Security Forensics Training



Similar documents
e-discovery Forensics Incident Response

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

GSA Alliant Small Business Pricelist

capabilities statement

EC-Council. Certified Ethical Hacker. Program Brochure

2016 CORPORATE BRIEF ProSol Overview & Core Capabilities

Hands-On How-To Computer Forensics Training

CYBER SECURITY TRAINING SAFE AND SECURE

Department of Management Services. Request for Information

APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES

Cloud Security and Managing Use Risks

CyberSecurity Solutions. Delivering

IT-CNP, Inc. Capability Statement

Hackers are here. Where are you?

NIST Cyber Security Activities

Bellevue University Cybersecurity Programs & Courses

Hackers are here. Where are you?

2015 Security Training Schedule

Peregrine Technical Solutions, LLC

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Developing a Mature Security Operations Center

Conducting due diligence and managing cybersecurity in medical technology investments

Click to edit Master title style. How To Choose The Right MSSP

Presented by Frederick J. Santarsiere

Professional Services Overview

Reliable, Repeatable, Measurable, Affordable

Corporate Capabilities Corporate Drive, Suite 500 Landover, MD tel: (301) w w w. h e i t e c h s e r v i c e s.

How To Get A Computer Hacking Program

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

WILLIAM OETTINGER PHONE (702)

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Strategy and Management Services (SAMS), Inc.

Privilege Gone Wild: The State of Privileged Account Management in 2015

Privilege Gone Wild: The State of Privileged Account Management in 2015

What We Do. security. outsourcing. policy and program. application. security. training & awareness. security solutions

How To Buy Nitro Security

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Information Systems Security Certificate Program

KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT

EC-Council Certified Security Analyst (ECSA)

SECURITY. Risk & Compliance Services

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Course Descriptions November 2014

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

Certified Cyber Security Analyst VS-1160

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

SCADA Security Training

IT and Cybersecurity. Workforce Development with CompTIA Certification

CAST Center for Advanced Security Training

Maryland State Board of Elections Online Voter Services Vulnerability Assessment and Penetration Testing Report

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

OVERVIEW DEGREES & CERTIFICATES

Logging and Auditing in a Healthcare Environment

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

The Evolution of Application Monitoring

Millennium Energy Consultants, LLC. Engineering Consulting Services and Energy Management Solutions

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Information Security and Risk Management

The Next Generation of Security Leaders

Computer Hacking Forensic Investigator v8

GAO. INFORMATION SECURITY Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing

Information Security Services

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Security Risk Management Strategy in a Mobile and Consumerised World

Information Systems and Tech (IST)

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Statement of Qualifications Cybercrime & data breach

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Penetration testing & Ethical Hacking. Security Week 2014

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications

Review: McAfee Vulnerability Manager

plantemoran.com What School Personnel Administrators Need to know

How To Build A Cybersecurity Company

MILLENNIUM CORPORATION

Protecting against cyber threats and security breaches

QUESTIONS & RESPONSES #2

Transcription:

Security Forensics Training

Vision, Mission, and Values 3 Vision: To be the brand of choice for computer forensics, cyber security, and training solutions Mission: To provide digital forensics, cyber security, and Hands-on How-To training solutions that are high-quality, timely, and customer-focused Core Values: Guided by the principles of CUSTOMER SATISFACTION, SERVICE EXCELLENCE, RESPONSIVENESS, INNOVATION, INTEGRITY, and LOYALTY

Countering Cyber Threats 4 Plan Protect Detect Investigate Respond Recover Assess Educate

NetSecurity Forensic Labs 5 State-of-the-Art Secure Facility Industry-Renowned Investigators Deep Experience Outstanding Training Certifications: CISSP, CHFI, EnCE, CFE, LPT, GREM, GCIH, CEH DoD Cleared Advanced Technologies and Tools Processes that Withstand Legal Scrutiny Well-Defined Quality Assurance Program

Computer Forensic Services 6 Forensics Investigation Cyber Incident Response Malware Analysis & Reverse Engineering e-discovery Data Recovery & Erasure Expert Testimony

Cyber Security Services 7 Information Assurance Certification & Accreditation (C&A) Risk Assessment Information Privacy Security Program Development Security Awareness Training Contingency Planning Security Assessments/Audits Penetration Testing & Red Teaming Vulnerability Assessment Social Engineering Regulatory Compliance (GLBA, HIPAA, PCI, SOX, FISMA) Physical Security Assessment Computer Network Defense Security Engineering Security Operations Advanced Persistent Threat Assessment & Countermeasures (APTAC) Cyber Security Mobile Security Cloud Computing Security Application Security Infrastructure Security Identity Management HSPD-12 Implementation & Assessment PIV Card Issuer (PCI) C&A Public Key Infrastructure (PKI) Research & Development Malicious Software Research Vulnerability Research & Exploitation

Hands-On How-To Training 8 Detailed, step-by-step instructions Hands-On How-To Lab Exercises ( HOHTLE ) Real-world simulations Expert instructors with handson field experience Resource give-aways FREE post-training support Vendor neutrality

Hands-On How-To Training Courses 9 Security Courses Forensics Courses Secure & Audit Unix Systems Hacking for Investigators Secure & Audit Windows Servers Computer Forensics Secure & Audit Network Systems Cyber Incident Response Secure & Audit Voice over IP (VoIP) Malware Analysis Secure & Audit Database Servers Memory Forensics Secure & Audit Web-based Apps Network Forensics Ethical Hacking Mac Forensics Certification & Accreditation Electronic Discovery (e-discovery)

10 DoD 8570 Certification Training

Key Differentiators 11 Boutique Cyber Security and Forensics Company State-of-the-art NetSecurity Forensic Labs Hands-On How-To Training Life-cycle Approach to Cyber Security NetSecurity Cyber Incident Response Toolkit (NCIRT) Degreed/Certified Engineers, Consultants, and Instructors Unmatched Customer Service and Outstanding Quality Licensed Private Investigation ( PI ) Company DoD Top Secret Facility Clearance 8(a) Certified GSA Schedule

Select Clients (Feds & Commercial) 12 Internal Revenue Service DHS Department of Defense United States Navy United States Marine Corps Veterans Affairs Department of Commerce Department of Labor National Science Foundation Broadcasting Board of Governors Department of Treasury The DC Courts NIH TRICARE Fortune 500 Companies Financial Institutions Prestigious Law Firms

Strategic Partners 13 Booz Allen Hamilton Human Touch IBM KSJ & Associates Tangible Software TechnoTrack Systems ProLogic Verizon Federal Network Systems VetsAmerica Business Consulting XTec

Procurement Information 14 Corporate Status: Incorporated (in 2004) Certification/Classification: o 8(a) Business Development Program o Small Disadvantaged Business (SDB) Tax ID (EIN): 54-1945426 DUNS: 122657005 NAICS Codes: 541199, 541511, 541512, 541513, 541519, 541690, 611420 CAGE Code: 3CJJ4 SIC Code: 7371, 7372, 7373 CCR Registration: Yes Facility Clearance: Yes Credit Card Acceptance: Yes Contract Vehicles 8(a) Sole Source Justification GSA Schedule (# GS-35F-0288Y) Navy Seaport-e (# N00178-07-D-5205) VETS GWAC (# GS-06F-0533Z) TIPSS-4 Small Business (SB) IDIQ TRICARE TEAMS IDIQ Pending Corporate Contact NetSecurity Corporation Inno Eroraha, President 22375 Broderick Drive, Suite 235 Dulles, VA 20166 Email: solutions@netsecurity.com Web: www.netsecurity.com Phone: 703.444.9009 / 1.855.NETSECURITY Fax: 703.444.6899