CYBER APPRENTICESHIP. Dr Leigh Armistead, President

Similar documents
CYBER APPRENTICESHIP. Dr. Leigh Armistead, President

Computer Science & IT

Developing Career-Relevant Academic Programs

Building the Cybersecurity Workforce. November 2017

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

DoD Directive (DoDD) 8570 & GIAC Certification

Career Paths In Cybersecurity

Immersion Academy Annual Report 2017

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

Immersion Academy Annual Report 2018

IT Technician Pathways Course Guide

T H E U N I V E R S I T Y O F T E X A S A T E L P A S O. College of Business Administration. Information Systems

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert?

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

A United States Cyber Academy Program

The fast track to top skills and top jobs in cyber. Guaranteed.

Cybersecurity Employment SecureNinja

Certification and Career Guide

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Networking and Cybersecurity. Computer Service Technician. Cybersecurity Award: Career Studies Certificate Length: 25 credits

The Hampton Roads Cybersecurity Education, Workforce, and Economic Development Alliance

O2O-FORT CARSON PROGRAM OVERVIEW

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Bachelor of Applied Science Degree IT NETWORKING

CyberSecurity Apprenticeships

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Cyber Security Occupations. in San Diego County

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

RISK MANAGEMENT FRAMEWORK COURSE

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

DIABLO VALLEY COLLEGE CATALOG

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure:

Personnel Certification

Kizano Corp Management Services

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Cyber Security Advanced Education: Preparing the Emerging Workforce

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

CYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Certified Ethical Hacker - CEH v9 Training & Certification

CompTIA Cybersecurity Analyst+

NATIONAL GOVERNORS ASSOCIATION MEET THE THREAT October 27,

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

Strengthening Cybersecurity Workforce Development December 2017

The National Initiative for Cybersecurity Education (NICE) The NICE Workforce Framework, NIST SP , Overview October 4, 2017

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

J & B Hartigan, Inc. Carrollton VA ABOUT US

Commonwealth Cyber Initiative Letters of Support

Building the IA Workforce

Certified Ethical Hacker (CEH)

C HFI SCIENCE SECURING FORENSIC. Every crime leaves a trail of evidence. Computer Hacking Forensic Investigator v9 NETWORKS WITH.

C HFI SCIENCE SECURING FORENSIC. Every crime leaves a trail of evidence. Computer Hacking Forensic Investigator v9 NETWORKS WITH.

Industry Based Certification (IBC) Application Packet

Cyber Update Mr. Paul Phillips AFLCMC/WNSA (937) May 17

Collaboration on Cybersecurity program between California University and Shippensburg University

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

2018 Cyber Mission Training Course Catalog

Cybersecurity Education for Enterprise Cloud Services

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

Security Management Occupations

Information Technology (IT) Skill Standards Checklist

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development

Solutions Technology, Inc. (STI) Corporate Capability Brief

CTE Program Proposal. NAME OF COLLEGE: Bakersfield College. FACULTY CONTACT: Creighton Magers DATE: 11/19/2015

CyberVista Certify cybervista.net

Indicate whether the statement is true or false.

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Digital Forensics

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

A guide to CompTIA training and certification DDLS Australia Pty Ltd

A guide to CompTIA training and certification DDLS Australia Pty Ltd

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Academic Program Review Cyber Security College of Southern Nevada 2017

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Ediscovery Professional

Curriculum Vitae Detective Paul A. Lindvay #5497 Arizona Department of Public Safety Computer Forensics Unit

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

CAREER PATHS. and Certification Courses

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Hacker Academy UK. Black Suits, White Hats!

Shaping the Future of Cybersecurity Education

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Health Care Security

CCNA Cybersecurity Operations. Program Overview

National Defense University and IRMC. National Defense University

Computer Information Systems Technology (CIS)

CITY OF MONTEBELLO SYSTEMS MANAGER

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Policies and Procedures Date: February 28, 2012

Transcription:

CYBER APPRENTICESHIP Dr Leigh Armistead, President 1

EVERYBODY HAS THE SAME ISSUE 2

OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a), SB with core competencies in IT security, IA and cyber warfare. Headquartered in Yorktown, we have a number of cyber security contracts with the Navy, DoD and commercial organizations. Led by Dr Leigh Armistead, CISSP, a Hampton Roads native who is on the IT and Workforce boards at TCC. We have 285 Employees in all 50 states, DC, three territories, plus an academic cyber journal: http://www.gbpts.com/solutions/cyberwar/research/journal ISO 9001:2013 ISO 27001:2008 CMMI Level 3 SW Dev TS/SCI FCL 3

GOALS OF THIS EFFORT? Develop long-term relationships with employees who are committed to the company Hire shareholders and teach them new skillsets Train them, invest in them and keep them current technically Grow new staff and to meet our requirements Use the registered apprenticeship as a model Assuming success, expand to include more new hires Update our curriculum to meet changing standards from the DoD Support other companies interested in cyber apprenticeships 4

FIRST IN VIRGINIA Peregrine has been designated as the first corporation in the Commonwealth of Virginia for a registered Cyber Apprenticeship. http://www.alexandrianews.org/2016/06/governor-mcauliffe-announcesexpansion-of-cybersecurity-apprenticeships/ Recognized by the Governor for this distinction We are also one of the first to have a similar registration at the federal level with the DoL. This is important because we need the Federal apprenticeship to operate in Juneau, AK 5

ELEMENTS OF AN APPRENTICESHIP Committee TCC, VA, AK and Peregrine Occupational Series O*Net with three types OTJ Competencies matched to DoD 8570 and 8140 regulations to become an IAT 1 Instructional Curriculum worked with TCC for 100% online courses that will give training to pass certifications Standards utilized new VA O*Net rqmts 6

TYPES AND STRUCTURE Information Security Analyst, O*NET 15-1122.00, Competency Based with 2000 hours at a minimum for 12-18 months, with three specific categories at Level 1. The candidate will support tasks, and get a CAC and a SECRET clearance in this period. Cyber Security Analyst, Level 1- outcome is completion of one of the recommended industry certifications for Level 1: CAP, SSCP, Security+ Computer Forensics Analyst, Level 1- outcome is completion of one of the recommended industry certifications for Level 1: EnCE, ACE, Certified Computer Examiner (CCE), or GIAC Certified Forensics Analyst (GCFA) Incident Response Analyst Cyber Security, Level 1- outcome is completion of one of the recommended industry certifications for Level 1: GIAC Certified Incident Handler (GCIH), EC-Council Certified Ethical Hacker (CEH), Certified Incident Handler (CIH) 7

EDUCATION (LEVEL 1) ITN 101 - Provides instruction in networking media, physical and logical topologies, common networking standards and popular networking protocols. Emphasizes the TCP/IP protocol suite and related IP addressing schemes, including CIDR. Includes selected topics in network implementation, support and LAN/WAN connectivity. ITN 106 covers the software side: installing and configuring operating systems including Windows, ios, Android, Apple OS X and Linux. It also addresses security, cloud computing fundamentals and operational procedures. ITN 107 covers the hardware side. It is a hands on hardware troubleshooting class covering PC hardware and peripherals, mobile device hardware, networking, and troubleshooting hardware and network connectivity issues. ITN 260 - Designed to provide students with the skills to recognize and prevent threats to information and information systems and to master techniques for defense against such threats. Security models, intrusion detection, incident handling, firewalls, perimeter protection, and network security law issues are covered in the course work. Graduates may seek employment as information security officers and network security specialists in local businesses, educational institutions, and governmental agencies. 8

KEY POCS Todd Estes, Interim Associate Vice President for Business & Corporate Solutions & Director of the Apprenticeship Institute, Tidewater Community College, mestes@tcc.edu Delores Ferrell, Registered Apprenticeship Consultant, Virginia Department of Labor and Industry, delores.ferrell@doli.virginia.gov John P. Hakala, State Director (Alaska), U.S. Department of Labor, Office of Apprenticeship, Hakala.John@dol.gov 9

SUMMARY This effort is our attempt to solve some of the cyber staffing issues Peregrine has worked very closely with TCC, VA and AK to develop this first cyber apprenticeship Continually update plan to match DoD / NIST workforce recommendations Our staff can support other organizations to build their own registered model