Cyber Security School

Size: px
Start display at page:

Download "Cyber Security School"

Transcription

1 Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT

2 "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy , HM Government Solving the Cyber Security skills gap Cyber crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat. In response to this growing threat, QA has developed a number of solutions under our Cyber. As part of the academy, and built to deliver the foundation of critical skills, the QA Cyber Security School offers organisations a tangible solution to attract, develop and deploy Cyber Professionals. QA.COM/CYBER

3 Our Cyber Academy SCALABLE SOLUTIONS TO SOLVE THE CYBER Cyber The QA Cyber consists of specific programmes that enable individuals and organisations to develop critical Cyber Security skills. Tailored to the needs of individual organisations and aligned to their business objectives these extended programmes ensure delivery of grounded Cyber Security Professionals for now and the future. To discuss your Cyber Security needs, please contact Cyber Attract, select and train your own Cyber Professionals with your bespoke Cyber School Programme to produce the skills your business requires. Cyber SOC CYBER ANALYST SUMMER PROGRAMME SCHOOLS Unique multi entry point handson programme delivering practical skills to your team. This ensures you optimise your triage and incident response processes and develop humanistic threat hunting behaviours to enhance your offensive defensive capability. Cyber CYBER GRADUATE PROGRAMMES Bespoke programmes to fast track your Graduates to embed them in your business a blend of Cyber Technical skills and business soft skills to increase their productivity and understanding of your business.

4 The QA Cyber School Attract Potential Cyber Professionals Cyber Security Leadership and Team Building SCALABLE AND BESPOKE Operating Systems System Internals and Reverse Engineering Built from the experience of providing Cyber Security talent development programmes into UK Government, the QA Cyber School is now available to organisations who need to attract and future proof their Cyber skills. Networks and the Web Coding Advanced penetration testing and ethical hacking Hands-on Capture the Flag With a range of modules that teach cutting edge Cyber skills in an enjoyable, friendly and fun environment. The QA Cyber School attracts and develops the best possible candidates to become your Cyber Professionals. Penetration Testing and Ethical Hacking Deploy Security Operations Centre Subject Matter Projects Delegates own Security Project Deploy Cyber Professionals

5 NEEDS BASED RECRUITMENT SUITABILITY ASSESSMENTS + PARTNER WITH YOU ON ATTRACTION CAMPAIGNS: TECHNICAL & PERSONAL SKILLS This Early Years Careers intervention will help furnish your future recruitment pipeline, by exposing young people to your business and culture prior to them leaving education. We provide pre-engagement screening assessments which ensure that the students you engage with have the right levels of motivation and attitude to learn. That they are motivated to grow and develop their Cyber Security skills which will benefit your business.

6 ACADEMIC & PRACTICAL DESIGNED AND BUILT FOR YOU YOUR VALUES YOUR SKILLS NEEDS + = YOUR PROGRAMME EFFECTIVE LEARNING Our instructors provide ongoing academic and practical coaching and mentoring throughout the Cyber School Programme ensuring each and every individual has the best learning experience. VALUES Build in your Company policies, ethics values and cultures. SKILLS Define the skills you require. Showcase your facilities and culture. Engage attendees in your business. YOUR PROGRAMME Tailored to your needs, delivered to the QA standard.

7 MENTORING & COACHING ACCOMMODATION & PASTORAL CARE PROVIDING SUPPORT* & HELP TO THOSE WHO ATTEND BEYOND THE CLASSROOM QA's instructors will provide ongoing coaching and mentoring throughout the Cyber School Programme. QA has the experience, instructors and support staff to ensure that your Cyber School produces skilled, business ready candidates with an understanding of your organisations and values that you hold dear. Our Cyber Schools can be built to support existing in house programmes to, add in another layer of Cyber Security expertise, or we can build the entire programme from inception to end deployment of Cyber students into your work place. *All our pastoral care supervisors and instructors are Disclosure and Baring Service (DBS) cleared. QA can arrange student accommodation and supporting pastoral care for every attendee. Our accommodation ensures each student has the privacy of their own room and the benefit of communal spaces designed to encourage cohorts to interact with.

8 HAND PICK YOUR PROFESSIONALS ATTRACT DEVELOP DEPLOY ATTRACTION CAMPAIGNS ASSESSMENT PROCESSES TALENT DEPLOYMENT MEASUREMENT AND ASSESSMENT Throughout the programme we deploy a range of measurement and assessment methodologies to ensure you get the highest quality talent. The QA Cyber School offers students a unique way to develop their Cyber Security skills either on-site or at one of QA's stateof-the-art training centers. Students learn in a fun and friendly environment, with access to the latest technology, security experts, as well as having the opportunity to undertake Cyber Security exercises in a safe environment.

9 "Developing the appropriate talent is the single most important thing an organisation can do to protect its future." Richard Beck, Director of Cyber, QA Ltd

10 EXAMPLES OF PROGRAMMES AND MODULES FOUNDATION Cyber Security School Week 1 Team Building, Leadership, Fellowship Week 2 Week 3 Week 4 Operating Systems Cyber Security Internet of Things ADVANCED Cyber Security School Week 1 Week 2 Week 3 Week 4 Week 5 Team Building, Leadership, Fellowship Hands On Lab Building Exercise Operating Systems Networks, The Internet and www Cyber Security Internet of Things Industrial Control Systems Coding OWASP, Secure Coding Hands On Introductions Coding Capture the Flag Week 6 Week 7 Week 8 Week 9 Networks, The Internet and www Exercise, Assessment Security Project Penetration Testing, Ethical Hacking X86 Systems Internals, Reverse Engineering Advanced Penetration Testing, Ethical Hacking Final Exercises OPTIONAL MODULES Forensics Capture the Flag Security Project Security in Cloud Technologies Penetration Testing and Ethical Hacking Industrial Control Systems OWASP, Secure Coding Security Operations Centre Simulation X86 Systems Internals Reverse Engineering Hands-on Lab Building Forensics Security Operation Centre Simulation BUILD YOUR BESPOKE PROGRAMME TODAY AND MORE... Team Building, Leadership, Fellowship Introduction to Operating Systems Introduction to Coding Forensics Penetration Testing and Ethical Hacking Hands-on Lab Building Introduction to Cyber Security Exercise, Assessment Introduction to Industrial Control Systems Introduction to Networks, The Internet and www OWASP, Secure Coding Security Operation Centre Simulation Security in Cloud Technologies X86 Systems Internals Reverse Engineering Capture the Flag Introduction to Internet of Things

11 Cyber skills and talent for the digital age To complement the QA Cyber programmes, QA also provides individuals and organisations with the ability to develop and deploy Cyber talent through our Learning, Higher Education, Apprenticeships and Consulting divisions. For full details of these services please visit the following websites or call us on LEARNING Award winning professional Cyber training for individuals and organisation. APPRENTICESHIPS We provide high quality Careerchanging Cyber, IT, Tech and Business Apprenticeships that develop the skills you need in your business. CONSULTING HIGHER EDUCATION QA.COM/APPRENTICESHIPS QAHIGHEREDUCATION.COM QA.COM/CONSULTING QA.COM/LEARNING Together with our partners, QA Consulting design, develop and deliver Cyber, Business and Technology Services, delivering a blueprint that will future-proof your talent solutions. At QA Higher Education, we work closely with our partners to deliver Cyber Security focused courses for students to develop key employability skills, resulting in accomplished graduates who are motivated and highly employable.

12 To discuss more about the QA Cyber Security School, please call one of our learning advisors on "Learning new Cyber Security skills is not just for specialist IT Technologists. Every single employee has their part to play in countering the threat." Richard Beck, Director of Cyber, QA Ltd call us on visit QA.COM/CYBER or drop in to one of our national learning centres.

13 To talk to us about your Cyber Security training needs, please call For a comprehensive view of our Cyber Security solutions please visit QA. C O M / C Y B E R Search #SkillsfortheDigitalAge 1.3 Published December 2017

CYBER SECURITY TRAINING

CYBER SECURITY TRAINING CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.

More information

Cyber Analyst Academy. Closing the Cyber Security Skills Gap.

Cyber Analyst Academy. Closing the Cyber Security Skills Gap. Cyber Analyst Academy Closing the Cyber Security Skills Gap. Why do the Cyber Analyst Academy? Why QA? There is a huge gap in the market for this skills set and QA are excited to deliver a new hands-on

More information

CYBER SECURITY SKILLS AND TALENT SOLUTIONS

CYBER SECURITY SKILLS AND TALENT SOLUTIONS CYBER SECURITY TRAINING CYBER SECURITY SKILLS AND TALENT SOLUTIONS Learning Apprenticeships Consulting Higher Education QA are uniquely positioned to help solve your security skills gap. We understand

More information

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

Security Awareness Training Courses

Security Awareness Training Courses Security Awareness Training Courses Trusted Advisor for All Your Information Security Needs ZERODAYLAB Security Awareness Training Courses 75% of large organisations were subject to a staff-related security

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme

More information

Foundation Learning as a progression route to. Apprenticeships. The Toolkit

Foundation Learning as a progression route to. Apprenticeships. The Toolkit Foundation Learning as a progression route to Apprenticeships The Toolkit Introduction Although Middlesbrough has a higher than average take up on Apprenticeship programmes, a significant number of 16

More information

Challenges and games to inspire the next generation of cyber security professionals

Challenges and games to inspire the next generation of cyber security professionals Challenges and games to inspire the next generation of cyber security professionals What is CyberStart? CyberStart: a suite of challenges, tools and games designed to introduce children and young adults

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO HIGHER APPRENTICESHIP FROM GCSE-LEVEL TO FULLY-SKILLED IT ENGINEER

Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO HIGHER APPRENTICESHIP FROM GCSE-LEVEL TO FULLY-SKILLED IT ENGINEER Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO HIGHER APPRENTICESHIP FROM GCSE-LEVEL TO FULLY-SKILLED IT ENGINEER WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Iowa Cyber Alliance Protecting the nation through cyber education Doug Jacobson Information Assurance Center Iowa State University

Iowa Cyber Alliance Protecting the nation through cyber education Doug Jacobson Information Assurance Center Iowa State University Iowa Cyber Alliance Protecting the nation through cyber education Doug Jacobson Information Assurance Center Iowa State University 1 Cyber crime is a growing problem Estimated over 500 million victims

More information

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning. AIPM Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO The Leading Standard and Certification for PMO Professionals Today Understand the Value of High-Performing

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

SCHEDULE OF COURSES FOR THE YEAR 2018

SCHEDULE OF COURSES FOR THE YEAR 2018 SCHEDULE OF COURSES FOR THE YEAR 2018 It s not just about training your workforce. It s about progress. Our training is guaranteed to helps your business move forward with the right technology and the

More information

Challenges and games to inspire the next generation of cyber security professionals

Challenges and games to inspire the next generation of cyber security professionals Challenges and games to inspire the next generation of cyber security professionals What is CyberStart? CyberStart: a suite of challenges, tools and games designed to introduce young people to the field

More information

IT Systems and Networking Degree Apprenticeship

IT Systems and Networking Degree Apprenticeship IT Systems and Networking Degree Apprenticeship THE ROAD TO BECOMING A HIGHLY-SKILLED GRADUATE IT ENGINEER Apprenticeships Content Programme Overview... Mandatory Units Part 1... Optional Units Part 1...

More information

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning. AIPMO Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO Learning The Leading Standard and Certification for People Working in PMO Today Understand the Value of

More information

Secure Systems Administration and Engineering

Secure Systems Administration and Engineering Secure Systems Administration and Engineering Program Information The job outlook for careers in Cybersecurity and Information Technology continues to be very strong. Many experts predict a continued shortage

More information

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and

More information

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

Researching New Ways to Build a Cybersecurity Workforce

Researching New Ways to Build a Cybersecurity Workforce THE CISO ACADEMY Researching New Ways to Build a Cybersecurity Workforce Pamela D. Curtis, Summer Craze Fowler, David Tobar, and David Ulicne December 2016 Organizations across the world face the increasing

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

A United States Cyber Academy Program

A United States Cyber Academy Program The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy

More information

An Introduction To Security Planning

An Introduction To Security Planning An Introduction To Security Planning A strategic planning consultancy designed to enhance the management and operational delivery of protective security services within any business and organisation 1

More information

Faculty of Computing, Engineering and Science

Faculty of Computing, Engineering and Science Faculty of Computing, Engineering and Science Sera Evans, Head of UK Student Recruitment Eric Llewellyn, Deputy Head of Computing and Maths Faculty of Computing, Engineering and Science 3 academic schools

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

COURSE DESCRIPTION LTE FOR COMMERCIAL PROFESSIONALS. Format: 4 x 2 Hour Modules. Duration: 1 Day (with 2-Day Option)

COURSE DESCRIPTION LTE FOR COMMERCIAL PROFESSIONALS. Format: 4 x 2 Hour Modules. Duration: 1 Day (with 2-Day Option) COURSE DESCRIPTION LTE FOR COMMERCIAL PROFESSIONALS Format: 4 x 2 Hour Modules Duration: 1 Day (with 2-Day Option) COURSE SUMMARY HIGHLIGHTS Highly focused and in-depth training from the experts - including

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion

More information

WINNING THE WAR FOR CYBER TALENT

WINNING THE WAR FOR CYBER TALENT WINNING THE WAR FOR CYBER TALENT National Initiative for Cyber Education (NICE) Conference Keynote NOVEMBER 2017 AGENDA CYBER TALENT SUPPLY VS. DEMAND MULTIDIMENSIONAL APPROACH TO ADDRESS THE SUPPLY /

More information

STUDENT AND ACADEMIC SERVICES

STUDENT AND ACADEMIC SERVICES PROGRAMME SPECIFICATION Part 1: Information Awarding Institution Teaching Institution Delivery Location Study abroad / Exchange / Credit recognition Faculty responsible for programme Department responsible

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BSc (Hons) in Cyber Security and Networks Programme Specification Proforma (PSP) 2015/2016 Programme Specification Document 2015/2016 BSc (Hons) in Cyber Security

More information

Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED IT ENGINEER

Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED IT ENGINEER Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED IT ENGINEER WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think

More information

MSc Computing and Technology (Part-Time)

MSc Computing and Technology (Part-Time) MSc Computing and Technology (Part-Time) Campus: London Level of study: Postgraduate Tuition fee: 7,650 (UK/EU) Entry requirements: 2:2 (second class) honours degree or equivalent in any discipline English

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

keeping executives safe

keeping executives safe keeping executives safe Neil Austin and Lawrence Dando, two career surveillance specialists, established Mint Executive in 2015, having worked on and managed some of the most complex Police operations

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting

More information

RITTECH PROVIDES A RECOGNISED BENCHMARK OF STANDING ACROSS DIGITAL AND TECH INDUSTRIES

RITTECH PROVIDES A RECOGNISED BENCHMARK OF STANDING ACROSS DIGITAL AND TECH INDUSTRIES RITTECH PROVIDES A RECOGNISED BENCHMARK OF STANDING ACROSS DIGITAL AND TECH INDUSTRIES BCS, The Chartered Institute for IT First Floor, Block D, North Star House, North Star Avenue, Swindon SN2 1FA This

More information

DXC Security Training

DXC Security Training DXC Security Training DXC Security Training Table of contents About DXC Security Training 2 About DXC Technology 3 Inforsec Registered Assessors Program (IRAP) 4 ISM Fundamentals 6 Cyber Security Incident

More information

Do you want to accelerate your IT Career?

Do you want to accelerate your IT Career? Do you want to accelerate your IT Career? Tired of traditional IT training that are 80% slides and based on theory/concepts? Our training is the complete opposite! Taught by expert real world engineers

More information

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are: Qualification Title: OCR Level 3 Cambridge Technical Diploma in IT Qualification Number: 601/7101/7 Overview This qualification is designed for you if you re 16 years old or over and prefer to study IT

More information

MOBILE NETWORK SECURITY

MOBILE NETWORK SECURITY COURSE DESCRIPTION MOBILE NETWORK SECURITY Format: Classroom Duration: 2 Day COURSE SUMMARY HIGHLIGHTS Focused at telecoms professionals that need to assess threats and preparedness of mobile networks

More information

V&A/Icon Conservation and Collections Care Technicians Diploma What is the V&A / Icon Conservation and Collections Care Technicians Diploma?

V&A/Icon Conservation and Collections Care Technicians Diploma What is the V&A / Icon Conservation and Collections Care Technicians Diploma? V&A/Icon Conservation and Collections Care Technicians Diploma Information for Candidates 1. What is the V&A / Icon Conservation and Collections Care Technicians Diploma? This level 4 V&A / Icon Conservation

More information

Current skills gap for capable CTI analysts: Training for forensics & analysis

Current skills gap for capable CTI analysts: Training for forensics & analysis Current skills gap for capable CTI analysts: Training for forensics & analysis WORKSHOP CTI EU Bonding EU Cyber Threat Intelligence 30-31 October, Link Campus University, Rome, Italy Ing. Selene Giupponi

More information

COB Certified Trainer Academy. Become an Accredited COB Certified Trainer

COB Certified Trainer Academy. Become an Accredited COB Certified Trainer COB Certified Trainer Academy Become an Accredited COB Certified Trainer The Certificate in Online Business www.cobcertified.com August 2017 Edition V.1.2. USD 1 Introduction Boost Your Career, Raise Your

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science for Business Academic Year: 2017/18 Degree

More information

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020. PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform Summary For the University of Aberdeen, protecting IT infrastructure serving

More information

to Enhance Your Cyber Security Needs

to Enhance Your Cyber Security Needs Our Service to Enhance Your Cyber Security Needs Since the business critical systems by its nature are ON all of the time and the increasingly connected world makes you open your organization to everything

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool

More information

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool

More information

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans. Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory

More information

COURSE DESCRIPTION ICT, UNIFIED COMMUNICATIONS AND DIGITAL SERVICES. Format: Face-Face or Live-on -Web. Duration: 2 Days or 4 x 3 Hours

COURSE DESCRIPTION ICT, UNIFIED COMMUNICATIONS AND DIGITAL SERVICES. Format: Face-Face or Live-on -Web. Duration: 2 Days or 4 x 3 Hours COURSE DESCRIPTION ICT, UNIFIED COMMUNICATIONS AND DIGITAL SERVICES Format: Face-Face or Live-on -Web Duration: 2 Days or 4 x 3 Hours COURSE SUMMARY HIGHLIGHTS Highly focused and in-depth training from

More information

Which Side Are You On?

Which Side Are You On? 12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity

More information

In the Business of Making Internetwork Experts Since

In the Business of Making Internetwork Experts Since In the Business of Making Internetwork Experts Since 1996 www.netmetric-solutions.com Did You Know? Is One of the Largest IT Infrastructure Education Provider in the region Leading provider of multi-vendor

More information

FULL STACK FLEX PROGRAM

FULL STACK FLEX PROGRAM THE CODING BOOT CAMP AT UNC CHARLOTTE OVERVIEW: FULL STACK FLEX PROGRAM Prepare for a career as an end-to-end web developer at The Coding Boot Camp at UNC Charlotte. Our Full Stack Flex course gives you

More information

Presented by National CyberWatch Center March 31, April 1 & 2, 2016 Johns Hopkins University Applied Physics Lab Laurel, Maryland

Presented by National CyberWatch Center March 31, April 1 & 2, 2016 Johns Hopkins University Applied Physics Lab Laurel, Maryland Presented by National CyberWatch Center March 31, April 1 & 2, 2016 Johns Hopkins University Applied Physics Lab Laurel, Maryland 2016 SPONSOR BROCHURE WHAT IS THE NATIONAL CYBERWATCH CENTER MID-ATLANTIC

More information

Cyber Range Buyers Guide for Fortune 1000 Security Operations

Cyber Range Buyers Guide for Fortune 1000 Security Operations Cyber Range Buyers Guide for Fortune 1000 Security Operations Select the right training and simulation platform for your enterprise cyber range White Paper www.cyberbit.com sales@cyberbit.com Table Of

More information

PROFESSIONAL MASTER S IN

PROFESSIONAL MASTER S IN I m in a new job I love. ERIC LAFONTAINE Service Operations Manager GE Healthcare Class of 2013 PROFESSIONAL MASTER S IN APPLIED SYSTEMS ENGINEERING GAIN A COMPETITIVE EDGE WITH A GEORGIA TECH DEGREE TODAY

More information

SANS/REN-ISAC Partnership

SANS/REN-ISAC Partnership SANS/REN-ISAC Partnership Aggregate Buy Program www.sans.org/partnership/education SANS s mission is to ensure that info security practitioners (InfoSec) in critical organization have the appropriate skills

More information

Helping shape your future

Helping shape your future www.pwc.com/pwcacademyme Helping shape your future Project Management Professional (PMP ) PwC s Academy 2016-2017 Contents Welcome to PwC s Academy 1 About Project Management Professional (PMP ) 2 Getting

More information

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Noel Kyle, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education

More information

Education Brochure. Education. Accelerate your path to business discovery. qlik.com

Education Brochure. Education. Accelerate your path to business discovery. qlik.com Education Education Brochure Accelerate your path to business discovery Qlik Education Services offers expertly designed coursework, tools, and programs to give your organization the knowledge and skills

More information

IT Information Security Manager Job Description

IT Information Security Manager Job Description IT Information Security Manager Job Description IT Information Security Manager Responsible to: Accountable to: IT Service Manager Head of IT Services Overall Purpose To provide effective response, protection

More information

DIGITAL APPRENTICESHIPS

DIGITAL APPRENTICESHIPS DIGITAL Networking, Infrastructure Technician, Unified Communication Technician and Software & Web Development Technician - Advanced and Higher Apprenticeships WHY CHOOSE US? OVERVIEW OF PROGRAMMES ESTABLISHED

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Bachelor of Information Technology

Bachelor of Information Technology Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Immersion Academy Annual Report 2018

Immersion Academy Annual Report 2018 Immersion Academy Annual Report 2018 An accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security

More information

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical

More information

UNDERGRADUATE PROGRAMME SPECIFICATION

UNDERGRADUATE PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: BSc (Hons) Computer Networks (progression award) Staffordshire University Faculty of Computing,

More information

ICT support for Primary Schools. Helping primary schools to apply a successful ICT strategy for teaching and digital learning.

ICT support for Primary Schools. Helping primary schools to apply a successful ICT strategy for teaching and digital learning. ICT support for Primary Schools. Helping primary schools to apply a successful ICT strategy for teaching and digital learning. Professional ICT support for primary schools. Our ICT is the technology partner

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

Online Digital Transformation Courses COB Certified E-Commerce & E-Business Manager E-Learning Options

Online Digital Transformation Courses COB Certified E-Commerce & E-Business Manager E-Learning Options Online Digital Transformation Courses COB Certified E-Commerce & E-Business Manager E-Learning Options Course Information GBP Edition The Institute for Business Advancement www.iba.insitute August 2017

More information

FULL STACK FLEX PROGRAM

FULL STACK FLEX PROGRAM THE CODING BOOT CAMP FULL STACK FLEX PROGRAM CURRICULUM OVERVIEW The digital revolution has transformed virtually every area of human activity and you can be part of it as a web development professional.

More information

BSc (Honours) Computer Science Curriculum Outline

BSc (Honours) Computer Science Curriculum Outline BSc (Honours) Computer Science Curriculum Outline 1. Introduction: The economic and strategic importance provided by Computer Science and Information Technology is increasing daily. This importance is

More information

SkillsManager TM. Business advantage through IT skills management

SkillsManager TM. Business advantage through IT skills management SkillsManager TM Business advantage through IT skills management A powerful new approach to identify and effectively manage the IT skills within your organisation SkillsManager TM Business advantage through

More information

New CEPIS Mission

New CEPIS Mission New CEPIS Mission 2016-2020 Contents: 1 Introduction... 3 2 CEPIS Today... 3 3 CEPIS Tomorrow... 3 1.1 Mission Statement... 3 1.2 Target Audiences... 3 1.3 Strategy... 4 1.3.1 Promoting High Standards

More information

PARENTS AND STUDENTS Check out our computing qualifications for Key Stage 4

PARENTS AND STUDENTS Check out our computing qualifications for Key Stage 4 A GUIDE FOR PARENTS AND STUDENTS Check out our computing qualifications for Key Stage 4 New doors are opening in the world of computing, creating fresh opportunities. We ve got it covered with a choice

More information

SMART. Investing in urban innovation

SMART. Investing in urban innovation SMART Investing in urban innovation What Smart Belfast? Belfast has ambitious plans for the future. Building on our economic revival, we want to make our city an outstanding place to live, work and invest.

More information

Training Services TRAINING SERVICES. Translating Knowledge into Results

Training Services TRAINING SERVICES. Translating Knowledge into Results TRAINING SERVICES About Pink Elephant Pink Elephant is an international knowledge leader in the field of business innovation and business change. With advisory and IT services, Pink Elephant draws the

More information

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee

More information

Ofqual. Ofqual Supporting a Cloud-First Programme. Client Testimonial

Ofqual. Ofqual Supporting a Cloud-First Programme. Client Testimonial Ofqual Ofqual Supporting a Cloud-First Programme Client Testimonial 2017 CoreAzure Limited. All rights reserved. This document is provided "as-is". Information and views expressed in this document, including

More information

Information Technology

Information Technology Information Technology 2017-2018 Well connected. Right here 2 Contents weltec.ac.nz/it Introductory NZ Certificate in Information Technology Essentials 6 NZ Diploma in Information Technology (Technical

More information

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering Faculty of Engineering and Informatics Programme Specification Programme title: BEng (Hons) Software Engineering Academic Year: 2018/19 Degree Awarding Body: Partner(s), delivery organisation or support

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

Business Advantage Through Structured Skills Development

Business Advantage Through Structured Skills Development Business Advantage Through Structured Skills Development Business Advantage through Structured Skills Development BCS Career Developer is a powerful browser-based solution to help you define, manage and

More information