Introduction to Cybersecurity Overview. October 2014



Similar documents
Cisco Cyber Security. Professional Courses. About. Course Outline

Module 3 Applications of Information Systems: Enterprise Systems

CYBERSECURITY AWARENESS TRAINING

Bellevue University Cybersecurity Programs & Courses

Cybersecurity. Are you prepared?

NetAcad Supplemental Courses

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Big 4 Information Security Forum

Security & privacy in the cloud; an easy road?

Cyber Learning Solutions

KEY TRENDS AND DRIVERS OF SECURITY

CyberNEXS Global Services

Entrepreneurship Course. February 2014

Microsoft s cybersecurity commitment

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Cyber Security Education: My Personal Thoughts. Bharat Doshi

CCNA Security 2.0 Scope and Sequence

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Principles of Information Assurance Syllabus

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

I ve been breached! Now what?

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

Addressing Cyber Risk Building robust cyber governance

Defensible Strategy To. Cyber Incident Response

Cisco & Big Data Security

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Presented by Frederick J. Santarsiere

Understanding Cyber Defense A Systems Architecture Approach

Oil & Gas Cybersecurity

National Initiative for Cybersecurity Education

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Content Security: Protect Your Network with Five Must-Haves

CYBER SECURITY TRAINING SAFE AND SECURE

Northrop Grumman Cybersecurity Research Consortium

Introduction of the GCCD. (Global Cybersecurity Center for Development)

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

How to Access and Redeem Cisco Certification Exam Discount Vouchers

Hackers are here. Where are you?

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

Assessing the strength of your security operating model

Zak Khan Director, Advanced Cyber Defence

How-To Guide: Cyber Security. Content Provided by

EC-Council Certified Security Analyst (ECSA)

Cybersecurity and Privacy Hot Topics 2015

Can We Become Resilient to Cyber Attacks?

EC-Council. Certified Ethical Hacker. Program Brochure

Cisco Threat Defense for Borderless Networks

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

State of Security Survey GLOBAL FINDINGS

SECURITY CONSIDERATIONS FOR LAW FIRMS

How to Access and Redeem Cisco Certification Exam Discount Vouchers

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

CONSULTING IMAGE PLACEHOLDER

Lessons from Defending Cyberspace

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

2. Cyber security research in the Netherlands

Address C-level Cybersecurity issues to enable and secure Digital transformation

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

The Next Generation of Security Leaders

Defending Against Data Beaches: Internal Controls for Cybersecurity

Information Security Engineering

Course Descriptions November 2014

The Importance of Cybersecurity Monitoring for Utilities

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Unit 3 Cyber security

NATIONAL CYBER SECURITY AWARENESS MONTH

Cybersecurity Strategic Consulting

S. ll IN THE SENATE OF THE UNITED STATES

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

The Human Factor of Cyber Crime and Cyber Security

Into the cybersecurity breach

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

EY Cyber Security Hacktics Center of Excellence

U. S. Attorney Office Northern District of Texas March 2013

Course Design Document. Information Security Management. Version 2.0

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

The New CCNA Routing and Switching Curriculum. Nilay Ghoghari, Product Management Barb Termaat, Product Development May 23, 2013

Shon Harris s Newly Updated CISSP Materials

What Directors need to know about Cybersecurity?

Cisco Cyber Threat Defense - Visibility and Network Prevention

Transcription:

Introduction to Cybersecurity Overview October 2014

Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities, videos, and additional resources for students to explore Assessments include a pre-test, 8 quizzes, and 1 final exam Estimated time to complete: 13 hours Students can self-enroll or instructors can teach this course in their classroom Available in English 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

Module 1 The Cybersecurity Industry 2 Malware and How to Protect Yourself 3 Overview of Cybersecurity in Finance and Telecommunications 4 Cisco Security Solutions 5 Defending Against Global Threats 6 Strategic and Architectural Cybersecurity Planning Goals Explain the importance of cybersecurity in the global economy Explain why cybersecurity is a growing profession Explain the characteristics and operation of malware Explain how hackers use unsuspecting individuals to propagate malware Explain why cybersecurity is critical to the banking industry Explain why cybersecurity is critical to the telecommunications industry Explain Cisco s approach to cybersecurity Explain the behavior-based approach to cybersecurity Explain the characteristics of cyber warfare Explain how Cisco Security Intelligence Operations (SIO) tracks and responds to a global threat Explain trends in the cyber threat landscape Explain the framework of the Enterprise Security Architecture 7 Vulnerabilities and Solutions Explain why cybersecurity is critical to the medical devices industry 8 Will Your Future Be in Cybersecurity? Explain the opportunities for pursuing network security certifications 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

This module introduces you to the cybersecurity industry and the career opportunities available to you in this exciting, everchanging, and high-demand field. It includes two recorded presentations: Think Like a Hacker, Defend Like a Ninja Panel Discussion: A Day in the Life of a Cisco Security Expert and the Multi Dimensions of Cyber Security Explain the importance of cybersecurity in the global economy Explain why cybersecurity is a growing profession Estimated time to complete: 2 hours plus activities and 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

This module explains what malware is and how it is used by hackers to gain unauthorized access to information. The module also explores ways you can protect your privacy and lower your personal risk of being hacked. It includes two recorded presentations: Trends in Malware Security, Privacy, and Risk Considerations in a Social- Networked World Protecting Yourself from Yourself Explain the characteristics and operation of malware Explain how hackers use unsuspecting individuals to propagate malware Estimated time to complete: 1.5 hours plus activities and 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

This module includes three recorded presentations that provide an overview of cybersecurity in the finance and telecommunications industries: Finance Industry Cyber Attacks Cybersecurity Issues in Internet Banking Fighting Cyber Crime in the Telecommunications Industry Explain why cybersecurity is critical to the banking industry Estimated time to complete: 2 hours plus activities and 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

This module explains two approaches to cybersecurity: Cisco Security Incident Response Team (CSIRT) and behavior-based cybersecurity. There are two recorded presentations: Cyber Security: The Operational View Behaviour Based Security Explain Cisco s approach to cybersecurity Explain the behavior-based approach to cybersecurity Estimated time to complete: 2 hours plus activities and 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

This module describes cyber warfare as any attack by a nationstate, organization, or individual, on another government or nation, with the intent of sabotage, espionage, or exploitation. Two recorded presentations provide an overview of cybersecurity in the domains of cyber warfare and security intelligence: Cyber Warfare: The New Battlefront for Defense Forces Security Intelligence, Tracking a Global Threat Explain the characteristics of cyber warfare Explain how Cisco Security Intelligence Operations (SIO) tracks and responds to a global threat Estimated time to complete: 2 hours plus activities and 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

This module explains why developing an intelligence-led approach is essential to counteracting today s blended cyber attack threat environment. It includes two recorded presentations that provide an overview of strategic and architectural cybersecurity planning: Cyber Security: The Strategic View Cyber Security: The Architectural View Explain trends in the cyber threat landscape Explain the framework of the Enterprise Security Architecture Estimated time to complete: 1.5 hours plus activities and 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

This module discusses why security experts must maintain a vigilant watch for potential vulnerabilities in any device or system connected to a network, and dives deeply into two current trends - wireless medical devices and cloud computing. This module includes two recorded presentations: Defending the Borg Cybernetics and Medical Devices Under Attack Off Starboard Bow Explain why cybersecurity is critical to the medical devices industry Estimated time to complete: 1.5 hours plus activities and 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

This module provides an overview of the evolving role of the cybersecurity professional, the CCNA Security certification program, and other certification programs. It includes two recorded presentations: CCNA Security Overview Cisco Security Certifications and the Growing Market Demand for Security Professionals Explain the opportunities for pursuing network security certifications Estimated time to complete: 0.5 hour plus activities and 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

Students: Please visit the Self-Enroll Courses page on Cisco NetSpace to enroll in the self-paced version of this course If you need assistance, please post questions on the Cisco Networking Academy Facebook page Instructors: Instructors can enroll students and teach Introduction to Cybersecurity in their classrooms through the same process used for other NetAcad courses If you need assistance, please contact your Academy Support Center (ASC) 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

Thank you.