Cyber Security Learning Path

Page 1

COMPLIMENTARY WEBINAR ON DEMAND

Learning Tree Cyber Security Courses are Aligned With the NCWF as Defined by NICE

Cyber Security: Risk Management for the C-Suite

Using defined learning paths, gain the right skills to protect and defend your organization. Plus, take steps toward valuable Certifications, including CompTIA Security+, CISSP, CISA, CISM, CCSP, and many more!

SECURELY PROVISION

Information Assurance Compliance

Software Security Engineering

Conceptualizing, Designing, and Building Secure IT Systems

} Cyber Security: Accessibility & Quality Course 3674 • 4 Days } Vulnerability Assessment Course 589 • 4 Days

}S ecuring Web Applications, Services & Servers Course 940 • 4 Days }P enetration Testing: Tools & Techniques Course 537 • 4 Days }M obile Application & Device Security Course 2781 • 3 Days

OPERATE & MAINTAIN

Customer Service & Technical Support

Providing Support, Administration, and Maintenance of IT Systems

PROTECT & DEFEND Identification, Analysis, and Mitigation of Threats to Internal IT Systems or Networks

INVESTIGATE Investigation of Cyber Events and/or Crimes of IT Systems, Networks, and Digital Evidence

ANALYZE Review and Evaluation of Incoming Cyber Security Information

OVERSIGHT & DEVELOPMENT Providing Leadership, Management, Direction, and/or Development of Advocacy

Webinar On Demand 1068 • 1 Hour

Presented by RICHARD A. SPIRES CEO, Learning Tree

SEE NEXT PAGE TO LEARN MORE }

Systems Development

System Requirements Planning

}S ecuring Web Applications, Services & Servers Course 940 • 4 Days }C yber Security: Accessibility & Quality Course 3674 • 4 Days

}S ystem & Network Security Introduction Course 468 • 4 Days }D isaster Recovery Planning Course 289 • 4 Days } I dentity Management Course 2056 • 4 Days

Data Administration

Network Services

System Administration

Systems Security Analysis

}S QL Server Introduction Course 2107 • 4 Days } SQL Server Database Administration Course 2108 • 4 Days }R elational Database Design, Tools & Techniques* Course 382 • 4 Days

} Introduction to Networking Course 450 • 4 Days } Network Configuration & Troubleshooting Course 451 • 4 Days } CompTIA Network+ Certification Exam Prep Course 2708 • 5 Days

}W indows Server Group Policy Management* Course 963 • 4 Days

} Defending the Perimeter from Cyber Attacks Course 2010 • 4 Days }S ocial Engineering Deceptions & Defenses Course 2012 • 3 Days } Endpoint Security & Network Access Control Course 2011 • 4 Days

CND Analyst

CND Infrastructure Support

Incident Response

}C yber Security: Accessibility & Quality Course 3674 • 4 Days }C ompTIA Network+ Certification Exam Prep Course 2708 • 5 Days }C ompTIA Cybersecurity Analyst CSA+ Exam Preparation Course 2047 • 5 Days }C ertified Ethical Hacker (CEH) Certification Exam Prep Course 2031 • 5 Days } E C-Council Certified Hacking Forensic Investigator (CHFI) Exam Preparation Course 2023 • 4 Days

}S ystem & Network Security Introduction Course 468 • 4 Days }D efending the Perimeter from Cyber Attacks Course 2010 • 4 Days } E ndpoint Security & Network Access Control Course 2011 • 4 Days }C ertified Network Defender (CND) Course 2032 • 5 Days

}C ompTIA Security+ Certification Exam Prep Course 446 • 5 Days }D igital Forensics: Tools & Techniques Course 2055 • 5 Days } EC-Council Certified Incident Handler (ECIH) Exam Preparation Course 2025 • 5 Days

Vulnerability Assessment & Management

Digital Forensics

Investigation

}P enetration Testing: Tools & Techniques Course 537 • 4 Days } Digital Forensics: Tools & Techniques Course 2055 • 5 Days

}V ulnerability Assessment Course 589 • 4 Days

All Source Intelligence

Exploitation Analysis

Threat Analysis

} E C-Council Certified Security Analyst (ECSA) Exam Preparation Course 2024 • 5 Days } E ssentials of Activity-Based Intel. (ABI)* Course 8101 • 1 Day }A pplying Activity-Based Intel. Methods* Course 8205 • 5 Days

}C ompTIA Security+ Certification Exam Prep Course 446 • 5 Days }P enetration Testing: Tools & Techniques Course 537 • 4 Days

}S ocial Engineering Deceptions & Defenses Course 2012 • 3 Days

Information Systems Security Operations

Security Program Management

}S ystem & Network Security Introduction Course 468 • 4 Days }S ocial Engineering Deceptions & Defenses Course 2012 • 3 Days }C ompTIA A+ Certification Exam Prep Course 445 • 5 Days

}C ertified Information Systems Auditor (CISA) Exam Prep Course 2040 • 4 Days } Cyber Security Risk Assessment & Management Course 2013 • 4 Days }C ertified Information Systems Security Professional (CISSP) Exam Prep Course 2058 • 5 Days } (ISC)² Certified Cloud Security Professional (CCSP) Exam Prep Course 1213 • 5 Days

}V ulnerability Assessment Course 589 • 4 Days }P enetration Testing: Tools & Techniques Course 537 • 4 Days }A dvanced Threats: Targeted Attacks/Defenses Course 2054 • 4 Days

How Learning Tree Cyber Security Courses Align With the NCWF as defined by NICE As an example, the courses listed below provide knowledge and skills vital for workers who must perform the tasks associated with “Computer Network Defense Infrastructure Support”.

CND Infrastructure Support Training that Fulfills Required KSAs 1. System and Network Security Introduction Course 468 • 4 Days 2. D efending the Perimeter from Cyber Attacks Course 2010 • 4 Days 3. E ndpoint Security & Network Access Control Course 2011 • 4 Days

}C yber Security Risk Assessment & Management for the U.S. Government Course 2051 • 4 Days }S trategic Thinking for Operational Management Course 3310 • 3 Days } Certified Information Security Manager (CISM) Exam Prep Course 2036 • 4 Days } E C-Council Certified Chief Information Security Officer (CCISO) Exam Preparation Course 2026 • 5 Days

LEARN MORE AT: LEARNINGTREE.COM/CYBER OR CALL 1-800-843-8733

Computer Network Defense (CND) Infrastructure Support KSAs Required for Job Roles Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.

* These courses are exclusively available for Private Team Training delivery at your preferred location

Optimizing IT Workforce Performance


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.