InfoSec: Cybersecurity

Cybersecurity is the fastest growing career in the IT industry. Between January and September 2019, there were over 7.9 billion data records exposed — a 33% increase from the same time in 2018!
In the first quarter of 2020, exposed records were pacing at an increase of 273% over last year.
Companies are scrambling to fill their Cybersecurity positions and There are not enough professionalS to fill these positions.

About This Training

In this class, you will learn to manage all aspects of information security engineering and the daily operations of enterprise cybersecurity systems. Ability to detect and defend against cyberattacks targeting any organization’s network infrastructure.
Responsibilities will also include assessing and managing the cybersecurity risk posture of small, medium, and enterprise networks.
Learn cybersecurity proactive risk management services, including vulnerability scanning, penetration tests, risk assessments, and security audits.
The ability to develop and maintain Information Security Policies and Standards that establish the required behaviors and controls intended to protect business information technology resources, secure personal information, and safeguard the privacy of individuals.
After this class, you will be able to fuse technical and non-technical sources to analyze various cyber threat landscapes.

  • Operate and Maintain:

    Provides the support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security. These include Customer Service and Technical Support; Data Administration; Knowledge Management; Network Services, Systems Administration; and Systems Analysis.

  • Oversee and Govern:

    Provides leadership, management, direction, or development, and advocacy so the organization may effectively conduct cybersecurity work. These include Cybersecurity Management, Executive Cyber Leadership; Legal Advice and Advocacy; Program/Project Management and Acquisition; Strategic Planning and Policy; and Training, Education, and Awareness.

  • Protect and Defend:

    Identifies, analyzes, and mitigates threats to internal information technology (IT) systems and/or networks. This includes Cyber Defense Analysis, Cyber Defense Infrastructure Support; Incident Response; Vulnerability Assessment, and Management.

  • Securely Provision:

    Conceptualizes, designs procures, and/or builds secure information technology (IT) systems, with responsibility for aspects of system and/or network development. This includes Risk Management; Software Development; Systems Architecture; Systems Development; Systems Requirements Planning; Technology R&D; and Test and Evaluation.

  • Investigate:

    Investigates cybersecurity events or crimes related to information technology (IT) systems, networks, and digital evidence. This includes Cyber Investigation and Digital Forensics.

  • Analyze:

    Performs highly-specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. This includes All-Source Analysts; Exploitation Analysis; Language Analysis; Targets; and Threat Analysis.

  • Collect and Operate:

    Provides specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. This includes Collection Operations; Cyber Operational Planning; and Cyber Operations to gather evidence.