- Posted on
- No Comments
Right now, the IT industry is at a critical point: new vulnerabilities and associated cyber threats are discovered daily and cybersecurity incidents are on the rise, but there is an incredibly large, and growing, shortage of a skilled cybersecurity workforce. It is reported that currently there is upwards of 3.5 unfilled cybersecurity jobs.
And at a time when the skills shortage is increasing, the threat of a cyber attack and the cost that an organization will incur from an attack is increasing as well.
Course Length:Â 1 hour
Course Format:Â Instructor Led, Virtual or on site
Dates: 6 – 8 June 2022
Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to:
- Understand security compliance needs and requirements.
- Recognize and avoid phishing and other social engineering.
- Recognize and avoid viruses, ransomware, and other malware.
- Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.
In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.
Dates: 22 – 24 June 2022
Â
The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle.
This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.
Dates: 13 – 15 June 2022
Â
This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response.
This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation.