Search Training
X


Cybersecurity Learning Solutions by Job Role

Cybersecurity changes all the time based on hacker tactics, techniques, and procedures (TTPs). Consequently, continuous education is essential. In fact, according to ESG/ISSA research, 96% of cybersecurity professionals agree that they must keep up with their skills, or their organizations will be at a significant disadvantage against today’s cyber threats.

To help professionals learn on-the-job skills needed to advance and help propel their businesses forward, New Horizons offers training solutions that can help meet the development demands of your business. Below are our recommended training courses for job roles surrounding Cybersecurity.


Security Administrator

A Security Administrator of information technology is responsible for managing all IT-related security and safety issues within a company. They also implement systems aimed toward preventing malware infections of company computer hardware.

  • CompTIA Cybersecurity Analyst (CySA+)
    This five-day course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

  • EC-Council Certified Ethical Hacker (CEH) v10.0
    This five-day course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization.

  • NCSF Foundation
    This one-day course introduces the NIST Cybersecurity Framework (NIST CSF). The Framework is a risk-based approach to managing cybersecurity risk, and is composed of three parts: The Framework Core, the Framework Implementation Tiers, and the Framework Profiles.

Security Analyst

Job duties of a Security Analyst typically include planning and implementing security measures to protect computer systems, networks, and data. Security Analysts are expected to stay up-to-date on the latest intelligence, including hackers' methodologies, in order to anticipate security breaches.

  • CompTIA Cybersecurity Analyst (CySA+)
    This five-day course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

  • CompTIA Penetration Tester+ (PenTest+) Certification
    This five-day course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. The CompTIA PenTest+ certification verifies that successful candidates have the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results.

  • EC-Council Certified Security Analyst (ECSA) v10.0
    ECSA is a highly interactive, comprehensive, standards based, intensive 5-day training course that teaches information security professionals how professional real-life penetration testing are conducted.

  • NCSF Foundation
    This one-day course introduces the NIST Cybersecurity Framework (NIST CSF). The Framework is a risk-based approach to managing cybersecurity risk, and is composed of three parts: The Framework Core, the Framework Implementation Tiers, and the Framework Profiles.

Security Engineer

Security Engineers help to safeguard organization’s computer networks and systems. They plan and carry out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks. Information Security Engineers usually work as part of a larger IT team and report directly to upper management. Security Engineers are expected to stay up-to-date on the latest intelligence, including hackers' methodologies, to anticipate security breaches.

  • CompTIA Advanced Security Practitioner (CASP)
    CASP is a five-day, hands-on, performance-based certification course for practitioners possessing advanced skills in cybersecurity. While cybersecurity managers help identify what cybersecurity policies and frameworks could be implemented, CASP-certified professionals figure out how to implement solutions within those policies and frameworks.

  • EC-Council Certified Ethical Hacker (CEH) v10.0
    This five-day course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization.

  • NCSF Foundation
    This one-day course introduces the NIST Cybersecurity Framework (NIST CSF). The Framework is a risk-based approach to managing cybersecurity risk, and is composed of three parts: The Framework Core, the Framework Implementation Tiers, and the Framework Profiles.

  • NCSF Practitioner
    This four-day course looks at cybersecurity risks and instructs students on the best approach to design and build a comprehensive technology focused cybersecurity program and business focused cyber-risk management program that will minimize risks, and at the same time, protect critical assets.


Security Manager

Security Managers are responsible for monitoring the security operations for any organization. They implement security policies, regulations, rules, and norms and make sure that the environment in their organization is safe for employers and visitors.

  • Certified Information System Security Professional (CISSP)
    This five-day course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification.

  • ITIL® Foundation
    In this three-day course, you will acquire the essential skills and information necessary to lead and manage an IT business service through every stage of its lifecycle.

  • ITIL® Intermediate Capabilities: Planning, Protection, & Optimization
    The Planning, Protection & Optimization five-day course will help you to gain the technical level of knowledge and skills required for detailed execution and implementation of specific ITIL processes.

National Institute of Standards and Technology (NIST) Focus

  • NCSF Foundation
    This one-day course introduces the NIST Cybersecurity Framework (NIST CSF). The Framework is a risk-based approach to managing cybersecurity risk, and is composed of three parts: The Framework Core, the Framework Implementation Tiers, and the Framework Profiles.

  • NCSF Practitioner
    This four-day course looks at cybersecurity risks and instructs students on the best approach to design and build a comprehensive technology focused cybersecurity program and business focused cyber-risk management program that will minimize risks, and at the same time, protect critical assets.

GDPR / Privacy Focus

  • Certified Information Privacy Technologist (CIPT)
    This two-day course will give you an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems.

  • Certified Information Privacy Professional (CIPP/E)
    Those taking this two-day course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.

  • Certified Information Privacy Professional (CIPP/US)
    In this two-day course, you’ll leave with an understanding of the legal requirements for the responsible handling and transfer of personal data within industry and workplaces, including government access to private-sector data.

Looking for Additional Courses? View All Related Learning Solutions


Note: The courses listed above are our recommendations for some of the most common roles within Cybersecurity; however, your organization may have slightly different titles and/or responsibilities. Please speak with one of our expert Account Representatives to discuss the specific learning requirements for you and your business.

Looking for expert guidance? Contact us to be connected with one of our knowledgeable Account Executives.

Request More Information

All Learning Solution by Job Role from New Horizons