Cyber Security training at New Horizons St. Louis

Cyber Security Courses

Contact Us

Cyber Security Training at New Horizons St. Louis

New Horizons St. Louis is a leading information security provider who specializes in training information security professionals to meet the growing threat of cyber attacks.

Whether you're executing a company-wide training initiative, or looking to improve your individual skills to advance your career, New Horizons St. Louis offers convenient training solutions.

See more information on cyber security certifications below.

CyberSAFE Training & Certification

CyberSAFE training at New Horizons St. LouisSecurity Assets for End-Users

End-user awareness and training reduces security-related risks by 45% to 70%.
- Reuters.com

Corporate Benefit

Corporate Benefit

CyberSAFE allows organizations to increase their security posture quickly and with minimal investment by ensuring that end-users are equipped with the knowledge necessary to be good stewards of their organizations’ data.

Employee Profile

Employee Profile

This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.

Course Outcomes

Course Outcomes

Students will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect themselves and their organizations from those risks.

Training Credential

Training Credential

This course is designed to prepare students for the Certied CyberSAFE credental .Students can obtain their Certied CyberSAFE certicate by completing the Certied CyberSAFE credential process on the CyberSafeCert.com platform after completing this training.

Lesson 1: Identifying the Need for Security

  • Topic A: Identify Security Compliance Requirements
  • Topic B: Recognize Social Engineering

Lesson 2: Securing Devices

  • Topic A: Maintain Physical Security of Devices
  • Topic B: Use Passwords for Security
  • Topic C: Protect Your Data
  • Topic D: Identify and Mitigate Malware
  • Topic E: Use Wireless Devices Securely

Lesson 3: Using the Internet Securely

  • Topic A: Browse the Web Safely
  • Topic B: Use Email Securely
  • Topic C: Use Social Networking Securely
  • Topic D: Use Cloud Services Securely

An internal or external facilitator can deliver this course, either on-site or virtually.

Instructors should have experience teaching introductory technology courses, such as CompTIA’s A+. The ability to deliver course content to a varied audience (experience level, familiarity with technology, etc.) is key. Modern Classroom Certied Trainer (MCCT) is a suggested prerequisite, to ensure your instructors are expert in all training modalities, as well as utilizing the Logical Operations digital platform.

To ensure success in this course, students should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers, cell phones, and basic Internet functions such as web browsing and email. To obtain much of this prerequisite knowledge, students should consider taking the Using Microsoft Windows 8.1 course oered by Logical Operations.

3.5 hours (inclusive of the time required to complete the Certied CyberSAFE credential process).

CyberSAFE is accompanied by the Certied CyberSAFE credential process. This brief online credential covers 20 questions, and is included as part of the courseware.

CyberSEC First Responder Training

CYBERSEC First Responder Training at New Horizons St. LouisThreat Detection and Response

A cyber breach costs organizations $12.7 million, on average.
- Ponemon Institute

Student Profile

Student Profile

Designed for information assurance professionals whose job functions include development, operations, management, and enforcement of secure systems and networks.

Military

Military

This course fullls DoD directive 8570.01 for Information Assurance (IA) training and is designed for professionals establishing IA policies, security measures, and procedures for the DoD.

Course Objectives

Course Objectives

This course focuses on developing a systematic process for securing an organization’s network by implementing an incidence handling and response plan through threat detection and analysis.

Labs

Labs

At New Horizons St. Louis we feel there is no substitute for practice. Hands-on practical activities, written in Open Source Software, can be recreated or rented to provide this experience.

  1. Assessing Information Security Risk
  2. Creating an Information Assurance Lifecycle Process
  3. Analyzing Threats to Computing and Network Environments
  4. Designing Secure Computing and Network Environments
  5. Operating Secure Computing and Network Environments
  6. Assessing the Security Posture Within a Risk Management Framework
  7. Collecting Cybersecurity Intelligence Information
  8. Analyzing Cybersecurity Intelligence Information
  9. Responding to Cybersecurity Incidents
  10. Investigating Cybersecurity Incidents
  11. Auditing Secure Computing and Network Environments

This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

  • Recommended at least 2 years of experience in computer network security technology or a related eld.
  • Recognize information security vulnerabilities and threats in the context of risk management.
  • Operate at a foundational level some of the common operating systems for computing environments.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
  • Operate at a foundational level some of common concepts for network environments, such as routing and switching.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, rewalls, intrusion prevention systems, and VPNs (virtual private networks).

5 days/approximately 35 contact hours/ 1 semester/5 days boot camp

Certified Logical Operations CyberSec First Responder/3 hours (120+ questions)

Cyber Training at New Horizons St. Louis