Drive Employee Success with CyberWarrior Academy

Welcome to the Age of Cybersecurity Next-Generation Learning

$3 trillion

in lost economic value that cyber risk could slow the pace of technological innovation globally by 2020

Deloitte

1.8 million

more cybersecurity professionals will be needed to accommodate skills shortage of people by 2022

Frost & Sullivan

$3.86 million

financial impact of the average breach in 2018

IBM

Why this… Why now

Cybersecurity threats are growing at a heightened pace in both number and magnitude making this highest growth market globally.

The gap for skilled cyber professionals has never being more severe. Companies are failing to meet this challenge and urgently need specialized professionals.

Take action now!

Make strategic investments in resources to help mitigate and manage risk, and upskill your current teams to ensure they are able to defend and respond to potential threats today and tomorrow

CyberWarrior Academy is the Solution

Hire new talent or upskill your team to perform at current and relevant levels

CyberWarrior Academy provides technical and professional development training focused on strategy and execution of cybersecurity competencies critical to protecting organizations. Mapped to the National Institute of Standards and Technology (NIST) and the National Initiative for Cybersecurity Education (NICE) Framework, our program enables students to learn and apply the skills and technologies that are valued most by the market.

The CyberWarrior Road Map – Strategy

Non-TechnicaI – 
Executive Education:

Cybersecurity and your Business

Executive Education

Blank
Audiences
Executive
Program Components
  • Impact of Cybersecurity
  • Regulatory Compliance
  • Managing Risk
  • 30 Day Plan
  • 30 Day Reconnect
Additional Reinforcement
  • Online Resources
  • Access to UMASS Lowell resources
  • Community of Practice
Impact of Cybersecurity
Case studies of Cybersecurity incidents at businesses of all sizes including organizational impact short-term, how they responded to those incidents, and lasting changes at the organization as a result of a breach.
Regulatory Compliance
Financial and organizational impact of information security including HIPAA, PCI-DSS, FERPA, CMR-201
Managing Risk
Develop high-level of how to implement programs to mitigate these risks for both traditional and cloud-based environments Organizational structure and roles/responsibilities for risk management Cybersecurity insurance to protect against the inevitable

Non-Technical –
Employee Awareness Training:

Cybersecurity Fundamentals

Security Awareness program

Blank
Audiences
All employees – delivered as part of new hire training and also ongoing training online.
Program Components
Nontechnical users training modules
Additional Reinforcement
Simulated phishing attacks and other ongoing validation. Employees will know the company is testing them and will have higher vigilance.
Core Training Modules
  • You Are the Shield
  • Social Engineering
  • Malware
  • Email and Phishing
  • Passwords
  • Targeted Attacks
  • Social Networks
  • Mobile Devices
  • Browsing Safely
  • Data Security
  • Hacked
Awareness Training Modules
  • Encryption
  • Working Remotely
  • Insider Threat
  • Help Desk
  • Information Technology Staff (IT Staff)
  • Physical Security
  • Cloud Services
  • International Travel
  • Creating a Cyber Secure Home
  • Protecting Your Kids Online
  • Senior Leadership
  • New Employee
Managing Risk
Develop high-level of how to implement programs to mitigate these risks for both traditional and cloud-based environments Organizational structure and roles/responsibilities for risk management Cybersecurity insurance to protect against the inevitable

The CyberWarrior Road Map – Execution

Technical – What you need to know:

Technical Introduction to Cybersecurity

Certified Secure Computer User

Blank
Audiences
All technical/IT employees
Program Components
Technical baseline of security – “It takes a village”
What participants gain…
1.Secure different operating systems

2.Back up data and perform disaster recovery

3.Safeguard their mobile devices from various attacks

4.Become familiar with social engineering and identity theft attacks

5.Install and Configure antiviruses

6.Understand various security incidents

7.Understand to secure their cloud accounts

8.Understand the various security issues on social networking sites

CSCU Modules…
1.Introduction to Security

2.Securing Operating Systems

3.Malware and Antivirus

4.Internet Security

5.Security on Social Networking Sites

6.Securing Email Communications

7.Securing Mobile Devices

8.Securing The Cloud

9.Securing Network Connections

10.Data Backup and Disaster Recovery

Technical –Developing your strategy:

NIST Framework & Cybersecurity Strategy

NIST Framework & Cybersecurity

Blank
Audiences
Cybersecurity Managers
Program Components
NIST Framework
Content & Delivery
Customized based on company needs and requirements 

Technical –Equipping your team:

Technical Employee Enablement

CyberWarrior Academy       

Blank
Audiences
Technical employees with responsibility for Cybersecurity
Program Components
Fundamentals

Hands-on Modules:

  • Firewall and IDPS Training
  • Malware Analysis and Incident Response Training
  • Packet Analysis Training
  • Security Automation Training
  • Security Monitoring Training
  • Vulnerability Management Training

Labs & Hands-on Practice

Career Hacks

Case Study & Capstone

Certifications

     

    Certified Network Defender

     

    Certified Ethical Hacker

     

    Cyberwarrior Academy Certified

    Additional Reinforcement
    Apprenticeships

    Access to subject matter experts

    DITN networking event with alumni

    Delivery
    Role / Real Play

    Hands On Labs

    In person

    Virtual Live online

    Technical –Equipping your team:

    Domain Defender Advanced Pen Testing

    CyberWarrior Academy       

    Blank
    Audiences

    Pentesters, Red-Blue Teams, System Administrators, Security Researchers, Security Professional.

    Program Components

    Fundamentals:

    • Enterprise authentication with Active Directory (Installation/Configuration)
    • Dissecting authentication protocols (NTLM/LDAP/Kerberos)

    Attack techniques:

    • Extensive AD Enumeration
    • Active Directory trust mapping and abuse.
    • Privilege Escalation (User Hunting, Delegation issues and more)
    • Advanced Kerberos Attacks and Defense (Golden, Silver ticket, Kerberoast and more)
    • Advanced cross forest trust abuse (Lateral movement across forest, PrivEsc and more)
    • Credentials Replay Attacks (Over-PTH, Token Replay etc.)
    • Abusing trusts for MS products (Exchange, SQL Server, SCCM etc.)
    • Persistence (DCShadow, WMI, GPO, Domain and Host ACLs and more)

    Defense techniques:

    • Monitoring Active Directory
    • Defenses (Red Forest, JEA, PAW, LAPS, Selective Authentication, Deception, App Whitelisting, ATA, Tiered Administration etc.)
    • Bypassing defenses

     

    What students will learn

    Learn how active directory works (for hackers)

    Learn about advanced active directory attacks

    Learn exploitation tools and techniques for AD environments

    Learn how to protect against these attacks

    What students should bring

    System with 4 GB RAM and ability to install OpenVPN client and RDP to Windows boxes.

    Privileges to disable/change any antivirus or firewall.

    Program Components

    Fundamentals

    Hands-on Modules:

    • Firewall and IDPS Training
    • Malware Analysis and Incident Response Training
    • Packet Analysis Training
    • Security Automation Training
    • Security Monitoring Training
    • Vulnerability Management Training

    Labs & Hands-on Practice

    Career Hacks

    Case Study & Capstone

    Certifications

       

      Certified Network Defender

       

      Certified Ethical Hacker

       

      Cyberwarrior Academy Certified

      Additional Reinforcement
        • One Month free access to Enterprise configured lab environment

      • Membership to CyberWarrior Academy Forum Group
      Delivery

      Role / Real Play

      Hands On Labs

      In person

      The CyberWarrior Academy Difference

      We meet you where you are.
      We offer training in person and in virtual classrooms to accommodate professionals near and far. We also deliver training on site at your location and tailor it to your needs.
      The training is hands-on and the content is relevant.
      Our training goes beyond theory and focuses on equipping participants with the tools, strategies, and technical experience to solve the most critical issues facing companies today.
      Our participants develop strong engagement skills.
      We recognize that to be a top performer, participants must learn how to be influencers who drive change and possess strong communication skills.
      Our instructors are seasoned cybersecurity professionals.
      Our instructors practice what they preach. Leveraging insights from current cybersecurity consulting engagements to ensure students know how to solve the most critical security issues affecting companies today.

      Partnership Opportunities

      Blank
      Hire new talent – Apprenticeship
      • OpportunityYour company will identify and contract with candidates from the graduating class upon completion of the program as an apprentice for a 12-month period.  All costs covered during said time by CyberWarrior Academy.  Upon completion of the apprenticeship employer could hire candidate permanently.

        Option

        Direct Hire

        Benefits

        • “Workplace ready” cybersecurity talent
        • Apprenticeships are a way to evaluate a candidates skills, and cultural “fit” to your team
        • Reduces time and cost of internal teams training unskilled talent
        • Cost effective approach to hiring relevant
        • Apprentices are making a contribution to the workplace while they are learning
        • A company that is willing to invest in people by supporting apprenticeships is showing a positive approach to Corporate Social Responsibility, which is good for attracting both customers and future high-quality staff

        Companies can identify and hire candidates from the graduating class upon completion of the program

      INVESTMENT: Company pays an hourly rate to CyberWarrior Academy to cover cost of in class and on the job apprenticeship. Candidate and Employer sign an 16-month work contract

      Employee Upskilling

      Opportunity

      Companies can identify employees that would benefit from training and development and provide ongoing value to the team.

      Option

      Send current team to attend any one of CyberWarrior Academy cybersecurity trainings, part-time (10 months) or full-time (16 weeks).

      Benefits

      • Enhance the skills of your team
      • Receive current and relevant certifications
      • Development Programs
      Student Engagement / Mentoring
      • Engage in a Mentorship relationship providing guidance, assistance and encouragement as students work through the rigors of the program and beyond.

        Subject Matter Expert

        One key differentiator of the CyberWarrior Academy program is the opportunity to hear from Subject Matter Experts (SME) on the “real world” application of what they are learning in the classroom.  We invite companies to partake in 1-2 hour discussions that occur on a weekly basis bases.

        • “The best way to learn is to teach” – engaging with students enables the SME to share knowledge and expertise.
        • “Paying it Forward” – we all remember those moments when we learned something from someone that changed our life’s trajectory.
        • Being in the room gives companies the opportunity to engage and evaluate potential future talent.

        Coach/Mentor

        CyberWarrior Academy will match mentor/coaches for students in need of additional support.  The goal is to engage on a weekly basis for up to one hour while in the program and continue the relationship at minimum once a month once the student graduates.

        Experience Required:

        • Good listening skills
        • Ability to help someone work through challenges and opportunities
        • Availability of time commitment
        • Commitment to stay with a student once matching has been made
        • Available to attend an initial Mentor/Tutor session prior to the first class

        Tutor

        CWA will match mentor/coaches for students in need of additional support.  The goal is to engage on a weekly basis for up to one hour while in the program and continue the relationship at minimum once a month once the student graduates.

        Experience Required:

        • Good listening skills
        • Ability to help someone work through challenges and opportunities
        • Availability of time commitment
        • Commitment to stay with a student once matching has been made
        • Available to attend an initial Mentor/Tutor session prior to the first class.

       

      Learn More

      14 + 2 =

      15 + 5 =

      Learn More

      4 + 11 =

      7 + 11 =