AI Academy

The Foundations of Cybersecurity

Instructor: Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP Duration: 8 hours to complete
Objective 1 Define key concepts and terminology in Cybersecurity
Objective 2 Describe key threats to cybersecurity
Objective 3 Define strategies to identify and remediate vulnerabilities in information assets
Objective 4 Give examples of the systemic components (including personnel) necessary for an effective cybersecurity program
Threat Detection
Intrusion Detection and Prevention
Cyber Attacks
Continuous Improvement Process
Security Management
Cybersecurity
Threat Management
Vulnerability Assessments
Vulnerability Management
Cyber Security Policies
Network Security
Firewall
Virtual Private Networks (VPN)
Cyber Security Strategy
Security Controls
Cyber Governance

The GRC Approach to Managing Cybersecurity

Instructor: Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP Duration: Approx. 10 hours
Objective 1 Identify the importance and functions of Governance, Risk Management, and Compliance in Cybersecurity program management.
Objective 2 Describe best practices in risk management including the domains of risk assessment and risk treatment.
Objective 3 Describe the structure and content of Cybersecurity-related strategy, plans, and planning
Objective 4 Identify the key components and methodologies of Cybersecurity policies and policy development
Cyber Governance
Security Management
Security Controls
Cyber Security Assessment
Information Privacy
Cyber Risk
Continuous Monitoring
Cyber Security Strategy
Cyber Security Policies
Risk Management Framework

Managing Network Security

Instructor: Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP Duration: 2 weeks at 10 hours a week
Objective 1 Describe the threats to data from information communication technology (ICT)
Objective 2 Identify the issues and practices associated with managing network security
Objective 3 Identify the practices, tools, and methodologies associated with assessing network security
Objective 4 Describe the components of an effective network security program
Firewall
Cloud Security
Network Monitoring
Network Protocols
Vulnerability Assessments
Cyber Security Assessment
Cloud Computing
Security Awareness
Network Administration
General Networking
Security Management
Threat Detection
Virtual Private Networks (VPN)
Intrusion Detection and Prevention
Wireless Networks
Cybersecurity
TCP/IP
Computer Networking
System Monitoring
Network Security

Managing Cybersecurity Incidents and Disasters

Instructor: Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP Duration: 14 hours to complete 3 weeks at 4 hours a week
Objective 1 Define and describe the components of a cybersecurity contingency planning program
Objective 2 Identify the components and structure of an effective cybersecurity incident response program
Objective 3 Identify the components and structure of an effective cybersecurity disaster recovery program
Objective 4 Define and describe recommended contingency strategies including data backup and recovery and continuity of cybersecurity operations
Incident Response
Risk Analysis
Business Risk Management
Contingency Planning
Cybersecurity
Data Management
Crisis Management
Cyber Attacks
Security Management
Disaster Recovery
Business Continuity
Computer Security Incident Management

Road to the CISO – Culminating Project Course

Instructor: Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP Duration: 2 weeks to complete at 10 hours a week
Objective 1 Identify the career development and path of a Cybersecurity professional from entry-level to CISO
Objective 2 Define and describe the role and function of a CISO in planning for cybersecurity
Objective 3 Identify the development of a cybersecurity governance program and the role the CISO would play in it
Objective 4 Discuss the strategic responsibilities of the CISO in overseeing an organization’s cybersecurity program
Enterprise Risk Management (ERM)
Cyber Risk
Cyber Security Strategy
Organizational Leadership
Information Technology
Security Management
Contingency Planning
Governance
Business Risk Management
Risk Management
Staff Management
Cyber Security Policies
Cyber Governance
Organizational Structure
Cybersecurity
IT Management