ATTENTION: PHYSICAL SECURITY PROFESSIONALS
Cyber Security for the Physical Security Professional
One-of-kind online course shows you how to use your existing physical security knowledge and experience to break through the physical/cyber barrier
Are You Ready to Prepare Yourself for the Security Career of Tomorrow?
The world of the security professional – whether cyber, physical, life safety, risk management, or other – grows more and more complex every day with the advent of new and advanced technologies and ever-increasing threats.
And while much of the cybersecurity world seems like a mystery shrouded in technological buzz words and an endless stream of amazing new devices, the reality is that you don’t have to be a technical genius to understand the fundamentals of cybersecurity or to make a difference in protecting your organization.
In fact, it’s easier than you think to cross the physical/cyber divide because your physical security career and knowledge provides the foundation on which to build your understanding of cybersecurity risks and how you can protect your people, information, and protect against those risks.
Cyber Security for the Physical Security Professional is the first course specifically designed to help physical security professionals learn the fundamentals of cybersecurity, so they can take the first steps towards crossing the physical/cyber divide and prepare themselves for an exciting and rewarding career as an in-demand cybersecurity professional.
Cyber Security for the Physical Security Professional is a comprehensive, self-paced video course that consists of 15 modules and covers everything you need to know to take your first steps towards an exciting new career as an in-demand cybersecurity professional.
Who This is For
Cyber Security for the Physical Security Professional is ideal for physical security professionals - in contract or in-house roles - who want to unlock the secrets to the world of cybersecurity and take the first steps towards opening the door to new career potential and opportunities.
Dave Tyson has spent 35 years in the security profession - the first 15 of which were spent working for a variety of contract security firms in a wide range of roles - from mall security to Vice President of Operations.
He has spent the last 20 years in the cybersecurity space, where he has distinguished himself as one of the leading voices and has held leadership positions with eBay, Nike, PG & E, and SC Johnson & Sons.
Dave is also a past President of the American Society of Industrial Security (ASIS).
Cyber Security for the Physical Security Professional comprises 15 modules that, combined, total just over 5.5 hours. All but the first module have quizzes you're required to pass before proceeding to the subsequent lesson. Upon successful completion of the course, you will be issued a certificate of completion.
MODULE 1 - BACKGROUND & LEVEL-SETTING
Module 1 introduces the program content and review the Instructor profile. This section presents the foundational structure of the course material and provides an overview of all the modules and learning objectives for each. The module provides an overview of the changing business world and its impact on security and what the implications are for the security practitioner.
- Review Instructor profile
- The foundational structure of the course material
- Overview of all the modules and learning objectives
- Overview of the changing business world and its impact on security
MODULE 2 - THE BASICS
Module 2 introduces the participant to the basics of cyber security theory as a grounding to build the course material on. Initial discussions focus on common physical security topics and connects them through common language to related cybersecurity material to begin the journey of understanding cybersecurity in plain English. This Sets the stage for program learning by connecting common security concepts to cyber topics while enabling the participant to utilize their existing security knowledge in the construct of Cyber examples.
- Introduce you to the basics of cybersecurity theory
- Introduce common physical security topics and link them to cybersecurity
- Set the stage for your program learning by connecting common security concepts to cyber topics
MODULE 3 - COMPONENT PARTS
Module 3 will expand the participant’s cybersecurity knowledge in understanding how the protection of cyber systems and data is created by understanding and combining the component parts of the cybersecurity defensive makeup of people, process & technology. The module also sets the stage for participant program learning by creating a basic framework level set on technical terminology and creates user confidence in understanding the techno-speak for future modules. This technical grounding, in the context of physical security concepts, allows the participant to tackle the core components of a cybersecurity problem and the technical language, within what they now understand.
- Expand your cybersecurity knowledge in understanding how protection of cyber systems can be designed
- Set the stage for your program learning by creating a basic framework to apply technical terminology of future modules to
- Technical grounding in the context of physical security concepts
Module 4 – Terminology Building Blocks
Module 4 starts by expanding the basic cybersecurity terms, buzzwords and concepts as a launching point for now learning more advanced terminology commonly used in most IT departments today. Pulling these together allows the participant to begin to look at cybersecurity as an entire system and explore it in more depth.
- Basic terms
- More advanced terminology
- Pulling them together
Module 5 – Security Architecture
Module 5 begins the journey in cybersecurity architecture fundamentals and introduces the participant to a simple way to relate traditional physical security architecture concepts to cybersecurity defenses. By aligning these more structural physical and cyber concepts, we can now see what core defenses need to be in place to protect our organizations today and where some of the risks may exist when these structural components are missing. The participant can now begin to see risk as a driver of cyber tool selection and program development.
- Security architecture concepts
- Aligning physical and cyber concepts
- Risk as a driver of cyber tool selection
Module 6 – The Weakest Link
In module 6 the participant is introduced to cybersecurity management models and very similar in theory to physical security concepts. Traditional concepts such as trust and user authentication are explored to develop a more advanced view of the management of cyber risk. A deeper dive into network technology is presented to understand and link the trust concept to network and networking structure and technology.
- Cybersecurity management models
- Mutual trust
- Network technology
Module 7 – The Advanced Bits
In module 7 we explore cybersecurity management and the decision-making model for managing, mitigating and accepting risk. We begin to explore attack terminology and attacker tools & techniques to understand the adversary and how they typically exploit a weakness in an organization's cyber defenses.
- Cybersecurity management
- Attack terminology
- Cyberattack tools & techniques
Module 8 – Malware
One of the greatest threats organizations face today is from malware (viruses), this module will provide a basic easy to understand grounding on malware including definitions and how it's used by hackers and criminals. It explores the methods by which organizations get malware and what some of the defenses available are for organizations to protect themselves from malware. Finally, this module looks at the business implications of not dealing with malware effectively and what can happen, for consideration when contemplating how much risk is appropriate in your security plan.
- How you get it
Module 9 – Who & How
Module 9 explores in detail cyber adversaries, or simply put the category of bad guys who attack organizations and how they are different from each other. Participants will understand the threat sources and attack methods utilized by these attacker groups. Further, participants will learn about targeted attacks and why these present an additional level of risk for organizations.
- Cyber adversaries
- Threat sources
- Attack methods
- Targeted attacks
Module 10 – The Economics of Attacks
Module 10 extended the targeted attack concept to include the financial drivers and implications to demonstrated why cybercrime and hacking are so popular and successful. The concept of the Security Risk Curve is introduced to provide a mechanism to manage and mitigate risk given the changing world of threats and limited financial resources available.
- Financial implications of a targeted attack
- Security risk curve
- Hackers and the risk curve
Module 11 – The Digital World
Module 11 tackles new technologies rapidly being introduced into most business environments today and identifies how these technologies create new and unknown cyber risks for organizations. Further, it discusses how to consider these risks’ impact on the existing technology landscape and the implications of these new risks. Technologies include:
- Internet of Things
- Augmented, Immersive and Virtual Reality
- Machine content creation
- 3D & 4D Printing
- Virtual currency and Blockchain technologies
Module 12 – The Dark Web
Module 12 introduces the murky world of the dark web. The dark web is a section of the internet that most users are unable to reach because access requires more specialized tools and knowledge. The module explores how hackers utilize this safer space to conduct criminal operations and visit Darkweb markets to buy and sell their tools and stolen goods. The module will explore anonymizing technologies used in this environment that present threat Implications for businesses from these risks.
- Darkweb introduction
- Darkweb markets
- Anonymizing technologies
- Threat implications
Module 13 – Web 2.0 & 3.0
This module provides background on the Internet itself and how it has begun to evolve through different generations of technology often referred to as Web 1.0, 2.0, 3.0. The internet has been a tremendous benefit for the Business Side of Cyber Crime, and this module explores some of the reasons for this expansion and how this knowledge can be applied to protect your organization. Finally, the pace of change in the internet and online business world is a rapidly changing environment and this module looks at the changing risk landscape and how you can understand these risks in the context of what is important to your organization.
- Web 1.0, 2.0, 3.0
- The business side of cybercrime
- The changing risk landscape
Module 14 – Information Security
This module looks at typical Information security (InfoSec) teams and functions and explores the different roles traditionally contained within InfoSec functions. Teams and model types are explored to increase the participants' understanding of how these functions work and how to engage with them effectively. Further, we explore the infoSec lifecycle to understand more about how the process of cybersecurity works and how and when to engage and connect like-minded conversation and security efforts.
- Information security function
- Teams and models
- InfoSec lifecycle
Module 15 – What can you do back at your organization?
Module 15 closes the training program with the “What can you do” section on actions you can take right away in your organization with what you have learned. We present best practices, tips and tricks and resources for continual learning. Finally, checklists for resources are provided for easy use.
- What can you do
- Best practices
- Tips and tricks
- Resources for continual learning