Professional Documents
Culture Documents
Whether its general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis, or smart and effective incident response training, we can prepare you and your team to battle the latest cyber threats and attacks. Our broad
cybersecurity training portfolio was developed as a result of listening to and understanding the needs and strategic goals of enterprises across
the nation and aligns to government and industry-issued standards and guidelines.
Based on these standards and guidelines, we have created a logically organized map of high-level security disciplines, each including competencies and relevant courses to build IT security acumen. The disciplines include:
Security Disciplines
Security Disciplines
Asset Protection
What do you have?
Threat Management
Whats coming at you?
Access Control
Who gets in?
Asset Protection
Incident Management
How do you handle failures?
Threat Management
Configuration Management
How do you manage the lifecycle?
Incident Management
Contingency Planning
How do you plan for failures?
Access Control
Configuration Management
Contingency Planning
From skills building to certification preparation, we offer training to meet every learning level and need. The corresponding competencies and
sample of courses per discipline are highlighted in this document.
CTC-002
1-800-COURSES www.globalknowledge.com/security
Security Disciplines
Asset Protection
What do you have?
To protect your assets, you must first know where they are and understand how they are tracked and managed: How are they secured? Who has access to them? Are they tracked and managed? Do you have processes and procedures in place to respond and recover from a security breach quickly?
Asset Protection
Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning
Asset Protection
Below is a sample of courses offered per competency and does not represent all courses available.
Cloud
Course 2459
Course 9926
Course 9748
Course 6307
Course 3205
Course 3148
Course 3187
Course 2919
Virtualization
VMware vSphere: Install, Configure, Manage [V5.1]
Information Assurance
CSFI: Introduction to Cyber Warfare
Course 9719
Course 9733
Course (*)
FISMA In-Depth
Course (*)
Course 3139
Course 2936
Course 9723
Course 6130
Course 9724
Course 1254
Course 9759
Virtualization Essentials
Course 2460
Course 9760
Course 2943
VMware
AppSense
Red Hat
Cisco
Microsoft
Course (*)
Secure Coding
Foundstone Building Secure Software
Course 9822
Course 9823
Course 1117
Course 1118
Course 1120
Course 1128
The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.
2
1-800-COURSES www.globalknowledge.com/security
Security Disciplines
Threat Management
Whats coming at you?
Asset Protection
Threat Management
Assess your vulnerabilities, threats, and risks. Work to mitigate this risk, and use auditing and analysis to
confirm your efforts. Humans can be your weakest link. Ensure they have received adequate training to stay
one step ahead of the attack.
Access Control
Incident Management
Configuration Management
Contingency Planning
Threat Management
Below is a sample of courses offered per competency and does not represent all courses available.
Social Engineering
Course 9879
Course 9870
Course (*)
Course 9871
Course (*)
Course 9759
Course 9926
Course 6706
Cybersecurity Foundations
Course 9701
Course 9723
Course 9601
Course 2727
Threat Assessment
CEH - Certified Ethical Hacker v8
Course 9778
Course 9776
Course (*)
Course 9719
Course 9733
Course 9759
Course 9760
Course 9738
Course 9602
Risk Management
Course 2811
Course 9603
Course 5773
Data Modeling
Course 2711
Course 5744
Course 9723
Course (*)
Course 9601
Vulnerability Assessment
CSFI: Introduction to Cyber Warfare
Course 9719
Course 9733
Course 3607
Course 3290
Course 9822
Course 9823
The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.
1-800-COURSES www.globalknowledge.com/security
Security Disciplines
Access Control
Who gets in?
Control who has access by locking down your systems, including hosts, networks, applications, and data
flows.
Asset Protection
Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning
Access Control
Below is a sample of courses offered per competency and does not represent all courses available.
Communication Security
Advanced VoIP: Securing UC Networks
Course 3290
Course 3607
Course 9879
Course 3251
Course 5498
Course 5774
Course 5761
Global Communications
Course 2655
Unix Fundamentals
Course 4201
Course 2726
Penetration Testing
Course 0402
Course 3290
Course 9604
Data Modeling
Course 2711
Course 9810
Course 2542
Course 9723
Course 9776
CiscoJuniperBlue CoatF5CheckpointDellSonicWallCitrix
Course 2724
Course (*)
Remote Access
Cryptography
Security+ Prep Course
Course 9926
CISSP
Course 9840
Course 9823
Course 9760
Course 5498
IDS/IPS/IDP
Course 5241
Course 5747
Course 9979
Course 7216
Course 5744
The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.
4
1-800-COURSES www.globalknowledge.com/security
Security Disciplines
Incident Management
How do you handle failures?
Asset Protection
Perform continuous monitoring with event management tools and maximize your ability to provide an immediate response. Use strong policies that are well communicated for a consistent and uniform reaction.
Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning
Incident Management
Below is a sample of courses offered per competency and does not represent all courses available.
Course 9719
Course 9733
Course 9719
Course 9776
Course 9733
Course 9810
FISMA In-Depth
Course (*)
Course 2503
Data Modeling
Course 2711
Course 2727
Course 2653
Forensics
Foundstone Forensics & Incident Response
Computer Hacking Forensic Investigator (CHFI)
Troubleshooting TCP/IP Networks with Wireshark
Course 9873
Course (*)
Course 9879
Course (*)
Incident Response
Foundstone Forensics & Incident Response
Computer Hacking Forensic Investigator (CHFI)
Course 9873
Course (*)
Course 2443
Course 2727
Course (*)
Course (*)
Reverse Engineering
Course 9601
Course 9873
Course 9602
Course 9719
Course 9603
Course 9733
The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.
1-800-COURSES www.globalknowledge.com/security
Security Disciplines
Configuration Management
How do you manage the lifecycle?
Continuously managing changes to the IT landscape of your organization requires due diligence to ensure
your systems are optimally organized and interconnected.
Asset Protection
Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning
Configuration Management
Below is a sample of courses offered per competency and does not represent all courses available.
Business Alignment
Course 9760
Course (*)
Data Modeling
Course 2711
Course 2723
Course 9738
Course 2818
Course 9105
Course 9871
Course 9110
Course 9604
Course 5764
Course 2936
ITIL Foundations
Course 2975
Course 2720
Change Management
Schedules and Costs Controls
Course 2809
Course 2919
Course 9724
Course 2721
Course (*)
Operations Planning
Course (*)
Course (*)
ITIL Foundations
Course 2975
Course (*)
Course 2725
Course (*)
Course 9840
Course (*)
Course 2721
Course (*)
Security Testing
Course (*)
Course 9776
Course 2936
Course 9870
FISMA In-Depth
Course (*)
The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.
6
1-800-COURSES www.globalknowledge.com/security
Security Disciplines
Contingency Planning
How do you plan for failures?
Ensure your organization has planned for continuity after an attack. Failures happen; how best do you respond?
Asset Protection
Threat Management
Access Control
Incident Management
Configuration Management
Contingency Planning
Contingency Planning
Below is a sample of courses offered per competency and does not represent all courses available.
Disaster Recovery
Data Modeling
Course 2711
Course 2809
Symantec Backup Exec 12.x for Windows Servers: Administration Course 9712
Course 2919
Course 4823
Course 2720
Cybersecurity Foundations
Course 9701
Course 9840
Communication Plan
ITIL Service Lifecycle: Continual Service Improvement
Course 4409
Course 2723
Continuity of Operations
Information Systems Security Architecture Professional (ISSAP)
Course 9760
Course 2919
Course 2401
Course 2724
The courses listed above are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually
add premium content to our curriculum. Contact us today to learn more.
1-800-COURSES www.globalknowledge.com/security
Conclusion
The constantly evolving cybersecurity landscape requires heavily armed IT security professionals whose skills are also constantly evolving. Our
security curriculum is constantly evolving to keep pace with the threat landscape and the needs of organizations big and small.
We are your source for IT security skills building and offer a robust security curriculum ranging from novice to expert. Couple this with premium
content, expert instruction, and training for every learning style and budget.
Contact us today and we will develop a learning plan to best meet your needs for today and tomorrow.
Learn More
www.globalknowledge.com/security
1-800-COURSES