Phase2 Advantage Cybersecurity and Certifications

$150 Donation Made to Veterans for Every Self-Study Course Enrollment

Phase2 Advantage and Veteran Service Organization Boots to Books have entered into a partnership in which Phase2 will donate $150 to support veterans and the military affiliate community for every student that enrolls in one of its self-study cybersecurity certification courses.

Boots to Books President, Peter Cline, who is an Army veteran said, “Phase2 Advantage is the perfect partner. The organization’s shared values and passions for innovation and supporting our veteran community were apparent from day one. With their support, more veterans will get free educational support and be placed at the nation’s best companies, completely free to them.”  READ MORE …

Certified Cybersecurity Defense and Operations Specialist

Self-Study Online Training

Cybersecurity Defense and Operations

Organizations face ongoing threats to their information technology infrastructure on a daily basis. These security struggles need to be approached with modern techniques, a holistic view of security, and a diverse body of knowledge. With the proper tools and training, specialists in the Information Security and Cybersecurity fields will be much more capable of finding success within their roles.

The Cybersecurity Defense and Operations course brings cybersecurity core competencies to advanced levels with new concepts and traditional best practices. Using 14 detailed chapters designed to align with academic calendars, students will be provided with the knowledge and context needed to successfully manage the security of their technical environments.

Focusing on the Information Security concerns of today, students will cover topics such as Cloud Security, Threat Intelligence Analysis, Vulnerability Management, Biometric Systems, Incident Response, Securing Systems with Cryptography, and the NICE Cybersecurity Workforce Framework. The content of this textbook is aligned for use with immersive cybersecurity labs produced by Jones & Bartlett Learning, Pearson Education, and Cengage. Students should have knowledge of basic networking and TCP/IP protocols.

COURSE DATE

February 01, 2022

STUDENT SUPPORT

Yes (via email)

COURSE ACCESS

24 / 7

COURSE FEE

$1,200

COURSE DURATION

16 Weeks*

Registration for this course closes on January 24, 2022*This course is self-paced and can be completed any time within 16 weeks.

Course Training Materials

Course Textbook (US Students)

Textbook via Amazon (Non-US Students)

Course Lab Exercises

Practice Assessment Quizzes

40-Hour CPE Credit Certificate

Knowledge Assessment Examination

Phase2 Advantage has partnered with Savannah Technical College to offer several self-study cybersecurity courses for individuals who are not able to attend classroom-based certification programs. This format allows students to learn at their own pace, in a comfortable environment, and receive a 60% discount off classroom-based courses.  Enrolled students will have access to the Savannah Technical College Learning Management System for their course.

NICE Cybersecurity Workforce Framework

The Certified Cybersecurity Defense and Operations Specialist course is a component of the career progression track that supports the required Categories, Specialty Areas and Work Roles as defined by the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework.  It provides a common language to speak about cyber roles and jobs and can be referenced to define professional requirements in cybersecurity.

Course Outline and Knowledge Points

  • Overview of the NICE Framework
  • NICE Framework: Key Terms
  • NICE Framework Categories
  • NICE Framework Specialty Areas and Work Roles
  • Knowledge, Skills, and Abilities (KSA’s)
  • Implementing the NICE Framework
  • Password Complexity and Policy
  • Tokens, HOTP, and TOTP Controls
  • Biometric and Geolocation Methods
  • Kerberos, NTLM, LDAPS, and Active Directory
  • SSO, SAML, OAuth, and OpenID Connect
  • Access Control Models
  • Biometric Implementation
  • Fingerprint Recognition Systems
  • Facial Recognition Systems
  • Iris and Retinal Imaging Systems
  • Keystroke Dynamics
  • Voice Recognition Systems
  • Providing Integrity with Hashing
  • Symmetric Encryption Characteristics
  • Asymmetric Encryption Characteristics
  • Email: Using Cryptographic Protocols
  • Public Key Infrastructure: Certificates
  • Cryptography Security Threats
  • Security Architecture Frameworks
  • Reference Security Architecture
  • The Software Development Life Cycle
  • Architectural Design Documentation
  • Architectural Domains: The Four Pillars
  • Zero Trust Networks
  • Baseline Measuring Objectives
  • Network Sensor Deployment
  • Statistical Monitoring
  • Potential Signs of Compromise
  • Indicator of Compromise Verification
  • Event-Based Alert Monitoring
  • 7 Stages of the Attack Life Cycle
  • Effective Remediation
  • Assigning a Remediation Owner
  • Remediation Posturing Actions
  • Eradication Plan Development
  • Plan Timing and Execution
  • Response Playbook Components
  • Building a Response Playbook
  • Common Playbook Response Scenarios
  • Planning Table-Top Exercises
  • Planning Simulated Attacks
  • Sample Playbook: Unauthorized Access
  • Network Forensics vs. Digital Forensics
  • General Process for Performing Analysis
  • Locating Endpoint Data
  • Investigative Interview Strategies
  • Investigative Report Writing
  • Evidence Dynamics and Chain of Custody
  • Risk Management: Key Definitions
  • Risk Management Program Development
  • Risk Management Frameworks
  • Vulnerability Program Essentials
  • Prioritizing and Rating Vulnerability Levels
  • Establishing an Efficient Workflow
  • BCP and DRP Key Definitions
  • The Benefits of a Business Impact Analysis
  • Business Impact Analysis Data Collection
  • Selecting a BIA Project Manager
  • Writing a BCP / DRP Testing Strategy
  • The 5 Progressions of BCP / DRP Testing
  • Cloud Computing Service Models
  • Public, Private, and Hybrid Cloud
  • Cloud Data Security
  • Data Loss Prevention: Egress Monitoring
  • Cloud Platform Risks
  • Lack of Physical Access and Auditing Ability
  • Seeking Best Options Over Fairness
  • General Contract Structures
  • The SLA and Contract Review Process
  • General Contract Review Checklist
  • Provisions of an Enforceable Contract
  • Contract Negotiation Strategies
  • Cyber Adversaries vs. Cyber Defenders
  • Components of the Modern Threat Landscape
  • Understanding the Maneuver Warfare Mindset
  • The Threat Intelligence Cycle
  • Challenges to Cyber Crime Investigations
  • Threat Intelligence Sources

Contact Us to Learn More

To find out more about Cybersecurity Courses and our full range of available client services, contact us today via the phone number or email address listed below.

OFFICE:
(912) 335-2217

EMAIL:
michael.kaplan@phase2advantage.com