Cyber Security Learning Path SE Edition

Page 1

Learning Tree Cyber Security Courses are Aligned With the NCWF* as Defined by NICE* and the IISP Skills Framework Gain the required Knowledge, Skills and Abilities (KSAs) to perform on the job. Plus, take steps toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, and many more!

SECURELY PROVISION

Information Assurance Compliance

Software Security Engineering

Conceptualizing, Designing, and Building Secure IT Systems

} Cyber Security: Accessibility & Quality Course 3674 • 4 Days } Vulnerability Assessment Course 589 • 4 Days

}S ecuring Web Applications, Services & Servers Course 940 • 4 Days }P enetration Testing: Tools & Techniques Course 537 • 4 Days }M obile Application & Device Security Course 2781 • 3 Days

OPERATE & MAINTAIN

Customer Service & Technical Support

Providing Support, Administration, and Maintenance of IT Systems

PROTECT & DEFEND Identification, Analysis, and Mitigation of Threats to Internal IT Systems or Networks

INVESTIGATE Investigation of Cyber Events and/or Crimes of IT Systems, Networks, and Digital Evidence

ANALYSE Review and Evaluation of Incoming Cyber Security Information

OVERSIGHT & DEVELOPMENT Providing Leadership, Management, Direction, and/or Development of Advocacy

COMPLIMENTARY WEBINAR ON DEMAND Cyber Security: Risk Management for the C-Suite Webinar On Demand 1068 • 1 Hour SEE NEXT PAGE TO LEARN MORE }

Presented by RICHARD A. SPIRES CEO, Learning Tree

Systems Development

System Requirements Planning

}S ecuring Web Applications, Services & Servers Course 940 • 4 Days } Cyber Security: Accessibility & Quality Course 3674 • 4 Days

}S ystem & Network Security Introduction Course 468 • 4 Days } Disaster Recovery Planning Course 289 • 4 Days } Identity Management Course 2056 • 4 Days

Data Administration

Network Services

System Administration

Systems Security Analysis

}S QL Server Introduction Course 2107 • 4 Days } SQL Server Database Administration Course 2108 • 4 Days }R elational Database Design, Tools & Techniques* Course 382 • 4 Days

} Introduction to Networking Course 450 • 4 Days } Network Configuration & Troubleshooting Course 451 • 4 Days } CompTIA Network+ Certification Exam Prep Course 2708 • 5 Days

}W indows Server Group Policy Management* Course 963 • 4 Days

}D efending the Perimeter from Cyber Attacks Course 2010 • 4 Days } Social Engineering Deceptions & Defenses Course 2012 • 3 Days } Endpoint Security & Network Access Control Course 2011 • 4 Days

CND Analyst

CND Infrastructure Support

Incident Response

}C yber Security: Accessibility & Quality Course 3674 • 4 Days }C ompTIA Network+ Certification Exam Prep Course 2708 • 5 Days }C ompTIA Cybersecurity Analyst CSA+ Exam Preparation Course 2047 • 5 Days }C ertified Ethical Hacker (CEH) Certification Exam Prep Course 2031 • 5 Days } E C-Council Certified Hacking Forensic Investigator (CHFI) Exam Preparation Course 2023 • 4 Days

}S ystem & Network Security Introduction Course 468 • 4 Days }D efending the Perimeter from Cyber Attacks Course 2010 • 4 Days } E ndpoint Security & Network Access Control Course 2011 • 4 Days }C ertified Network Defender (CND) Course 2032 • 5 Days

}C ompTIA Security+ Certification Exam Prep Course 446 • 5 Days } Digital Forensics: Tools & Techniques Course 2055 • 5 Days } EC-Council Certified Incident Handler (ECIH) Exam Preparation Course 2025 • 5 Days

Vulnerability Assessment & Management

Digital Forensics

Investigation

} Penetration Testing: Tools & Techniques Course 537 • 4 Days } Digital Forensics: Tools & Techniques Course 2055 • 5 Days

}V ulnerability Assessment Course 589 • 4 Days

All Source Intelligence

Exploitation Analysis

Threat Analysis

} E C-Council Certified Security Analyst (ECSA) Exam Preparation Course 2024 • 5 Days } E ssentials of Activity-Based Intel. (ABI)* Course 8101 • 1 Day }A pplying Activity-Based Intel. Methods* Course 8205 • 5 Days

}C ompTIA Security+ Certification Exam Prep Course 446 • 5 Days }P enetration Testing: Tools & Techniques Course 537 • 4 Days

}S ocial Engineering Deceptions & Defenses Course 2012 • 3 Days

Information Systems Security Operations

Security Program Management

}S ystem & Network Security Introduction Course 468 • 4 Days }S ocial Engineering Deceptions & Defenses Course 2012 • 3 Days }C ompTIA A+ Certification Exam Prep Course 445 • 5 Days

} Certified Information Systems Auditor (CISA) Exam Prep Course 2040 • 4 Days } Cyber Security Risk Assessment & Management Course 2013 • 4 Days } Certified Information Systems Security Professional (CISSP) Exam Prep Course 2058 • 5 Days } (ISC)² Certified Cloud Security Professional (CCSP) Exam Prep Course 1213 • 5 Days

}C yber Security Risk Assessment & Management for the U.S. Government Course 2051 • 4 Days }S trategic Thinking for Operational Management Course 3310 • 3 Days } Certified Information Security Manager (CISM) Exam Prep Course 2036 • 4 Days } E C-Council Certified Chief Information Security Officer (CCISO) Exam Preparation Course 2026 • 5 Days

LEARN MORE AT: LEARNINGTREE.SE/CYBER OR CALL 08-506 668 00

= GCT CERTIFIED

}V ulnerability Assessment Course 589 • 4 Days } Penetration Testing: Tools & Techniques Course 537 • 4 Days } Advanced Threats: Targeted Attacks/Defenses Course 2054 • 4 Days

Learning Tree has developed a learning path of 5 GCT Certified Application Level Courses mapped to the IISP Skills Framework: •S ystem and Network Security Introduction Course 468 • 4 Days •C yber Risk Assessment and Management Course 2013 • 4 Days •D efending the Perimeter from Cyber Attacks Course 2010 • 4 days • Securing Web Applications, Services and Servers Course 940 • 4 days •P enetration Testing: Tools and Technique Course 537 • 4 days

* These courses are exclusively available for Private Team Training delivery at your preferred location

Optimizing IT Workforce Performance


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.