X
GO

Information Security Training Solutions from New Horizons

In today's information-driven economy, intellectual property is the most valuable organizational possession. And keeping a company's vital data secure is the responsibility of every employee in the company. From guarding against attacks to creating an effective response plan, everyone in an organization has to take part in keeping their information secure.

A recent study by CompTIA cited human error as the most common cause of information security breaches, with some 80% of respondents believing this human error was caused by a lack of security knowledge, training, or failure to follow security procedures.

At New Horizons, we are on the cutting-edge of cybersecurity with training programs designed to ensure that your organization can best prevent itself against attacks and, should one occur, significantly reduce your risk and increase your response time.


Cybersecurity Roadmap

Being properly trained and informed is no longer exclusively for IT and Cybersecurity Professionals. Instead, it is now the responsibility of everyone in an organization to have at minimum a foundational understanding of security issues and vulnerabilities. Each section below offers a series of courses that best fit the role and experience level of your team members.

End User - Associated Training

They have nothing to do with the cybersecurity implementation or policy of a company but have access to mail and databases through company servers on both company-owned and personal devices.

Recommended Course:

CyberSAFE (Securing Assets for the End User)
Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.

IT Professional (Non-Security) - Associated Training

Their primary responsibilities involve the design, implementation, management, and administration of network servers and other company devices. Security is not part of their job function but cybersecurity knowledge would be beneficial.

Recommended Courses:

CompTIA A+
The course will build on your existing user-level knowledge and experience with personal computer (PC) software and hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on PCs, digital devices, and operating systems. This course provides the background knowledge and skills you will require to be a successful A+ technician. It can also assist you if you are preparing to take the CompTIA A+ certification examinations.

CompTIA Security+
This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

IT Professional (Some-Security) - Associated Training

Their primary responsibilities involve the design, implementation, management, and administration of network servers and other company devices. Fundamental aspects of cybersecurity is currently a part of, or is becoming a part of, their job role.

Recommended Courses:

CyberSec First Responder: Threat Detection and Response
The CyberSec First Responder: Threat Detection and Response course, or CFR, will prepare security professionals to become the first line of response against cyber-attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents. This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

Cisco® Implementing and Administering Cisco® Solutions v1.0 (CCNA)
Students will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats.

Cybersecurity Professional (Six Months - 2 Years Experience) - Associated Training

Their primary focus is on the cybersecurity of an organization's data and equipment. They are involved in the day-to-day implementation and compliance of an organization's security policies.

Recommended Courses:

CompTIA Security+
This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

CyberSec First Responder: Threat Detection and Response
The CyberSec First Responder: Threat Detection and Response course, or CFR, will prepare security professionals to become the first line of response against cyber-attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents. This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

NIST Cyber Security Professional (NCSP) Practitioner
This course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture.

Cybersecurity Professional (2-5 Years Experience) - Associated Training

Their primary focus is on the cybersecurity of an organization's data and equipment. They are involved in the day-to-day implementation and compliance of an organization's security policies. They are possibly in some kind of management or oversight position.

Recommended Courses:

Certified Ethical Hacker (CEH)
In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the CEH course, you will be immersed in a hacker's mindset, evaluating not just logical, but physical security. The course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

CompTIA Cybersecurity Analyst (CySA+)
The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

CompTIA Penetration Tester+ (PenTest+)
This five-day course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities.

CompTIA Advanced Security Practitioner (CASP)
In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security. This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments.

Cisco Implementing Core Cisco ASA Security v1.0 (SASAC)
This course covers the Cisco ASA 9.0 / 9.1 core firewall and VPN features and is designed to teach network security engineers working on the Cisco ASA Adaptive Security Appliance to implement core Cisco ASA features, including the new ASA 9.0 and 9.1 features.

Cisco Implementing Advanced Cisco ASA Security v2.1 (SASAA)
This course provides an updated training with labs on the key features on the Cisco ASA (covering up to the ASA 9.2.2 release). The goal of the course is to implement the key features of the Cisco ASA.

Implementing and Configuring Cisco Identity Services Engine for Wireless Engineers (SISE)
This course discusses the Cisco Identity Services Engine (ISE), an identity and access control policy platform that provides a single policy plane across the entire organization, combining multiple services, including authentication, authorization, and accounting (AAA), posture, profiling, device on-boarding, and guest management, into a single context-aware identity-based platform. The training provides learners with the knowledge and skills to enforce security posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE.

Cybersecurity Professional (5+ Years Experience) - Associated Training

Their primary focus is on the cybersecurity of an organization's data and equipment. They are involved in the implementation and compliance of an organization's security policies. They are possibly in some kind of senior management or cybersecurity strategy position.

Recommended Courses:

Certified Information System Security Professional (CISSP)
The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification.By defining eight security domains that comprise a CBK, industry standards for the information systems security professional have been established. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field.

EC-Council Computer Hacking Forensics Investigator (CHFI)
Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. This course will provide participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute in the court of law.


Vendor Based Security Solutions

New Horizons provides information security courses and certifications from leaders in the cybersecurity space, such as Cisco, CompTIA, (ISC)², and EC-Council. These organizations are committed to setting strict security standards that any organization can implement. Earning certifications from these vendor-neutral organizations is an ideal way for an organization to prove that their security professionals have the skills, knowledge, and commitment to protect a company’s most valuable data assets.

CertNexus - CertNexus’ certification programs in cybersecurity, and IoT, broaden IT and Security professional’s knowledge and validate skills using globally recognized curriculum and high stakes examinations.

CyberSAFE (Securing Assets for the End User)
This course is designed for you as a non-technical end-user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks.

CyberSec First Responder: Threat Detection and Response
This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

Cisco Systems Inc. is the largest networking company in the world. It provides security training and certification for IT professionals who utilize their technologies across an organization.

CCNA
Cisco CCNA certification is an associate level Cisco certification which demonstrates core switching and routing knowledge with an emphasis on Cisco security.

The Computing Technology Industry Association (CompTIA), a non-profit trade association, issues professional certifications for the information technology industry. It is considered one of the IT industry's top trade associations.

CompTIA Security+
This certification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers and senior managers in accounting, sales, product development and marketing.

CompTIA Cybersecurity Analyst (CySA+)
This certification is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

CompTIA Penetration Tester+ (PenTest+)
The CompTIA PenTest+ certification verifies that successful candidates have the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results.

CompTIA Advanced Security Practitioner (CASP)
This certification is intended for IT professionals who have the technical knowledge and skills required to conceptualize, design and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years of experience, including at least 5 years of hands-on, technical security experience.

The International Council of Electronic Commerce Consultants (EC-Council) is a long-standing professional certification organization for IT Professionals. The EC-Council's goal is to provide support for individuals who create and maintain security and IT systems.

EC-Council Certified Ethical Hacker (CEH)
This course/certification will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

EC-Council Computer Hacking Forensic Investigator (CHFI)
This course/certification will benefit: Police and other laws enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies.

EC-Council Certified Network Defender (CND)
This course/certification will benefit: Network Administrators, Network security Administrators, Network Security Engineer, Network Defense Technicians, Security Analyst, Security Operator, or anyone involved in network operations.

Certified Application Security Engineer (CASE).NET
Individuals who want to become application security engineers/analysts/testers or individuals involved in the role of developing, testing, managing, or protecting wide area of applications.

EC-Council Certified Security Analyst (ECSA)
This course/certification is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, and System Administrators and Risk Assessment Professionals.

(ISC)² - (ISC)² is a global non-profit organization whose primary goal is to help educate and certify Information Security professionals world-wide. Earning your (ISC)² certifications is an excellent way to establish your knowledge and credibility.

Certified Information Systems Security Professional (CISSP)
This course/certification is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals.

Healthcare Information Security and Privacy Practitioner (HCISPP)
This global healthcare security certification proves you have what it takes to implement, manage and assess the proper security and privacy controls to protect healthcare organizations. The HCISPP is unique because it combines information security skills with privacy best practices and techniques. No other certification addresses the foundational knowledge in healthcare security and privacy like the HCISPP.

ISACA - ISACA is an independent, non-profit global association founded in 1969 to provide guidance and benchmarks for information systems and risk management.

Certified Information Security Manager (CISM)
This course/certification is intended for information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management.

Certified Information Systems Auditor (CISA)
In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.

Certified in Risk and Information Systems Control (CRISC)
The CRISC certification is for IT and business professionals—including risk and compliance professionals, business analysts, and project managers—who identify and manage risks through the development, implementation and maintenance of appropriate information systems (IS) controls.

The National Institute of Standards and Technology (NIST) was founded in 1901 and is now part of the U.S. Department of Commerce. NIST is one of the nation's oldest physical science laboratories. Congress established the agency to remove a major challenge to U.S. industrial competitiveness at the time—a second-rate measurement infrastructure that lagged behind the capabilities of the United Kingdom, Germany, and other economic rivals.

NIST Cyber Security Professional (NCSP) Foundation
This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain.

NIST Cyber Security Professional (NCSP) Practitioner
This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain.

Contact us today to discuss which cybersecurity learning solutions are best suited for you and your business.

Request More Information