Menu 

Cyber Security Certification Self-Paced Courses

Cyber Security Certification Course Self Paced

Savannah Technical College, in partnership with Phase2Advantage, is proud to offer 4 new Cyber Security training courses. The courses fall within the National Initiative for Cyber Security Education Framework and are located on the Department of Defense’s DoD 8140 Directive. Learn more about NICE, the DOD 8140 Directive, and the new Cyber Security Courses.

The courses on this page are:

Online Self-Paced, where you will complete the course at your own pace during the allotted access period.

Take a look at our available courses below!

Certified Cyber Security Operations Manager

The Certified Cyber Security Operations Manager certification course brings Cyber Security core competencies to advanced levels with new concepts and traditional best practices. Using 16 detailed learning objects, students will be provided with the knowledge and  context needed to successfully manage the security of their technical environments. Focusing on the Information Security concerns of today, students will cover topics such as Cloud Security, Threat Intelligence Collection and Analysis, Biometric Security Systems, Incident Response, Asset Management, and the NICE Cybersecurity Workforce Framework

Learning Objectives

01) The NICE Cybersecurity Workforce Framework
02) Principles of Identity and Access Management
03) Biometric Identification and Security Systems
04) Securing Systems and Data Using Cryptography
05) Secure Network Architecture for Non-Architects
06) Identifying Network Baselines and Anomalies
07) Incident Response and Remediation Strategies
08) Host and Network Data Collection Methods
09) Investigations, Evidence, and Chain of Custody
10) Risk Management Frameworks and Implementations
11) Vulnerability Assessment and Management
12) Business Continuity and Disaster Recovery
13) Threat Intelligence Collection and Analysis
14) Cloud Computing Architecture and Security
15) Service Level Agreements and Legal Contracts
16) Creating Testing Scenarios and Playbooks

Certified Cyber Incident Response Manager

As organizations continue to rely on expanding infrastructure in an increasingly hostile threat landscape, the escalation of incidents involving malicious actors poses critical risks to information systems and networks. The ability to identify threats, respond to incidents, restore systems, and enhance security postures is vital to the survival of the operation.

The Certified Cyber Incident Response Manager certification course brings Incident Response core competencies to advanced levels by presenting students with 16 detailed learning objectives. Students will be provided with the knowledge and the practical skills needed to investigate and respond to network and system incidents. With a specific focus on the identification and remediation of incidents involving host and network devices, students will cover topics such as Threat Intelligence Collection, Investigative Techniques, Creating Playbooks, and Malware Triage. Practical lab exercises utilize Wireshark, a packet capturing tool used in real-world investigations.

Learning Objectives

01) Overview of The Incident Response Life Cycle
02) Understanding the Threat Landscape
03) Building an Effective Incident Response Capability
04) Preparing for Incident Response Investigations
05) Vulnerability Assessment and Management
06) Identifying Network and System Baselines
07) Indicators of Compromise and Threat Identification
08) Investigative Principles and Lead Development
09) Threat Intelligence Collection and Analysis
10) Overview of Data Forensics and Analysis
11) Host-Based Data Collection Practices
12) Network-Based Data Collection Practices
13) Static and Dynamic Malware Triage
14) Incident Containment and Remediation
15) Incident Reporting and Lessons Learned
16) Creating Playbooks and Response Scenarios

Certified Disaster Response and Recovery Manager

Business Continuity and Disaster Response and Recovery is the development of processes, policies, and procedures that prepare for and react to significant and unplanned operational disruptions. The Certified Disaster Response and Recovery Manager training course prepares students for industry certification in Business Continuity planning and Disaster Recovery missions.

As businesses face a wide range of daily risks—including cyber-attacks, human error, technical failures, and natural disasters—it is vital they create practical plans to sustain their security posture, financial health, and industry and/or brand reputation to maintain long-term success. Students will cover critical topics such as BCP Design and Development Strategies, Selection of Risk Management Frameworks, Qualitative and Quantitative Analysis Strategies, Creating Asset Inventories and Resource Profiles, Recovery Site Management and Workflows, Reviewing Cloud Computing Service Agreements, Cloud Data Security Strategies, and the Impact of Legal Requirements on Cloud Storage Solutions.

Learning Objectives

01) Introduction to Disaster Response Management
02) Overview of The Business Impact Analysis
03) Selection of Risk Management Frameworks
04) Qualitative and Quantitative Analysis Strategies
05) Implementing the 5 Levels of BCP Test Progression
06) Creating an Emergency Operations Plan
07) Recovery Site Management and Workflows
08) Preparing for Epidemics and Pandemics
09) Introduction to Cloud Computing Concepts
10) Cloud Data Storage and Security
11) Cloud Security Risks and Threat Vectors
12) Cloud Security Responsibility and Administration
13) Distributed Cloud Networks: Legal Considerations
14) Regulation and Compliance in Cloud Computing
15) Understanding the Structure of Legal Contracts
16) Reviewing Contracts and Service Level Agreements

Certified Network Forensic Analysis Manager

The Certified Network Forensic Analysis Manager certification course was originally developed for the U.S. government, and has now been made available to city, county, and state law enforcement agencies.  Civilian personnel outside the law enforcement community are also authorized to attend on a case-by-case basis.

 

This comprehensive course brings incident response and network forensic core competencies to advanced levels by presenting students with 12 detailed learning objectives. Students will be provided with both experiential knowledge and practical skills that simulate real-world scenarios, investigations, and recovery of evidentiary data in systems and networks.  With a specific focus on the centralizing and investigating of logging systems and network devices, students will cover topics such as: Incident Response Management; Live Data Collection; Analysis Methodology; Malware Triage; and, practical lab exercises utilizing the Wireshark packet capturing tool for network investigations.

Learning Objectives

01) Preparing for Network Forensic Investigations
02) Incident Response Management
03) Pre-Investigation Preparation
04) Initiating Network Forensic Investigations
05) Initial Development of Leads
06) Principles of Live Data Collection
07) Principles of Network Evidence
08) Enterprise Services and Topology
09) Forensic Analysis Methodology
10) Static and Dynamic Malware Triage
11) Forensic Strategies for Incident Remediation
12) Wireshark Labs: Packet Capture Analysis

DoD Directive 8140 (DoD 8570)

What is DoD Directive 8140 (8570)?

Department of Defense Directive 8570 has been replaced by the DoD as Department of Defense Directive 8140. DoD 8570 is now a part of a larger initiative that falls under the guidelines of DoD 8140. DoD 8140 provides guidance and procedures for the training, certification, and management of all government employees who conduct Information Assurance functions in assigned duty positions. These individuals are required to carry an approved certification for their particular job classification. GIAC certifications are among those required for Technical, Management, CSSP, and IASAE classifications.

Who is affected by DoD 8140?

Any full or part-time military service member, contractor, or local nationals with privileged access to a DoD information system performing information assurance and security functions, regardless of job or occupational series.

    • Office of the Secretary of Defense
    • Military Departments
    • Chairman of the Joint Chiefs of Staff
    • Combatant Commands
    • Office of the Inspector General of the DoD
    • Defense Agencies
    • DoD Field Activities
    • All other entities in the DoD

Click Below to See Courses that Map to DoD 8140

Technical GIAC Certification Phase2Advantage Certification
IAT Level III Certified Incident Handler Cyber Incident Response Manager
Management GIAC Certification Phase2Advantage Certification
IAM Level I Security Leadership Certification Cyber Security Operations Manager
IAM Level II Security Leadership Certification Cyber Security Operations Manager
IAM Level III Security Leadership Certification Cyber Security Operations Manager
CSSP GIAC Certification Phase2Advantage Certification
CSSP-A Certified Incident Handler Cyber Incident Response Manager
CSSP-A Certified Intrusion Analyst Network Forensic Analysis Manager
CSSP-IR Certified Incident Handler Cyber Incident Response Manager
CSSP-IR Certified Forensic Analyst Network Forensic Analysis Manager

National Initiative for Cyber Security Education (ICE)

The National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NICE Framework), published by the National Institute of Standards and Technology (NIST) in NIST Special Publication 800-181, is a nationally focused resource that establishes a taxonomy and common lexicon to describe cybersecurity work, and workers, regardless of where, or for whom, the work is performed.

Click on the boxes below to learn more and see which courses align with the different areas.

Performs highly-specialized review and evaluation of incoming cyber security information to determine its usefulness for intelligence

Available Courses
Certified Network Forensic Analysis Manager
Certified Cyber Incident Response Manager

Provides specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.

Available Courses
Certified Cyber Security Operations Manager

Investigates cyber security events or crimes related, but not limited to, information technology (IT) systems, networks, and digital evidence.

Available Courses
Certified Network Forensic Analysis Manager
Certified Cyber Incident Response Manager

Provides the support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security.

Available Courses
Certified Cyber Security Operations Manager
Certified Disaster Response & Recovery Manager

Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work.

Available Courses
Certified Security Operations Manager

Identifies, analyzes, and mitigates threats to internal information technology (IT) systems and/or networks.

Available Courses
Certified Network Forensic Analysis Manager
Certified Cyber Incident Response Manager
Certified Cyber Security Operations Manager

Conceptualizes, designs, procures, and/or builds secure information technology (IT) systems, with responsibility for aspects of system and/or network development.

Available Courses
Certified Disaster Response & Recovery Manager
Certified Cyber Security Operations Manager