Are You Finally Ready To Level Up Your Security Career – And Your Earning Potential – By Taking The First Steps On The Pathway To Becoming A Highly Sought-After Cybersecurity Consultant?
No background in technology? Break out in a cold sweat at the mere thought of terms like malware, phishing & zero-day attacks? No problem. This one-of-a-kind course was developed by a former physical security professional who saw the writing on the wall & realized the future was in cybersecurity. And in this course, he's going to share with you – in plain English – how you can use your existing knowledge & experience to connect the dots between cyber & physical security…just as he did…and take your first steps towards a career in cybersecurity.
Dear Physical Security Professional:
The world of the security professional – whether cyber, physical, life safety, risk management, or other – grows more and more complex every day with the advent of new and advanced technologies and ever-increasing threats.
And while much of the cybersecurity world seems like a mystery shrouded in technological buzzwords and an endless stream of amazing new devices, the reality is that you don’t have to be a technical genius to understand the fundamentals of cybersecurity or to make a difference in protecting your organization.
In fact, it’s easier than you think to cross the physical/cyber divide because your physical security career and knowledge provide the foundation on which to build your understanding of cybersecurity risks and how you can protect your people, information, and protect against those risks.
Cyber Security for the Physical Security Professional is the first course specifically designed to help physical security professionals learn the fundamentals of cybersecurity, so they can take the first steps towards crossing the physical/cyber divide and prepare themselves for an exciting and rewarding career as an in-demand cybersecurity professional.
Inside This Course
This course is packed with the kind of information you need to take your existing security knowledge & experience & start connecting the dots with cybersecurity.
What People are Saying About This Course
Colleagues, in the environment we are in today it is imperative that you have a working knowledge of cyberspace. This program will give you the necessary tools to hold your own in a C suite discussion. Dave is a master at being able to explain in plain English what you need to know. This is an investment in your future.
This kind of training is crucial for developing a more rounded and informed security professional equipped for the problems of today and tomorrow, not yesterday. This is simply the only program I am aware of that delivers what is needed, in a language everyone can understand.
This program is one of a kind, it gives the attendees a real foundational understanding of cybersecurity and leverages their existing security knowledge to accelerate the learning process.
Meet Your Instructor
Dave Tyson has spent 35 years in the security profession – the first 15 of which were spent working for a variety of contract security firms in a wide range of roles – from mall security to Vice President of Operations.
He has spent the last 20 years in the cybersecurity space, where he has distinguished himself as one of the leading voices and has held leadership positions with eBay, Nike, PG & E, and SC Johnson & Sons.
Dave is also a past President of the American Society of Industrial Security (ASIS).
Take a Sneak Peek at What’s Inside This Course
Cyber Security for the Physical Security Professional comprises 15 modules and 14 quizzes that you should be able to complete in approximately 12 hours. Upon successful completion of the course, you will be issued a certificate of completion.
1 – Background & Level Setting
An introduction to the course content and program instructor, along with an overview of the changing business world and the impact on security and what the implications are for the security practitioner.
2 – The Basics
An introduction to the basics of cybersecurity theory as a grounding to build the course material on, with a focus on common physical security topics and their connection to the cybersecurity world.
3 – Component Parts
You’ll expand your growing cybersecurity knowledge by learning about the protection of cyber systems and data and discover the component parts of the cybersecurity makeup of people, process & technology.
4 – Terminology Building Blocks
Explore basic cybersecurity terms, buzzwords & concepts as a starting point for learning some of the more advanced terminology used in most information technology departments today.
5 – Security Architecture
Learn about cybersecurity architecture fundamentals & gain an understanding of a simple way to relate traditional physical security architecture concepts to cybersecurity defenses.
6 – The Weakest Link
You’ll get to know about the cybersecurity management models & their similarities to physical security concepts. And you’ll also gain a more advanced view of the management of cyber risk.
7 – The Advanced Bits
We’ll explore cybersecurity management and the decision-making model for managing, mitigating & accepting risk. And we’ll also take a look at attack terminology & attacker tools & techniques.
8 – Malware
You’ll gain a solid grounding in malware, including how it’s used by hackers & criminals. You’ll also discover how organizations get malware & how they can protect against it.
9 – Who & How
You’ll learn about cyber adversaries, the “bad guys” who attack organizations, as well as the threat sources & attack methods they use. You’ll also learn about targeted attacks & the added risks they pose.
10 – The Economics of Attacks
We’ll delve further into the financial drivers & implications of targeted attacks, key factors that make hacking & cybercrime so widespread and successful. And we’ll also introduce the Security Risk Curve.
11- The Digital World
Learn how new technologies – like the Internet of Things (IoT), 3D & 4D printing, virtual currencies & blockchain technologies, drones, machine content creation & more – create new & unknown cyber risks that organizations are forced to confront.
12 – The Dark Web
We’ll introduce you to the murky world of the dark where, where hackers “meet” to conduct criminal operations & cruise dark web markets to buy & sell their tools & stolen goods. We’ll also explore the risks that anonymizing technologies post to organizations.
13 – Web 2.0 & 3.0
We’ll take you through a history of the Internet itself & how it has evolved over time through different generations of technology known as Web 1.0, 2.0 & 3.0. We’ll also explore how the Internet has been a tremendous benefit for the business side of cybercrime.
14 – Information Security
You’ll learn about the typical Information Security (InfoSec) teams & functions as we explore different roles traditionally found within InfoSec functions. We’ll introduce you to the InfoSec lifecycle so you’ll better understand how the process of cybersecurity works.
15 – What You Can Do Now
We’ll close out the program by detailing out actions you can advise on – and take – right away in your organization. We’ll also present best practices, tips, tricks & resources for continual learning. Finally, we provide checklists for key resources you can access.
Key Program Features
Here’s more of what makes Cybersecurity for the Physical Security Professional a great investment.