New dates coming soon!
Cybersecurity operations impact an increasing number of critical business processes and, as a result of the pandemic, organizations are relying heavily upon a remote workforce in substantially larger numbers. That's why this unique 4-day course is designed to make cybersecurity available to average users while informing executives and managers of their potential roles and responsibilities. It takes complex cybersecurity principles and makes them easily understandable for all levels to ensure your organization is safeguarded. The Cybersecurity for Professionals in National Security and Corporate Intelligence course, offered by the School of Diplomacy and International Relations, provides participants an opportunity to learn and understand various facets of Cybersecurity such as history and trends, introduction to malware, threat landscape, insider threats, attack vectors and how to avoid associated pitfalls by applying necessary security principles.
At the end of course, participants will have a greater understanding of cybersecurity's role in the corporate environment, increased individual awareness of privacy and security, and actionable measures they can take back to their workplace to implement.
Understanding the privacy and security implications of a mature cybersecurity program is essential in today's executive world. Organizations and individuals must learn and practice safe cybersecurity and effective cyber hygiene. The Cybersecurity for Professionals in National Security and Corporate Intelligence Course provides a common computer and network security baseline for all users.
Interested in this program? Request for more information by emailing firstname.lastname@example.org or by filling out the form below.
Who should take this program?
This program is designed for any professional in the workforce whose goal is to protect and secure its organizational data from cyber threats. It's a great introductory into the field of Cybersecurity for careers in national security and corporate intelligence to learn more about cyber risks and security practices and apply them within their industry. Many leadership positions require a solid understanding of cybersecurity to lead businesses in a secure way, safeguard the privacy of individuals, address regulatory requirements and protect against malicious activity.
By the Numbers
Module 1: Introduction to Cybersecurity - This module introduces students to the core elements of Cybersecurity and provides a broad view of many aspects in the field. Students define terminology and learn about different disciplines while beginning to formulate a clearer understanding of how to incorporate Cybersecurity into their daily lives. Topics include Security Essentials, Threat Landscape, Security Principles
Module 2: Introduction to Cyber Attacks - This module introduces students to hacker methodology and how natural disasters and security breaches impact systems and organizations. This module provides students with the necessary context of how they fit into the overall Cybersecurity picture and how broad the risk to systems and organizations is today. Topics include Vulnerabilities & Attacks, Threat Sources, Non-technical Threats, Impact of Security Breaches
Module 3: Introduction to Malware – This module exposes students to the history of security events related to malware as it matured from the earliest known worms and viruses to the modern advanced persistent threat (APT). Students will learn how security efforts, based upon the NIST Cybersecurity Framework, assist organizations in handling malware and other Cybersecurity incidents. Several case studies will demonstrate the importance of continuous robust security efforts.
Topics include History and Types of Malwares, Security Events, Indicators or Attack or Compromise, NIST Cybersecurity Framework, Event and Incident Response
Module 4: Defense-in-Depth – In this module, students will learn an effective model for layering protection and avoiding single points of failure. It will provide students with the specific processes, tools and guidance they can put to immediate use at home and work. As the final module, Defense-in-Depth ends with a discussion on recommended hardware and software solutions, resources and training available to students to improve their cyber hygiene. Topics include Defense-in-Depth, Security by Design, Vulnerability Management, Secure Operating Systems and Coding, Recommendations & Resources
Course Learning Objectives
At the end of this course, students will be able to:
- Understand what defines Cybersecurity and why it's equally important for end users and managers to understand it.
- Relate Cybersecurity to personal and professional cyber hygiene.
- Implement principles of Risk Management into daily, weekly, and quarterly routines.
- Describe how attackers target users and systems and the common results of this targeting.
- Recognize and identify cyber threats and take necessary steps to mitigate risk to systems, data and privacy.
Adam Nielson is a cybersecurity specialist with over 24 years of DoD, US Army, and NSA service in analyzing and exploiting information security vulnerabilities with extensive risk management experience in multiple high-threat operating environments. With over 14 years of experience working offensive Information Security including development of information security policies, procedures, security training, and risk management, he leverages his broad expertise in the application of regulatory controls and safeguards pursuant to cybersecurity best practices and associated compliance requirements. Nielson has created training modules on the implementation of cybersecurity guidelines, network forensics, pentesting and malware analysis. As a cybersecurity specialist, he has assisted multiple organizations from Fortune 200 corporations to non-profit organizations with fewer than a dozen employees, in updating their information security processes to become more secure by implementing the NIST Cybersecurity Framework. Mr. Nielson retired from the US Army in 2016 serving in multiple war zone deployments including Operation Enduring Freedom and Operation Iraqi Freedom. In addition, he served in multiple overseas stations in service of the Nation while in the US Army.