Cyber Security Certificate Intensive
CERTIFICATE OF COMPLETION
All students who finish this program will receive a signed certificate of completion verifying their participation in the program.
This two-day certificate intensive is an opportunity for professionals and business owners to learn about key aspects of managing cyber security risks. The course teaches ways in which companies are getting hacked, along with guidance for developing a holistic cyber security program to defend against the attackers. From penetration testing to social engineering to program development you'll learn the latest and most relevant information to help understand and address the ever-changing cyber security threat landscape.
Day 1: Saturday
Morning Session 1: State of the Hack
Learn about who is being targeted and why. From organized crime rings to nation state actors, we'll hit the ground running with an in depth discussion about the cyber threat landscape.
Morning Session 2: How Do Organizations Get Breached?
From unpatched systems, to poorly coded web applications, to social engineering attacks, this session dives deeper into the actual techniques used by attackers to compromise your systems and data.
Afternoon Session 1: Penetration Testing & Vulnerability Assessments
Penetration testing or "ethical hacking" should be a key component of any information security program. This helps the organization identify and remediate technical deficiencies which could be exploited by a malicious actor. Attendees will gain an understanding of how to best leverage penetration tests vs. vulnerability scans, tips for selecting a qualified penetration testing vendor, and methods for prioritizing remediation efforts once the findings are delivered.
Afternoon Session 2: Automated Tools to Improve Security
Learn best practices for implementing automated tools in your operations to improve the security posture of the environment. Topics include patch management, vulnerability scanning, system configuration review, and more.
Day 2: Sunday
Morning Session 1: Compliance vs. Security
Meeting compliance insures that a certain baseline set of controls, policies, and procedures are in place for an organization, but does not necessarily insure that sensitive information is truly secure. A discussion on the spectrum of compliance to security identifies similarities and differences between the two.
Morning Session 2: Developing an information security program
Improving the security posture of your organization begins with an acknowledgment that there are issues which need to be addressed. But then what? Attendees will learn how to develop a holistic information security program using the 3-tiered approach of IT audit, technical testing, and security awareness training.
Afternoon Session 1: Social Engineering & Security Awareness
Last year over 90% of data breaches were initiated with a phishing email. The discussion covers the full spectrum of social engineering trends and techniques being used by the attackers, along with key security awareness lessons for avoiding social engineering attacks.
Afternoon Session 2: Security Resources
A review of information security peer groups, associations, job sites, and publications to keep current with the industry and emerging trends in the field.
As CEO of Security Pursuit, Steve Fox has helped hundreds of organizations develop their information security programs. He is actively involved in assisting clients with data breach response and prevention, information security program development and security awareness training. His clients include fortune 500 companies across the financial services, health care, energy, retail, and government sectors. Steve's educational background includes a Master's Degree from George Washington University, a Bachelor's Degree from University of Missouri, a Certificate in Computer Programming from Montgomery College, along with the CISA, CISSP, GCFA, GPEN and GWAPT industry certifications. Steve brings unique insight about the risks organizations face from malicious hackers.
BDA Members: $449.00