Você está na página 1de 8

Global Knowledge

Cybersecurity Training
Your Solution for a Skilled Cyber Workforce

Whether its general cybersecurity awareness, secure network design and implementation, continuous
monitoring, network forensics and analysis, or smart and effective incident response training, we can prepare
you and your team to battle the latest cyber threats and attacks. Our broad cybersecurity training portfolio
was developed as a result of listening to and understanding the needs and strategic goals of enterprises across
countries and aligns to government and industry-issued standards and guidelines.
Based on these standards and guidelines, we have created a logically organised map of high-level security
disciplines, each including competencies and relevant courses to build IT security acumen.

Security Disciplines

Security Disciplines

Asset Protection
What do you have?
Threat Management
Whats coming at you?
Access Control
Who gets in?

Asset Protection

Incident Management
How do you handle failures?

Threat Management

Configuration Management
How do you manage the lifecycle?

Incident Management

Contingency Planning
How do you plan for failures?

Access Control

Configuration Management
Contingency Planning

From skills building to certification preparation, we offer training to meet every learning level and need.
The corresponding competencies and sample of courses per discipline are highlighted in this document.

info@globalknowledge.se

www.globalknowledge.se

2014 Global Knowledge Training LLC. All rights reserved.

Security Disciplines

Asset Protection
What do you have?
Asset Protection
Threat Management
Access Control

To protect your assets, you must first know where they are and understand how
they are tracked and managed: How are they secured? Who has access to them?
Are they tracked and managed? Do you have processes and procedures in place to
respond and recover from a security breach quickly?

Incident Management
Configuration Management
Contingency Planning

Asset Protection
Below is a sample of courses offered per competency and does not represent all courses available.

Cloud

Public Key Infrastructure (PKI)

Cloud Computing Essentials

Security+ Prep Course

RSA Cloud Security Fundamentals

Implementing Active Directory Federation Services 2.0

Data Center Infrastructure Management


VMware vCloud Director: Install, Configure & Manage
VMware vCloud: Overview

Information Assurance
CSFI: Introduction to Cyber Warfare

Business Analysis Essentials

CSFI: Defensive Cyber Operations Engineer

Virtualisation

Acceptance Testing for Quality Success

VMware vSphere: Install, Configure, Manage

Cyber Security Compliance & Mobility

VMware vCenter Configuration Manager for

Certification & Authorization Professional Prep

Virtual Infrastructure

Information Systems Security Engineering Professional

Enterprise Virtualisation using Microsoft Hyper-V

Information Systems Security Architecture Professional

Red Hat Enterprise Virtualisation

Information Assurance Overview

CSFI: Cyberspace Operations Strategist and Planning

Virtualisation Essentials
Virtual Project Management

Cloud/Virtualisation Vendor Training


Citrix, VMware, AppSense, Red Hat, Cisco, Microsoft, HP, IBM

Secure Coding
Foundstone Building Secure Software
Foundstone Writing Secure Code
Understanding Web Application Security Overview
Secure Application Development Seminar
Secure Web Application Development Seminar
Secure Software Design

info@globalknowledge.se

www.globalknowledge.se

2014 Global Knowledge Training LLC. All rights reserved.

Security Disciplines

Threat Management
Whats coming at you?
Asset Protection
Threat Management

Assess your vulnerabilities, threats and risks. Work to mitigate this risk and use
auditing and analysis to confirm your efforts. Humans can be your weakest link.
Ensure they have received adequate training to stay one step ahead of the attack.

Access Control
Incident Management
Configuration Management
Contingency Planning

Threat Management
Below is a sample of courses offered per competency and does not represent all courses available.

Audit & Analysis

Threat Assessment

Troubleshooting TCP/IP Networks with Wireshark


CISA Prep Course

CEH - Certified Ethical Hacker


CHFI - Computer Hacking Forensic Investigator
CSFI: Introduction to Cyber Warfare

CISM Prep Course


Information Systems Security Engineering Professional
Visualise, Prioritise and Secure your Network
Cybersecurity Investigations and Network Forensics Analysis:
Practical Techniques for Analysing Suspicious Network Traffic
ITIL Service Capability: Operational Support and Analysis

CSFI: Defensive Cyber Operations Engineer


Cybersecurity Investigations and Network Forensics Analysis:
Practical Techniques for Analysing Suspicious Network Traffic
Practical Techniques for Analysing VoIP Traffic
Practical Techniques for Analysing Wi-Fi Traffic
Data Modeling

Risk Assessment and Mitigation


Certified Authorization Professional

Information Systems Security Engineering Professional


Information Systems Security Architecture Professional
RSA Archer Administration

Vulnerability Assessment
CSFI: Introduction to Cyber Warfare
CSFI: Defensive Cyber Operations Engineer
Wireless LAN Security and Analysis

Risk Management

Advanced VoIP: Securing UC Networks

Deploying Cisco ASA Firewall Solutions

Foundstone Building Secure Software

Implementing Cisco Intrusion Prevention System

Foundstone Writing Secure Code

Cyber Security Compliance & Mobility


Foundstone Risk Assessment Principles and Practices

Social Engineering
Social Media Security Professional
Social Media Engineering & Forensics Professional 
Social Media Management & Governance Professional
Security+ Prep Course
Cybersecurity Foundations
Cyber Security Compliance & Mobility

info@globalknowledge.se

www.globalknowledge.se

2014 Global Knowledge Training LLC. All rights reserved.

Security Disciplines

Access Control
Who gets in?
Asset Protection

Control who has access by locking down your systems, including hosts, networks,
applications and data flows.

Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning

Access Control
Below is a sample of courses offered per competency and does not represent all courses available.

Communication Security

Communication and Remote Access Vendors

Advanced VoIP: Securing UC Networks

Cisco,Juniper,Blue Coat,F5,Checkpoint,DellSonicWall,

Wireless LAN Security and Analysis 

Citrix, Microsoft

Troubleshooting TCP/IP Networks with Wireshark


SIP Protocol Essentials

Logging and Monitoring


Requirements Validation and Testing

Cisco Secure Access Control System

Unix Fundamentals 

Deploying Cisco ASA VPN Solutions


Cisco Advanced SSL VPN

ITIL Service Capability: Release, Control, and Validation

Dell SonicWALL Secure Remote Access

Penetration Testing

Basic Administrator (SRABA)

Certified Ethical Hacker

IPv6 Security Migration


HDI Knowledge Management Foundations: KCS Principles
Cybersecurity Compliance & Mobility
ITIL Service Lifecycle: Planning, Protection, and Optimisation

Advanced VoIP: Securing UC Networks


Data Modeling
Foundstone Ultimate Hacking 

Cryptography

Global Communications

Security+ Prep Course

Remote Access
Cisco Secure Access Control System
Implementing Cisco IOS Network Security
Deploying Cisco ASA VPN Solutions

CISSP
Foundstone Writing Secure Code
Information Systems Security Architecture Professional

Check Point Security Expert R75

IDS/IPS/IDP

Junos Security

Implementing Cisco Intrusion Prevention System 

info@globalknowledge.se

www.globalknowledge.se

2014 Global Knowledge Training LLC. All rights reserved.

Security Disciplines

Incident Management
How do you handle failures?
Asset Protection
Threat Management

Perform continuous monitoring with event management tools and maximise


your ability to provide an immediate response. Use strong policies that are well
communicated for a consistent and uniform reaction.

Access Control
Incident Management
Configuration Management
Contingency Planning

Incident Management
Below is a sample of courses offered per competency and does not represent all courses available.

Continuous Monitoring/Security Incident and


Event Management (SIEM)
CSFI - Cyberspace Operations Strategist and Planning
CSFI: Introduction to Cyber Warfare

Incident Response
Foundstone Forensics & Incident Response
Computer Hacking Forensic Investigator
Kepner Tregoe Foundation (Enterprise only)

CSFI: Defensive Cyber Operations Engineer

ITIL Service Capability: Operational Support and Analysis

Agile Project Management

Enterprise Incident Response Management

Data Modeling

Advanced Memory Forensics in Incident Response

ITIL Service Capability: Operational Support and Analysis


Leading Complex Projects

Reverse Engineering
Foundstone Forensic and Incident Response 

Forensics

CSFI: Introduction to Cyber Warfare

Foundstone Forensics & Incident Response

CSFI: Defensive Cyber Operations Engineer

Computer Hacking Forensic Investigator


Troubleshooting TCP/IP Networks with Wireshark
Cybersecurity Investigations and Network Forensics Analysis:
Practical Techniques for Analysing Suspicious Network Traffic
Practical Techniques for Analysing VoIP Traffic
Practical Techniques for Analysing Wi-Fi Traffic

Hacking & Cyber Warfare


CSFI: Introduction to Cyber Warfare
CSFI: Defensive Cyber Operations Engineer
Certified Ethical Hacker 
Foundstone Ultimate Hacking
Database Hacking and Security Training: Securing Databases

info@globalknowledge.se

www.globalknowledge.se

2014 Global Knowledge Training LLC. All rights reserved.

Security Disciplines

Configuration Management
How do you manage the lifecycle?
Asset Protection

Continuously managing changes to the IT landscape of your organisation requires


due diligence to ensure your systems are optimally organised and interconnected.

Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning

Configuration Management
Below is a sample of courses offered per competency and does not represent all courses available.

Architecture & Design

Change Management

Information Systems Security Architecture Professional

Schedules and Costs Controls

RSA Archer Administration

Business Analysis Essentials

Introduction to IPv6: Protocols, Services, and Migration

Certification & Authorisation Professional Prep 

Advanced IPv6 Migration

ITIL Service Lifecycle: Service Transition

IPv6 Security Migration

Operations Planning

IPv6 Fundamentals, Design, and Deployment 

CSFI: Cyberspace Operations Strategist and Planning

Acceptance Testing for Quality Success

ITIL Foundations

ITIL Foundations

ITIL Service Capability: Service Offerings and Agreements

ITIL Service Lifecycle: Service Design

CISSP Prep Course

Application Security & Development

ITIL Service Lifecycle: Service Transition

Secure Software Design


Building Secure Software

Security Testing

Building a Quality Software Architecture

Certified Ethical Hacker

Creating the Systems Architecture

Acceptance Testing for Quality Success

Understanding Secure SOA: A Technical Overview 

CISA Prep Course

Adopting Agile Software Development Practices 

Business Alignment
Data Modeling
ITIL Service Lifecycle: Continual Service Improvement
Business Process Analysis
CISM Prep Course

info@globalknowledge.se

www.globalknowledge.se

2014 Global Knowledge Training LLC. All rights reserved.

Security Disciplines

Contingency Planning
How do you plan for failures?
Asset Protection

Ensure your organisation has planned for continuity after an attack. Failures happen;
how best do you respond?

Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning

Contingency Planning
Below is a sample of courses offered per competency and does not represent all courses available.

Business Impact Analysis

Disaster Recovery

Data Modeling

Data Domain System Administration

Schedules and Cost Control

Symantec Backup Exec 12.x for Windows Servers:Administration

Business Analysis Essentials

Performance Analysis on Data ONTAP

ITIL Service Lifecycle: Service Design

Cybersecurity Foundations
CISSP Prep Course

Communication Plan
ITIL Service Lifecycle: Continual Service Improvement

Continuity of Operations
Information Systems Security Architecture Professional
Business Analysis Essentials
Agile Project Management Certification Workshop
ITIL Service Cabability: Planning, Protection, and Optimisation

The courses listed are only a sample of what we can offer. To help you and your team build and maintain your
expertise, we continually add premium content to our curriculum. Contact us today to learn more.

Conclusion
The constantly evolving cybersecurity landscape requires heavily armed IT security professionals whose skills are
also constantly evolving. Our security curriculum is constantly evolving to keep pace with the threat landscape
and the needs of organisations big or small.
We are your source for IT security skills building and offer a robust security curriculum ranging from novice to
expert. Couple this with premium content, expert instruction and training for every learning style and budget.
Contact us today and we will develop a learning plan to best meet your needs for today and tomorrow.

Learn More
www.globalknowledge.net/security

info@globalknowledge.se

www.globalknowledge.se

2014 Global Knowledge Training LLC. All rights reserved.

EMEA HQ - UK:
Global Knowledge
Thames Valley Training Centre
Mulberry Business Park,
Fishponds Rd,
Wokingham,
Berkshire,
RG41 2GY
T +44 (0) 1189 777700
F +44 (0) 1189 777767
E info@globalknowledge.net

Dubai:
Global Knowledge
Dubai Knowledge Village
Block 2A, first floor, Office F-68,
PO Box 500716
T +971 4 446 4987/72
F +971 4 366 4554
E training@globalknowledge.ae

Norway:
Global Knowledge
Grenseveien 97,
N-0663 Oslo,
Postboks 6256 Etterstad,
N-0603 Oslo, Norway
T +47 2295 6600
F +47 22 95 6601
E info@globalknowledge.no

Austria:
Global Knowledge
Gutheil-Schoder-Gasse 7a
A-1101 Vienna
T +43 (1) 66 55 655-0
F +43 (1) 66 55 655-6
E info@globalknowledge.at

Egypt:
Global Knowledge
16 Moustafa Refaat St. Block 1137,
Sheraton Heliopolis, Cairo
T +20 2 2269 1982 or 16142
F +20 2 2269 2041
E training@globalknowledge.com.eg

Saudi Arabia:
Global Knowledge
Diplomatic Quarter, Al-Fazzari Complex
Office C13
P.O. Box 17969 Riyadh 11494
T +966 1 488 8484
F +966 1 488 5539
E training@globalknowledge.com.sa

Abu Dhabi:
Global Knowledge
Office 606A, Park Rotana Office
Complex, Khalifa Park, Sector
E-48, PO Box 769254, Abu Dhabi
T +971 2 234 4020/19
F +971 4 366 4554
E training@globalknowledge.ae

France:
Global Knowledge
100, Avenue Albert 1er
92500 Rueil-Malmaison
T +33 (0)1 78 15 34 00
F +33 (0)1 78 15 33 90
E info@globalknowledge.fr

Spain:
Global Knowledge
Edificio Indocentro
Calle de la Retama 7, 6a planta
28045 - Madrid, ES
T +34 91 425 06 60
F +34 91 579 55 95
E info.cursos@globalknowledge.es

Belgium:
Global Knowledge
Zandvoortstraat 1
2800 Mechelen
T +32 15 27 65 35
F +32 15 20 49 50
E info@globalknowledge.be

Ireland:
Global Knowledge
3rd Floor Jervis House
Millennium Walkway
Dublin 1
T +353 (0)1 814 8200
F +353 (0)1 814 8210
E info@globalknowledge.ie

Sweden:
Global Knowledge
Vretenvgen 13, plan 3
Box 6031
171 54 Solna (Stockholm)
T +46 8 445 16 60
F +46 8 28 14 07
E info@globalknowledge.se

Denmark:
Global Knowledge
Stamholmen 110,
2650 Hvidovre
T 44 88 18 00
F 44 88 18 42
E training@globalknowledge.dk

Netherlands:
Global Knowledge
Iepenhoeve 5
3438 MR
Nieuwegein
T +31 (0)30 60 89 311
F +31 (0)30 60 61 652
E info@globalknowledge.nl

UK:
Global Knowledge
Thames Valley Training Centre
Mulberry Business Park,
Fishponds Rd,
Wokingham,
Berkshire,
RG41 2GY
T +44 (0)1189 123456
F +44 (0)1189 195109
E info@globalknowledge.co.uk

Copyright 2014 Global Knowledge Training LLC. All rights reserved.


Global Knowledge reserves the right to change pricing, registration terms and conditions, course content, products or program, course events or cancel a
course at any time without notice or liability. Whilst every effort has been made to ensure the accuracy of the information contained within the publication
Global Knowledge will not accept responsibility for any inadvertent errors.
For complete terms and conditions, visit www.globalknowledge.net
Global Knowledge and the Global Knowledge logo are trademarks of Global Knowledge Training LLC.
All other trademarks mentioned are the property of their respective owners.

Você também pode gostar