ADDRESS
DC Metropolitian Area
CONTACT
e: startaconversation@international-training.com
p: 301.428.0670
Cyber Security
I.
Cyber Security Course Description
The ability to secure information within a modern enterprise—large or small—is a growing challenge. Threats to information security are global, persistent, and
increasingly sophisticated. Effective information security at the enterprise level requires participation, planning, and practice. It is an ongoing effort that requires
management and staff to work together from the same script. Fortunately, the information security community has developed a variety of resources, methods, and best
practices to help modern enterprises address the challenge.
Unfortunately, employing these tools demands a high degree of commitment, understanding, and skill—attributes that must be sustained through constant awareness
and training. Ineffective physical security, for example, can undermine otherwise effective information system security, and vice versa. Effective security at the
enterprise level requires the effective interaction of physical security, information security, personnel security, and so on—indeed, all branches of security must interact
effectively as a system to achieve overall enterprise security. This course is designed to teach mid-level security practitioners how to engage all functional levels within
the enterprise to deliver information system security.
I.
Course Objectives
Student Outcomes/Objectives: At the end of this course, students will be expected to be able to:
Assess the current security landscape, including the nature of the threat, the general status of common vulnerabilities, and the likely consequences of security
failures
Critique and assess the strengths and weaknesses of general cybersecurity models, including the CIA triad
Appraise the interrelationships among elements that comprise a modern security system, including hardware, software, policies, and people
Assess how all domains of security interact to achieve effective system-wide security at the enterprise level
Compare the interrelationships among security roles and responsibilities in a modern information-driven enterprise—to include interrelationships across security
domains (IT, physical, classification, personnel, and so on)
Assess the role of strategy and policy in determining the success of information security
Estimate the possible consequences of misaligning enterprise strategy, security policy, and security plans
Design a notional information security plan that incorporates relevant principles of lifecycle management
Evaluate the principles of risk and conduct a notional risk management exercise
Assess the role of good metrics and key performance indicators (KPIs) in security assessment and governance
Create a good set of information security metrics
Critique the current legal and regulatory environment as it applies to cybersecurity
Identify and contrast the most common security standards and associated catalogues of security controls
Contrast the various approaches to security training and formulate a simple training agenda
Justify the need for business continuity planning and propose how to implement such a plan successfully within a modern enterprise
Compare and contrast logical and physical security
Assess the strengths and weaknesses of the certification and accreditation approach to cybersecurity
Evaluate the trends and patterns that will determine the future state of cybersecurity
I.
Suggested Audience
The course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles,
security metrics, risk management, standards and regulations, physical security, and business continuity. Each piece of the puzzle must be in place for the enterprise to
achieve its security goals; adversaries will invariably find and exploit weak links. The course emphasizes the practical implications of cybersecurity management to
roles and missions through the application and study of timely examples. This course is intended for civilian and military personnel who perform security leadership
and management duties.
Cyber Security