X
GO


Information Security Training Solutions from New Horizons

In today's information-driven economy, intellectual property is the most valuable organizational possession. And keeping a company's vital data secure is the responsibility of every employee in the company. From guarding against attacks to creating an effective response plan, everyone in an organization has to take part in keeping their information secure.

A recent study by CompTIA cited human error as the most common cause of information security breaches, with some 80% of respondents believing this human error was caused by a lack of security knowledge, training, or failure to follow security procedures.

At New Horizons, we are on the cutting-edge of cybersecurity with training programs designed to ensure that your organization can best prevent itself against attacks and, should one occur, significantly reduce your risk and increase your response time.

Major Security Roles & Associated Training

Being properly trained and informed is no longer exclusively for IT and Cybersecurity Professionals. Instead, it is now the responsibility of everyone in an organization to have at minimum a foundational understanding of security issues and vulnerabilities. Below is a breakdown of roles and associated training.

End User - Associated Training

They have nothing to do with the cybersecurity implementation or policy of a company but have access to mail and databases through company servers on both company-owned and personal devices.

Recommended Course:

CyberSAFE (Securing Assets for the End User)
Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.

IT Professional (Non-Security) - Associated Training

Their primary responsibilities involve the design, implementation, management, and administration of network servers and other company devices. Security is not part of their job function but cybersecurity knowledge would be beneficial.

Recommended Courses:

CompTIA A+
The course will build on your existing user-level knowledge and experience with personal computer (PC) software and hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on PCs, digital devices, and operating systems. This course provides the background knowledge and skills you will require to be a successful A+ technician. It can also assist you if you are preparing to take the CompTIA A+ certification examinations.

CompTIA Security+
This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

IT Professional (Some-Security) - Associated Training

Their primary responsibilities involve the design, implementation, management, and administration of network servers and other company devices. Fundamental aspects of cybersecurity is currently a part of, or is becoming a part of, their job role.

Recommended Courses:

CyberSec First Responder: Threat Detection and Response
The CyberSec First Responder: Threat Detection and Response course, or CFR, will prepare security professionals to become the first line of response against cyber-attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents. This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

Cisco Interconnecting Cisco Networking Devices Part 1 v3.0 (ICND1)
Students will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats.

Cisco Implementing Cisco Network Security 3.0 (IINS)
This course focuses on security principles and technologies, using Cisco security products to provide hands-on examples. Using instructor-led discussions, extensive hands-on lab exercises, and supplemental materials, this course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a real-life network infrastructure.

Cybersecurity Professional (Six Months - 2 Years Experience) - Associated Training

Their primary focus is on the cybersecurity of an organization's data and equipment. They are involved in the day-to-day implementation and compliance of an organization's security policies.

Recommended Courses:

CompTIA Security+
This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

CyberSec First Responder: Threat Detection and Response
The CyberSec First Responder: Threat Detection and Response course, or CFR, will prepare security professionals to become the first line of response against cyber-attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents. This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

Cisco Implementing Cisco Network Security 3.0 (IINS)
This course focuses on security principles and technologies, using Cisco security products to provide hands-on examples. Using instructor-led discussions, extensive hands-on lab exercises, and supplemental materials, this course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a real-life network infrastructure.

NCSF Foundation
Target Audience: The NCSF Foundation training course outlines current cybersecurity challenges and explains how organizations who implement a NCSF program can mitigate these challenges. This course is designed for IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain.

NCSF Practitioner
Target Audience: This course details the current cybersecurity challenges plus teaches in depth the UMass Lowell NCSF Control Factory Methodology on how to build, test, maintain and continually improve a cybersecurity program based on the NIST Cybersecurity Framework. The NCSF Practitioner is a prerequisite.

Cybersecurity Professional (2-5 Years Experience) - Associated Training

Their primary focus is on the cybersecurity of an organization's data and equipment. They are involved in the day-to-day implementation and compliance of an organization's security policies. They are possibly in some kind of management or oversight position.

Recommended Courses:

Certified Ethical Hacker (CEH) v9.0
In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the CEH course, you will be immersed in a hacker's mindset, evaluating not just logical, but physical security. The course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

CompTIA Cybersecurity Analyst (CSA+)
The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

CompTIA Advanced Security Practitioner (CASP)
In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security. This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments.

Cisco Implementing Core Cisco ASA Security v1.0 (SASAC)
This course covers the Cisco ASA 9.0 / 9.1 core firewall and VPN features and is designed to teach network security engineers working on the Cisco ASA Adaptive Security Appliance to implement core Cisco ASA features, including the new ASA 9.0 and 9.1 features.

Cisco Implementing Advanced Cisco ASA Security v2.1 (SASAA)
This course provides an updated training with labs on the key features on the Cisco ASA (covering up to the ASA 9.2.2 release). The goal of the course is to implement the key features of the Cisco ASA.

Implementing and Configuring Cisco Identity Services Engine for Wireless Engineers (SISE)
This course discusses the Cisco Identity Services Engine (ISE), an identity and access control policy platform that provides a single policy plane across the entire organization, combining multiple services, including authentication, authorization, and accounting (AAA), posture, profiling, device on-boarding, and guest management, into a single context-aware identity-based platform. The training provides learners with the knowledge and skills to enforce security posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE.

Cybersecurity Professional (5+ Years Experience) - Associated Training

Their primary focus is on the cybersecurity of an organization's data and equipment. They are involved in the implementation and compliance of an organization's security policies. They are possibly in some kind of senior management or cybersecurity strategy position.

Recommended Courses:

Certified Information System Security Professional (CISSP)
The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification.By defining eight security domains that comprise a CBK, industry standards for the information systems security professional have been established. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field.

EC-Council Computer Hacking Forensics Investigator (CHFI) v9.0
Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. This course will provide participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute in the court of law.

EC-Council Certified Security Analyst (ECSA)
In this course, students will conduct a penetration test on a company that has various departments, subnets and servers, and multiple operating systems with defense mechanisms architecture that has both militarized and non-militarized zones. To be eligible to attempt the associated exam, candidates are required to perform real-world penetration testing over EC-Council’s secure cyber range and to produce a penetration test report that clearly documents the vulnerabilities found.

Cisco Implementing Cisco Edge Network Security Solutions (SENSS)
This course is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP Security) certification. Additionally, it is designed to prepare security engineers with the knowledge and hands-on experience to prepare them to configure Cisco perimeter edge security solutions utilizing Cisco Switches, Cisco Routers, and Cisco Adaptive Security Appliance (ASA) Firewalls.

Cisco Implementing Cisco Secure Mobility Solutions (SIMOS)
This course is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP Security) certification. This course is designed to prepare network security engineers with the knowledge and skills they need to protect data traversing a public or shared infrastructure such as the Internet by implementing and maintaining Cisco VPN solutions.

Cisco Implementing Cisco Threat Control Solutions v1.5 (SITCS1)
This course is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP Security) certification. Additionally, it is designed to prepare security engineers with the knowledge and hands-on experience so that they can deploy Ciscos Next Generation Firewall (NGFW) as well as Web Security, Email Security and Cloud Web Security.

Cisco Implementing Cisco Secure Access Solutions (SISAS)
In this course, students will gain hands-on experience with configuring various advance Cisco security solutions for mitigating outside threats and securing devices connecting to the network. At the end of the course, students will be able to reduce the risk to their IT infrastructures and applications using Ciscos ISE appliance feature and provide operational support identity and network access control.

Cisco Securing Cisco Networks with Threat Detection and Analysis (SCYBER)
This course is designed to teach students how a network security operations center (SOC) works and how to begin to monitor, analyze, and respond to security threats within the network and will help prepare students for the Cisco Cybersecurity Specialist exam (600-199 SCYBER).

Security All Access Pass

Major Security Vendors & Associated Certifications

New Horizons provides information security courses and certifications from leaders in the cybersecurity space, such as Cisco, CompTIA, (ISC)², and EC-Council. These organizations are committed to setting strict security standards that any organization can implement. Earning certifications from these vendor-neutral organizations is an ideal way for an organization to prove that their security professionals have the skills, knowledge, and commitment to protect a company’s most valuable data assets.

Cisco Systems Inc. is the largest networking company in the world. It provides security training and certification for IT professionals who utilize their technologies across an organization.

Associated Courses/Certification:

CCNA Security
Target Audience: Cisco CCNA Security certification is an associate level Cisco certification which demonstrates core switching and routing knowledge with an emphasis on Cisco security..

CCNP Security
Target Audience: The Cisco CCNP Security certification program is for Cisco engineers responsible for Security in Routers, Switches, Networking devices and appliances, as well as choosing, deploying, supporting and troubleshooting Firewalls, VPNS, and IDS/IPS solutions for their networking.

Additional Cisco Security Courses

The Computing Technology Industry Association (CompTIA), a non-profit trade association, issues professional certifications for the information technology industry. It is considered one of the IT industry's top trade associations.

Associated Courses/Certification:

CompTIA Security+
Target Audience: This certification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers and senior managers in accounting, sales, product development and marketing.

CompTIA Cybersecurity Analyst (CSA+)
Target Audience: This certification is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

CompTIA Advanced Security Practitioner (CASP)
Target Audience: This certification is intended for IT professionals who have the technical knowledge and skills required to conceptualize, design and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years of experience, including at least 5 years of hands-on, technical security experience.

The International Council of Electronic Commerce Consultants (EC-Council) is a long-standing professional certification organization for IT Professionals. The EC-Council's goal is to provide support for individuals who create and maintain security and IT systems.

Associated Courses/Certification:

EC-Council Certified Ethical Hacker (CEH)
Target Audience: This course/certification will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

EC-Council Computer Hacking Forensic Investigator (CHFI)
Target Audience: This course/certification will benefit: Police and other laws enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies.

EC-Council Certified Network Defender (CND)
Target Audience: This course/certification will benefit: Network Administrators, Network security Administrators, Network Security Engineer, Network Defense Technicians, Security Analyst, Security Operator, or anyone involved in network operations.

EC-Council Certified Secure Programmer .NET (ESCP.NET)
Target Audience: This course/certification is intended for programmers who are responsible for designing and building secure Windows/Web based applications with .NET Framework. It is designed for developers who have .NET development skills.

EC-Council Certified Security Analyst (ECSA)
Target Audience: This course/certification is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, and System Administrators and Risk Assessment Professionals.

(ISC)² - (ISC)² is a global non-profit organization whose primary goal is to help educate and certify Information Security professionals world-wide. Earning your (ISC)² certifications is an excellent way to establish your knowledge and credibility.

Associated Courses/Certification:

Certified Information Systems Security Professional (CISSP)
Target Audience: This course/certification is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals.

Healthcare Information Security and Privacy Practitioner (HCISPP)
Target Audience: This global healthcare security certification proves you have what it takes to implement, manage and assess the proper security and privacy controls to protect healthcare organizations. The HCISPP is unique because it combines information security skills with privacy best practices and techniques. No other certification addresses the foundational knowledge in healthcare security and privacy like the HCISPP.

ISACA - ISACA is an independent, non-profit global association founded in 1969 to provide guidance and benchmarks for information systems and risk management.

Associated Courses/Certification:

Certified Information Security Manager (CISM)
Target Audience: This course/certification is intended for information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management.

Certified Information Systems Auditor (CISA)
Target Audience: In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.

Certified in Risk and Information Systems Control (CRISC)
Target Audience: The CRISC certification is for IT and business professionals—including risk and compliance professionals, business analysts, and project managers—who identify and manage risks through the development, implementation and maintenance of appropriate information systems (IS) controls.

Logical Operations - A leading information security courseware and certification developer, specializes in preparing information security professionals to meet the growing threat of cyber-crime.

Associated Courses/Certification:

CyberSAFE (Securing Assets for the End User)
Target Audience: This course is designed for you as a non-technical end-user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks.

CyberSec First Responder: Threat Detection and Response
Target Audience: This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

The National Institute of Standards and Technology (NIST) was founded in 1901 and is now part of the U.S. Department of Commerce. NIST is one of the nation's oldest physical science laboratories. Congress established the agency to remove a major challenge to U.S. industrial competitiveness at the time—a second-rate measurement infrastructure that lagged behind the capabilities of the United Kingdom, Germany, and other economic rivals.

Associated Courses/Certification:

NCSF Foundation
Target Audience: The NCSF Foundation training course outlines current cybersecurity challenges and explains how organizations who implement a NCSF program can mitigate these challenges. This course is designed for IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain.

NCSF Practitioner
Target Audience: This course details the current cybersecurity challenges plus teaches in depth the UMass Lowell NCSF Control Factory Methodology on how to build, test, maintain and continually improve a cybersecurity program based on the NIST Cybersecurity Framework. The NCSF Practitioner is a prerequisite.

Contact us today to discuss which cybersecurity learning solutions are best suited for you and your business.