Description: Enables your employees to identify the most common risks involved in
using conventional, mobile, and cloud technologies, as well as how to protect
themselves and your organization from cyber threats
Target Candidate: This credential is designed for all end-users of computers,
mobile devices, networks, and the Internet to ensure they can use technology safely
to minimize security risks.
Description: This course covers incident response methods and procedures that are
taught in alignment with industry and introduces procedures and resources to comply
with legislative requirements regarding incident response.
Target Candidate: Designed for IT Leaders, Compliance Officers and Executives who
have been tasked with managing compliance with state legislation and other regulatory
requirements regarding incident response, and for executing standardized responses
to such incidents.
Description: Design and develop protected applications, regardless of the language
used for development or the platform on which they will be deployed
Target Candidate: This certification exam is designed for software developers, testers,
and architects who may develop in multiple programming languages for any type
of platform who desire or are required to develop highly secure applications
for business and organizational use. Candidates will also have a need to author
or analyze specifications and technical requirements and develop applications
that meet them.
Description: Effectively identify, respond to, protect against, and remediate malicious
activities involving computing systems. Additionally, how to deal with a changing threat
landscape and assess risk and vulnerabilities, acquire data, perform analysis,
continuously communicate, determine scope, recommend remediation actions,
and accurately report results.
Target Candidate: This certification exam is designed for individuals with between
3 and 5 years of experience working in a computing environment as part of a
CERT/CSIRT/SOC who desire or are required to protect critical information systems
before, during, and after an incident which may be a cybersecurity attack.