Team Building Without Time Wasting Helping Employees Use Their Time Wisely Everybody Wins: How to Turn Conflict into Collaboration A variety of soft skills courses are available covering a wide range of topics. Dependent on the course N/A

Certified Security Sentinel - C)SS The Certified Security Sentinel certification course is intended for anyone that Employees who need to learn the uses a computer on the internet. Attendees will not only understand security basics of security. threats and attacks but also be prepared with countermeasures for these attacks. The weakest link in any companies' security program is a poorly trained employee. Once a student understands what can happen, they will know what to look for. And with that understanding, be able to keep the information they have been entrusted with as safe as possible. The social engineering portion of the class is designed to teach the participants the skills used by social engineers to facilitate the extraction of information from an organization using technical and non-technical methods. Computer fraud, black-hat hacking, and cyber-terrorism are all phrases that describe crimes that use over-the-wire technology to attack, steal, and terrorize their victims. The key to most of these over-the-wire attacks being successful is information they receive through social engineering. Does it work? Can smart people be easily deceived? Kevin Mitnick, who served five years in prison for repeated hacking said in testimony before Congress on the subject of Social Engineering: I was so successful with that attack that I rarely had to resort to a technical attack. If you're afraid of having your identity, credit card credentials, or business information compromised, then this is the training you have been looking for. The Certified Security Sentinel certification course trains students on how attacks are performed, how to identify an attack, and how to secure information. One of the most valuable skill sets of a C)SS is that they understand how to train others on security as well. Module 1: Basic Computer Security Module 2: User Awareness Module 3: Implementation Countermeasures Module 4: Essential Security Awareness Module 5: Using the Internet at Work Module 6: Accessing the Network Locally Module 7: Accessing the Network Remotely Module 8: Social Engineering Module 9: Understanding and Interacting with our Target Module 10: Researching Our Target Module 11: Methods of Deception

Certified Information Systems Security Officer - The Certified Information Systems Security Officer course is designed for C)ISSO forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on information security. The C)ISSO addresses the broad range of industry best practices, knowledge and skills expected of a security leader. The candidate will learn both the theory and the requirements for practical implementation of core security concepts, practices, monitoring and compliance. Through the use of a riskbased approach, a C)ISSO is able to implement and maintain cost-effective security controls that are aligned with business requirements. Whether you are responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO course is the ideal way to increase your knowledge, expertise, skill, and credibility. The C)ISSO program standards are closely aligned with those of the ISO27001, NIST, CISM and the CISSP CBK exam objectives. The C)ISSO excels by providing a well-rounded, comprehensive overview of essential security topics. Module 1: Risk Management Module 2: Security Management Module 3: Identification and Authentication Module 4: Access Control Module 5: Security Models and Evaluation Criteria Module 6: Operations Security Module 7: Symmetric Cryptography and Hashing Module 8: Asymmetric Cryptography and PKI Module 9: Network Connections Module 10: Network Protocols and Devices Module 11: Telephony, VPNs and Wireless Module 12: Security Architecture and Attacks Module 13: Software Development Security Module 14: Database Security and Development Module 15: Malware and Software Attacks Module 16: Business Continuity Module 17: Disaster Recovery Module 18: Incident Management, Law, and Ethics Module 19: Physical Security

Certified Digital Forensics Examiner C)DFE Digital Forensics is the investigation and recovery of data contained in digital Forensic Auditor devices. This data is often the subject of investigations in litigation, proof of IT Auditor guilt, and corrective action in an organization. When the time comes that you Law Enforcement need to investigate your organization, will you have the skill set necessary to Internal Auditor gather the digital data that you need? The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies in performing these investigations and reporting their findings. To illustrate, let s say an employee needs to be terminated for a violation of computer usage rules. To do so the organization must furnish an irrefutable burden of proof based on digital evidence. If not irrefutable, an attorney knowledgeable about Digital Forensics could have the case thrown out of court. Government and investigative agencies need proper training to succeed in cases like the above as well as those including acts of fraud, computer misuse, illegal pornography, counterfeiting, and so forth. A C)DFE is aptly prepared to handle these types of situations. Module 1: Introduction Module 2: Computer Forensic Incidents Module 3: Investigation Process Module 4: Disk Storage Concepts Module 5: Digital Acquisition & Analysis Module 6: Forensic Examination Protocols Module 7: Digital Evidence Protocols Module 8: CFI Theory Module 9: Digital Evidence Presentation Module 10: Computer Forensic Laboratory Protocols Module 11: Computer Forensic Processing Module 12: Digital Forensics Reporting Module 13: Specialized Artifact Recovery Module 14: e-discovery and ESI Module 15: Cell Phone Forensics Module 16: USB Forensics Module 17: Incident Handling Appendix 1: PDA Forensics Appendix 2: Investigating Harassment Lab 1: Preparing Forensic Workstation Lab 2: Chain of Custody Lab 3: Imaging Case Evidence / FTK Manager Lab 4: Reviewing Evidence / Access Data Tools

Certified Network Forensics Examiner - C)NFE The Certified Network Forensics Examiner was created when a U.S. Forensic Auditor Government Agency contracted us to train their team on advanced forensics IT Auditor in computer networks. The C)NFE will take your digital forensic skill set to the Law Enforcement next level by navigating through over twenty modules of network forensic Internal Auditor topics and providing you with hands-on, practical experience through our lab IT Professional exercises that walk you through real-world situations that are solved with investigation and recovery of data in networks. With the skill set of a C)NFE, students can understand exactly what is going on in a network to ensure its proper use by those entrusted with access. Every organization can benefit by employing a C)NFE to audit their network; everyone deserves to know how their resources are being used. Module 1: Digital Evidence Concepts Module 2: Network Evidence Challenges Module 3: Network Forensics Investigative Methodology Module 4: Network-Based Evidence Module 5: Network Principles Module 6: Internet Protocol Suite Module 7: Physical Interception Module 8: Traffic Acquisition Software Module 9: Live Acquisition Module 10: Analysis Module 11: Layer 2 Protocol Module 12: Wireless Access Points Module 13: Wireless Capture Traffic and Analysis Module 14: Wireless Attacks Module 15: NIDS_Snort Module 16: Centralized Logging and Syslog Module 17: Investigating Network Devices Module 18: Web Proxies and Encryption Module 19: Network Tunneling Module 20: Malware Forensics Lab 1: Working with captured files Lab 2: Layer 2 Attacks & Active Evidence Acquisition Lab 3: Preparing for Packet Inspection Lab 4: Analyzing Packet Captures Lab 5: Case Study: ABC Real Estate Lab 6: NIDS/NIPS