Está en la página 1de 8

Cybersecurity Training Courses

Whether its general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis, or smart and effective incident response training, we can prepare you and your team to battle the latest cyber threats and attacks. Our broad
cybersecurity training portfolio was developed as a result of listening to and understanding the needs and strategic goals of enterprises across
the nation and aligns to government and industry-issued standards and guidelines.
Based on these standards and guidelines, we have created a logically organized map of high-level security disciplines, each including competencies and relevant courses to build IT security acumen. The disciplines include:

Security Disciplines

Security Disciplines

Asset Protection
What do you have?
Threat Management
Whats coming at you?
Access Control
Who gets in?

Asset Protection

Incident Management
How do you handle failures?

Threat Management

Configuration Management
How do you manage the lifecycle?

Incident Management

Contingency Planning
How do you plan for failures?

Access Control

Configuration Management
Contingency Planning

From skills building to certification preparation, we offer training to meet every learning level and need. The corresponding competencies and
sample of courses per discipline are highlighted in this document.

CTC-002

1-800-COURSES www.globalknowledge.com/security

2013 Global Knowledge Training LLC. All rights reserved.

Security Disciplines

Asset Protection
What do you have?
To protect your assets, you must first know where they are and understand how they are tracked and managed: How are they secured? Who has access to them? Are they tracked and managed? Do you have processes and procedures in place to respond and recover from a security breach quickly?

Asset Protection
Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning

Asset Protection
Below is a sample of courses offered per competency and does not represent all courses available.

Cloud

Public Key Infrastructure (PKI)

Cloud Computing Essentials

Course 2459

Security+ Prep Course

Course 9926

RSA Cloud Security Fundamentals

Course 9748

Implement AD Fed Serv 2.0

Course 6307

Data Center Infrastructure Management

Course 3205

VMWare vCloud Director: Install, Configure & Manage v 5.1

Course 3148

VMware vCloud: Overview

Course 3187

Business Analysis Essentials

Course 2919

Virtualization
VMware vSphere: Install, Configure, Manage [V5.1]

Information Assurance
CSFI: Introduction to Cyber Warfare

Course 9719

CSFI: Defensive Cyber Operations Engineer (DCOE)

Course 9733

CSFI: Cyberspace Operations Strategist and Planning (COSP)

Course (*)

FISMA In-Depth

Course (*)

Course 3139

Acceptance Testing for Quality Success

Course 2936

Vmware vCenter Configuration Manager for Virtual Infrastructure Course 3112

Cyber Security Compliance & Mobility

Course 9723

Enterprise Virtualization using Microsoft Hyper-V

Course 6130

Certification & Authorization Professional (CAP) Prep

Course 9724

Red Hat Enterprise Virtualization

Course 1254

Information Systems Security Engineering Professional (ISSEP)

Course 9759

Virtualization Essentials

Course 2460

Information Systems Security Architecture Professional (ISSAP)

Course 9760

Virtual Project Management

Course 2943

Information Assurance (STIG) Overview

Cloud/Virtualization Vendor Training


Citrix

VMware

AppSense

Red Hat

Cisco

Microsoft

Course (*)

*Denotes content available for instruction

Secure Coding
Foundstone Building Secure Software

Course 9822

Foundstone Writing Secure Code

Course 9823

Understanding Web Application Security Overview

Course 1117

Secure Application Development Seminar

Course 1118

Secure Web Application Development Seminar

Course 1120

Secure Software Design

Course 1128

The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.

2

1-800-COURSES www.globalknowledge.com/security

Security Disciplines

Threat Management
Whats coming at you?
Asset Protection
Threat Management

Assess your vulnerabilities, threats, and risks. Work to mitigate this risk, and use auditing and analysis to
confirm your efforts. Humans can be your weakest link. Ensure they have received adequate training to stay
one step ahead of the attack.

Access Control
Incident Management
Configuration Management
Contingency Planning

Threat Management
Below is a sample of courses offered per competency and does not represent all courses available.

Audit & Analysis

Social Engineering

Troubleshooting TCP/IP Networks with Wireshark Course

Course 9879

Social Media Security Professional (SMSP)

CISA Prep Course

Course 9870

Social Media Engineering & Forensics Professional (SMEFP)

Course (*)

CISM Prep Course

Course 9871

Social Media Management & Governance Professional (SMMGP)

Course (*)

Information Systems Security Engineering Professional (ISSEP)

Course 9759

Security+ Prep Course

Course 9926

Visualize, Prioritize and Secure your Network

Course 6706

Cybersecurity Foundations

Course 9701

Cyber Security Compliance & Mobility

Course 9723

Cybersecurity Investigations and Network Forensics Analysis:


Practical Techniques for Analyzing Suspicious Network Traffic
ITIL Service Capability: Operational Support and Analysis

Course 9601
Course 2727

Threat Assessment
CEH - Certified Ethical Hacker v8

Risk Assessment and Mitigation


Certified Authorization Professional
FISMA In-Depth

CHFI - Computer Hacking Forensic Investigator


Course 9724
Course (*)

Course 9778

Course 9776
Course (*)

CSFI: Introduction to Cyber Warfare

Course 9719

CSFI: Defensive Cyber Operations Engineer (DCOE)

Course 9733

Information Systems Security Engineering Professional (ISSEP)

Course 9759

Information Systems Security Architecture Professional (ISSAP)

Course 9760

RSA Archer Administration

Course 9738

Practical Techniques for Analyzing VoIP Traffic

Course 9602

Risk Management

Course 2811

Practical Techniques for Analyzing Wi-Fi Traffic

Course 9603

FIREWALL 2.0 Deploying Cisco ASA Firewall Solutions

Course 5773

Data Modeling

Course 2711

Implementing Cisco Intrusion Prevention System v7.0

Course 5744

Cyber Security Compliance & Mobility

Course 9723

Foundstone Risk Assessment Principles and Practices

Course (*)

Cybersecurity Investigations and Network Forensics Analysis:


Practical Techniques for Analyzing Suspicious Network Traffic

Course 9601

Vulnerability Assessment
CSFI: Introduction to Cyber Warfare

Course 9719

CSFI: Defensive Cyber Operations Engineer (DCOE)

Course 9733

Wireless LAN Security and Analysis

Course 3607

Advanced VoIP: Securing UC Networks

Course 3290

Foundstone Building Secure Software

Course 9822

Foundstone Writing Secure Code

Course 9823

*Denotes content available for instruction.

The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.

1-800-COURSES www.globalknowledge.com/security

Security Disciplines

Access Control
Who gets in?
Control who has access by locking down your systems, including hosts, networks, applications, and data
flows.

Asset Protection
Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning

Access Control
Below is a sample of courses offered per competency and does not represent all courses available.

Communication and Remote Access Vendors

Communication Security
Advanced VoIP: Securing UC Networks

Course 3290

Wireless LAN Security and Analysis 

Course 3607

Troubleshooting TCP/IP Networks with Wireshark

Course 9879

SIP Protocol Essentials

Course 3251

ACS 5.2 Cisco Secure Access Control System

Course 5498

VPN 2.0 Deploying Cisco ASA VPN Solutions

Course 5774

Cisco Advanced SSL VPN

Course 5761

IPv6 Security Migration

Cybersecurity Compliance & Mobility

Global Communications

Course 2655

Unix Fundamentals 

Course 4201

ITIL Service Capability: Release, Control, and Validation

Course 2726

Penetration Testing

Course 0402

Advanced VoIP: Securing UC Networks

Course 3290

Course 9604

Data Modeling

Course 2711

Foundstone Ultimate Hacking 

Course 9810

Course 2542
Course 9723

ITIL Service Lifecycle:


Planning, Protection, and Optimization

Requirements Validation and Testing

Course 9776

HDI Knowledge Management Foundations:


KCS Principles

Logging and Monitoring

Certified Ethical Hacker v8

Dell SonicWALL Secure Remote Access


Basic Administrator (SRABA)

CiscoJuniperBlue CoatF5CheckpointDellSonicWallCitrix

Course 2724
Course (*)

Remote Access

Cryptography
Security+ Prep Course

Course 9926

CISSP

Course 9840

Foundstone Writing Secure Code

Course 9823

Information Systems Security Architecture Professional (ISSAP)

Course 9760

ACS 5.2 Cisco Secure Access Control System

Course 5498

IDS/IPS/IDP

IINS Implementing Cisco IOS Network Security

Course 5241

Implementing Cisco Intrusion Prevention System v7.0 

VPN 2.0 Deploying Cisco ASA VPN Solutions

Course 5747

Check Point Security Expert (CCSE) R75

Course 9979

Junos Security (JSEC)

Course 7216

Course 5744

*Denotes content available for instruction

The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.

4

1-800-COURSES www.globalknowledge.com/security

Security Disciplines

Incident Management
How do you handle failures?
Asset Protection

Perform continuous monitoring with event management tools and maximize your ability to provide an immediate response. Use strong policies that are well communicated for a consistent and uniform reaction.

Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning

Incident Management
Below is a sample of courses offered per competency and does not represent all courses available.

Continuous Monitoring/Security Incident and


Event Management(SIEM)
CSFI - Cyberspace Operations Strategist and Planning (COSP)

Hacking & Cyber Warfare


Course (*)

CSFI: Introduction to Cyber Warfare

Course 9719

CSFI: Defensive Cyber Operations Engineer (DCOE)

Course 9733

CSFI: Introduction to Cyber Warfare

Course 9719

Certified Ethical Hacker v8

Course 9776

CSFI: Defensive Cyber Operations Engineer (DCOE)

Course 9733

Foundstone Ultimate Hacking

Course 9810

FISMA In-Depth

Course (*)

Agile Project Management

Course 2503

Data Modeling

Course 2711

ITIL Service Capability: Operational Support and Analysis

Course 2727

Leading Complex Projects

Course 2653

Forensics
Foundstone Forensics & Incident Response
Computer Hacking Forensic Investigator (CHFI)
Troubleshooting TCP/IP Networks with Wireshark

Course 9873
Course (*)
Course 9879

Cybersecurity Investigations and Network Forensics Analysis:

Database Hacking and Security Training: Securing Databases

Course (*)

Incident Response
Foundstone Forensics & Incident Response
Computer Hacking Forensic Investigator (CHFI)

Course 9873
Course (*)

Kepner Tregoe Foundation (Enterprise only)

Course 2443

ITIL Service Capability: Operational Support and Analysis

Course 2727

Enterprise Incident Response Management

Course (*)

Advanced Memory Forensics in Incident Response

Course (*)

Reverse Engineering

Course 9601

Foundstone Forensic and Incident Response Education

Course 9873

Practical Techniques for Analyzing VoIP Traffic

Course 9602

CSFI: Introduction to Cyber Warfare

Course 9719

Practical Techniques for Analyzing Wi-Fi Traffic

Course 9603

CSFI: Defensive Cyber Operations Engineer (DCOE)

Course 9733

Practical Techniques for Analyzing Suspicious Network Traffic

*Denotes content available for instruction

The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.

1-800-COURSES www.globalknowledge.com/security

Security Disciplines

Configuration Management
How do you manage the lifecycle?
Continuously managing changes to the IT landscape of your organization requires due diligence to ensure
your systems are optimally organized and interconnected.

Asset Protection
Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning

Configuration Management
Below is a sample of courses offered per competency and does not represent all courses available.

Architecture & Design


Information Systems Security Architecture Professional (ISSAP)
FISMA In-Depth 

Business Alignment
Course 9760
Course (*)

Data Modeling

Course 2711

ITIL Service Lifecycle: Continual Service Improvement

Course 2723

RSA Archer Administration

Course 9738

Business Process Analysis

Course 2818

Introduction to IPv6: Protocols, Services, and Migration

Course 9105

CISM Prep Course

Course 9871

Advanced IPv6 Migration

Course 9110

IPv6 Security Migration

Course 9604

IPv6 Fundamentals, Design, and Deployment v3.0 

Course 5764

Acceptance Testing for Quality Success

Course 2936

ITIL Foundations

Course 2975

ITIL Service Lifecycle: Service Design

Course 2720

Change Management
Schedules and Costs Controls

Course 2809

Business Analysis Essentials

Course 2919

Certification & Authorization Professional Prep (CAP)

Course 9724

ITIL Service Lifecycle: Service Transition

Course 2721

Application Security & Development (STIGS)

Course (*)

Operations Planning

Secure Software Design

Course (*)

CSFI: Cyberspace Operations Strategist and Planning (COSP)

Building Secure Software

Course (*)

ITIL Foundations

Course 2975

Building a Quality Software Architecture

Course (*)

ITIL Service Capability: Service Offerings and Agreements

Course 2725

Creating the Systems Architecture

Course (*)

CISSP Prep Course

Course 9840

Understanding Secure SOA: A Technical Overview 

Course (*)

ITIL Service Lifecycle: Service Transition

Course 2721

Adopting Agile Software Development Practices 

Course (*)

Security Testing

Course (*)

Certified Ethical Hacker v8

Course 9776

Acceptance Testing for Quality Success

Course 2936

CISA Prep Course

Course 9870

FISMA In-Depth

Course (*)

*Denotes content available for instruction

The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.

6

1-800-COURSES www.globalknowledge.com/security

Security Disciplines

Contingency Planning
How do you plan for failures?
Ensure your organization has planned for continuity after an attack. Failures happen; how best do you respond?
Asset Protection
Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning

Contingency Planning
Below is a sample of courses offered per competency and does not represent all courses available.

Business Impact Analysis

Disaster Recovery

Data Modeling

Course 2711

Data Domain System Administration

Schedules and Cost Control

Course 2809

Symantec Backup Exec 12.x for Windows Servers: Administration  Course 9712

Business Analysis Essentials

Course 2919

Performance Analysis on Data ONTAP 7.3

Course 4823

ITIL Service Lifecycle: Service Design

Course 2720

Cybersecurity Foundations

Course 9701

CISSP Prep Course

Course 9840

Communication Plan
ITIL Service Lifecycle: Continual Service Improvement

Course 4409

Course 2723

Continuity of Operations
Information Systems Security Architecture Professional (ISSAP)

Course 9760

Business Analysis Essentials

Course 2919

Agile Project Management Certification Workshop

Course 2401

ITIL Service Cabability: Planning, Protection, and Optimization

Course 2724

The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.

1-800-COURSES www.globalknowledge.com/security

Conclusion
The constantly evolving cybersecurity landscape requires heavily armed IT security professionals whose skills are also constantly evolving. Our
security curriculum is constantly evolving to keep pace with the threat landscape and the needs of organizations big and small.
We are your source for IT security skills building and offer a robust security curriculum ranging from novice to expert. Couple this with premium
content, expert instruction, and training for every learning style and budget.
Contact us today and we will develop a learning plan to best meet your needs for today and tomorrow.

Learn More
www.globalknowledge.com/security
1-800-COURSES

También podría gustarte