Certification Programs

Similar documents
Certification Programs

Top 10 Baseline Cybersecurity Controls Banks Aren't Doing

What Directors need to know about Cybersecurity?

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Information Systems Security Certificate Program

INFORMATION SECURITY FOR YOUR AGENCY

InfoSec Academy Pen Testing & Hacking Track

LINUX / INFORMATION SECURITY

InfoSec Academy Application & Secure Code Track

EC-Council Certified Security Analyst (ECSA)

InfoSec Academy Forensics Track

INFORMATION SECURITY TRAINING CATALOG (2015)

SECURITY CONSIDERATIONS FOR LAW FIRMS

CYBERSECURITY HOT TOPICS

Vinny Hoxha Vinny Hoxha 12/08/2009

Critical Controls for Cyber Security.

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Access FedVTE online at: fedvte.usalearning.gov

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Hackers are here. Where are you?

The Protection Mission a constant endeavor

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Get on First Base with your Regulators and Cyber Security

Cybersecurity. WBA Bank Executives Conference February 2 4, 2015 Milwaukee, WI

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

CAST Center for Advanced Security Training

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

EC Council Certified Ethical Hacker V8

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

Footprinting and Reconnaissance Tools

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

CYBER SECURITY TRAINING SAFE AND SECURE

The fast track to top skills and top jobs in cyber. Guaranteed.

SANS Top 20 Critical Controls for Effective Cyber Defense

PCI-DSS Penetration Testing

Hackers are here. Where are you?

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...

Table of Contents. Introduction. Audience. At Course Completion

Penetration testing & Ethical Hacking. Security Week 2014

Domain 1 The Process of Auditing Information Systems

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

White Paper: Consensus Audit Guidelines and Symantec RAS

Practical Steps To Securing Process Control Networks

Data Security for the Hospitality

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Learn Ethical Hacking, Become a Pentester

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

CCA CYBER SECURITY TRACK

Principles of Information Assurance Syllabus

Cyber Learning Solutions

Cyber Security An Exercise in Predicting the Future

Department of Computer Science and Technology, UTU 2014

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Technology Risk Management

CYBERTRON NETWORK SOLUTIONS

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Analyze. Secure. Defend. Do you hold ECSA credential?

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

How To Secure Your Information Systems

2016 TÜBİTAK BİLGEM Cyber Security Institute

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

INFORMATION SECURITY TRAINING CATALOG (2016)

New PCI Standards Enhance Security of Cardholder Data

Running head: USING NESSUS AND NMAP TOOLS 1

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

A practical guide to IT security

ITS425: Ethical Hacking and Penetration Testing

Continuous Network Monitoring

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Network Segmentation

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

CRYPTUS DIPLOMA IN IT SECURITY

Transcription:

Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 sfisher@mibankers.com (517) 342-9057 Certification Programs 2015

Following the lecture on day 2, students have the option to take the exam onsite or take it online within 30 days. The online course is also available for 30 days if they wish to review recorded lectures and lab exercises. Certification Process: Students will be required to complete the following to become certified: Participate in all modules The SBS Institute serves community banks by providing educational programs that will certify Complete lab exercises Pass the examination a banker has the knowledge and skills to protect Maintaining the Certification: against todays information security threats. The Certified professionals must complete the following to maintain the certification programs offered by the institute are certification: uniquely designed to address community banking needs, using community banking problems and Pay an annual membership fee of $295. $100 per extra cert. Complete 4 hours of qualifying continuing education via the SBS Institute or Association webinars and events. solutions. Properly trained banking professionals will improve the security around customer data and other sensitive information entrusted to them. The certification communicates to management, the board, stakeholders, and examiners, that a professional can perform the necessary functions to manage and reduce risk to the bank. -1- -14-

How are the courses delivered? Certifications can be delivered as both an Onsite and Online program depending on attendance and your specific needs. Online Programs includes: Kickoff Packet (1 week prior to start date) Welcome Letter Program Participation Instructions Printed Copy of Lecture Materials and Exercises List of required items for the program (hardware, software, etc.) Necessary configurations, files, or environments for labs and exercises 7 modules per certificate, each a 2 hour lecture, suggest that students complete one module per week Following the completion of the modules, students will be provided with a 100 question examination Student access to the program terminates 10 weeks from kickoff Onsite Programs include: Kickoff Packet (1 week prior to start date) Welcome letter Program Participation Instructions Printed copy of lecture materials and exercises List of required items for the program (hardware, software, etc.) Necessary configurations, files, or environments for labs and exercises 7 modules presented during a two-day onsite visit Day 1: 8:00 A.M to 5:00 PM (8 hr. lecture on 4 modules) 6:00 PM to 8:00 PM Interactive Lab/Exercise Day 2: 8:00 AM to 3:00 PM (6 hr. lecture on 3 modules) 3:00 PM to 5:00 PM Certification Examination -13-

-12- -3- Dr. Kevin Streff Co-founder of SBS Institute Founder of Secure Banking Solutions Founder of InfraGard South Dakota Director of the Center for Information Assurance at Dakota State University Chad Knutson Co-founder of SBS Institute Co-founder Secure Banking Solutions VP SBS Institute Master of Science in Information Assurance with an emphasis in Banking & Finance Security CISSP, CISA, & CRISC certified Jon Waldman Co-founder of SBS Institute Co-founder of Secure Banking Solutions Senior Information Security Consultant Master of Science in Information Assurance with an emphasis in Banking & Finance Security CISA & CRISC certified Certified Community Banking Security Professional The Certified Community Banking Security Professional certification program will enhance each attendee s skill set and knowledge base in the areas of information security to better demonstrate their abilities for risk management, information security program development, and auditing. It provides a framework for the entire information security program and demonstrates how to manage each component to ensure successful implementation with attendee s institutions. This program is a comprehensive set of curriculum that will assist any decision maker who participates in managing and guiding the information security program; it s not just for the Information Security Officer. IT Risk Assessment IT Audit Enterprise Risk Management Third Party Risk Management Emergency Preparedness Security Awareness Programs Network Security Network Assessments Supporting Diagrams Social Engineering U.S. Information Security Running an effective Audit Laws & Regulations Committee Preparing for your IT Layered Information Security Examinations Programs Running an effective IT Committee This course is specifically designed to benefit any professional working with Information Technology and Information Security who has a direct responsibility for information. Additionally, those who support these individuals or serve on IT or Audit Committees can expand their understanding of security and help direct their institution s activities in improving their security program. Instructor: Chad Knutson * 8/4/2014 * 11/3/2014 * 2/2/2015 * 5/4/2015

Certified Community Banking Board of Directors In the Certified Community Banking Board of Directors certification, directors will learn the key elements of each critical component of an information security program. Understanding the results of risk assessment and audits will assist directors in asking the right questions, and providing informed directives. This certification program is customdeveloped for the unique backgrounds and needs of directors, to fill in the gaps around technology, information security and fraud concepts to protect the director, and to enhance their ability to perform their duties as a member of the board. Risk Management Policy & Procedures Audit Programs This course is designed for current directors of a financial institution, or people looking to moving into a director s position in the future. A background in information technology or information security is not required. This certification will prepare a director to make informed decisions regarding technology and security responsibility at their institution. Dr. Ashley Podhradsky Assistant Professor & MS Information Assurance program coordinator at Dakota State University Director of Training for BK forensic out of Philadelphia, PA Lead Forensic Investigator for Secure Banking Solutions Dr. Josh Pauli Ph.D in Software Engineering Associate Professor of Cyber Security at Dakota State University Published over 30 international journal and conference papers related to software security Author of The Basics of Web Hacking" with Syngress Publishing Invited to present at DEFCON, Black Hat Briefings, and the National Security Agency * 10/20/2014 * 2/9/2015 * 6/8/2015 Instructor: Dr. Kevin Streff -4- -11-

Certified Community Banking Technology Professional This Certified Community Banking Technology Professional certification program provides a deep dive into critical components of an information security program to explore the technical design and implementation of security controls. The topics included in this program are critical to the successful implementation of an information security program, and will explore their relationship. An understanding of risk management, documentation, and auditing will be explored in addition to possible solutions, implementation approaches, and technical considerations and configurations. System Hardening Penetration Testing Vulnerability Testing Patch Management Social Engineering Testing Perimeter Security Network Security Endpoint Security Mobile Device Management Data Backup & Replication Incident Response Procedures The CCBTP certification is specially designed to benefit any professional working with information technology and information security who has a direct responsibility for information. Additionally, those who support these individuals or serve on IT or Audit Committees can expand their understanding of security and help direct their institution s activities in improving their security program. * 10/6/2014 * 1/12/2015 * 4/20/2015 * 7/6/2015 Instructor: Chad Knutson -5- -10-

Certified Community Banking Ethical Hacker The Certified provides Community attendees with Banking a Ethical solid Hacker foundation of certification theory and understanding along with plenty of keyboard experience in running the tools and interpreting the results of penetration testing and ethical A four step process including OSINT (Information Gathering) Scanning Exploitation Post Exploitation How attackers leverage the web Port scanning, fingerprinting, and versioning techniques Vulnerability Scanning with Nessus Exploitation and privilege escalation utilizing John the Ripper Exploitation with Metasploit Exploiting the human by hacking users Post exploitation with meterpreter Anyone with an interest in hacking and penetration testing will benefit from this course. Because the course requires very few prerequisites, it is ideal for beginners. However, the course pace is fast, and the knowledge is cumulative. Upon completion of the course, attendees will have the ability to perform basic network assessment and the capability to perform multi-tool attacks similar to many attackers today. * 8/11/2014 * 12/1/2014 * 4/6/2015-9- Instructor: Dr. Josh Pauli -6-

Certified Community Banking Vendor Manager The Certified Community Banking Vendor Manager certification provides attendees with a solid foundation of theory, along with an understanding of the third party management process. There will be plenty of hands-on experience in selecting and managing vendor relationships, reviewing documentation, asking the right questions, and helping attendees make decisions regarding the risk of third party vendors, service providers, and outsourced business partners. Vendor Breaches, Laws, and Regulations Information Security Program & Risk Assessment Selection of Vendors Ongoing Vendor Management Creating a Vendor Management Program Contract Structuring Audit & Exam Prep Anyone who lives and breathes Compliance or Information Technology at small to medium-sized financial institutions will benefit from this certification. Those who have gone through the Third party Management Process and have struggled to build a comprehensive and valuable program, or professionals who are new to Vendor Management and are looking to learn about the process will especially benefit. * 9/15/2014 * 12/8/2014 * 3/2/2015 * 6/1/2015 Instructor: Jon Waldman Certified Community Banking Incident Handler The Certified Community Banking Incident Handler certification includes lectures with a relevant topic related to common incidents banks face including BYOD, Incident Response Policies, CATO, Malware Analysis, Insider Threats, and data breach response. Incident Response Overview & Regulations Incident Response Policy Preserving Evidence & Data RAM Acquisition Corporate Account Take Over Data Breach Insider Threats Anyone with an interest in incident response and computer forensics will benefit from this course. Because the course requires very few prerequisites, it is ideal for beginners. However, the course pace is fast, and the knowledge is cumulative. Upon completion of the course attendees will have the ability to perform basic forensic imaging of hard drives and RAM. * 9/8/2014 * 1/5/2015 * 5/18/2015 Instructor: Dr. Ashley Podhradsky -7- -8-