With the advent of dangerous malicious codes like Flame and Stuxnet, it has become evident that nations or institutions can electronically wage wars against enemies or competitors. As the risks of traditional wars abate, Internet has since evolved as the 21st century battleground where malware, not rockets, can be used to launch attacks on national infrastructure like power, telecoms, capital market and financial institutions. Also, through espionage and hacking, organized crimes by nations, corporate institutions and individuals can steal vital intellectual properties (IPs) that drive innovations in any economy. When a country or organization loses its competitive advantage, its competitive capability will be weakened. Our training programs are designed to equip learners with 21st century cybersecurity skills that will help them advance their careers while protecting their organizations.
ICT is facilitating the process of socio-economic development. It has offered new ways of exchanging information, and transacting businesses, efficiently and cheaply. It has also changed the dynamic natures of financial, entertainment and communication industries and provided better means of using the human and institutional capabilities of the country in both the public and private sectors. Increasingly, ICT is rapidly moving nations towards knowledge-based economic structures and information societies, comprising networks of individuals, firms and nations that are linked electronically and in interdependent relationships. As economic systems go digital, the risks posed by unsecured weakest links in financial systems at host, intermediary and client levels will become prominent.
Through digital combats in Estonia and Ukraine, it has been established that cyber-threats are not games of choice. As internet penetration continues to advance globally, so are the perils that come with the increased degree of digital connectivity – Cyber crime. However, most organizations lack both proper security plans and trained in-house staff to counter or quickly recover from cyber attacks.
The goal of Fasmicro Institute cybersecurity programs are to:
• Develop business and government leaders with competence to create and manage effective cybersecurity practices.
• Understand and solve the evolving cybersecurity risks, equipping learners with cutting-edge skills in a fledgling industry even as nations/firms move into electronic societies with associated digital risks.
• Prepare learners to master ways to Prepare, Detect, Defend, Defeat, and Harden their critical information infrastructure.
Outcomes / Objectives
At the conclusion of our programs. learners will will strengthen their capacities in some of these areas:
• Understand the strategic importance of cybersecurity
• Include cybersecurity assessment as a management system
• Develop cybersecurity strategy
• Appreciate the current policies and legal structure within data security management
• Understand relevant technical components (forensics, intrusion, detection, etc) within digital security
• Develop appropriate technology-based and human-based controls to protect information systems from cyber-intrusion
• Assess the primary cyber-threats to an organization’s mission-critical information systems
• Assess the vulnerabilities of an organization’s hardware and software systems,
• Analyze the vulnerabilities of organization’s use of the Internet to cyber-intrusion
• Develop appropriate technology-based and human-based controls to protect an organization’s mission-critical information systems from cyber-intrusion
• Formulate strategies to protect an organization’s mission-critical information systems from cyber-intrusion
• Develop management capabilities on cybersecurity and cyberspace
• Understand standards, frameworks and institutions harmonizing global cybersecurity management
The most common titles or institutions of participants include:
IT Security Manager, Risk, Compliance & Control Manager, Head – IT, Head – Operations & Strategy, Business Development Director, Product Manager, Regional Director, Head of Brand Management, Business Director, Professors, lecturers, VP of Strategic Projects, Managing Director/CEO, IT Architects and Administrators, Mobile Developers, Students/ NYSC, Government & Intelligence Agencies, Military and Law Enforcements, Others
o The Vulnerabilities of ICT Systems
o Designing Robust Systems
o The State of Cybersecurity
o National Cashless Initiative – The CyberSecurity Blueprint
o National Identity Management and Cybersecurity
o The Vulnerabilities of Enterprise Networks and the Internet
o Infrastructure of information systems
o Secure Networks and systems
o Elements for Preventing Cyber Intrusions
o Cybersecurity Fundamentals Managers
o Essentials of Establishing a Secure Organization
o Guarding Against Intrusions in Systems and Networks
o Operating System Security
o Global Network Security (Internet, GIS, BYOD, etc)
o Secure Networks and systems & Global Network Security (Internet, GIS, BYOD, etc)
o Elements for Preventing Cyber Intrusions & Guarding Against Intrusions in Systems and Networks
o The Cybersecurity Roadmap
o Infrastructure of information systems
Labs, Labs, Labs
Cybersecurity Equipment and Tools
Depending on the programs, we provide some of these practical tools for our learners:
- Virtual Lab Environment: A virtual lab environment employs the concept of virtualization and allows one to use a single physical computer for hosting multiple virtual systems, each running a potentially different operating system
- Computer Forensics Tools: Computer forensic tools are used for digital image acquisition, analysis, reporting, recovery and investigation of material found in digital devices
- Malware Analysis Tools: Malware analysis tools are used to disassemble, debug and analyze compiled malicious executables. This is a key tool in reverse engineering and facilitates malware analysis. While analysis relies primarily on the expertise of skilled and trained personnel, these tools enable the process to be accomplished much easier.
- Live Memory Forensics Tools: Memory forensics tools are used to acquire and/or analyze a computer’s volatile memory (RAM).
- Network Forensics Tools: Network forensic tools provide real-time network forensics and automated threat analysis solutions.
- Expert Witness Testimony: To provide expert witness testimony, one must be able to provide a visual presentation of associations and linkages that may exist for any person, location or thing under investigation.
- Up-to-Date Threat intelligence: Serve as the operational focal point for up-to-date threat information sharing through a Virtual Collaborative Information Sharing Environment for eligible subscribers.
Program Description: The Facyber Cybersecurity Training is anchored around four key pillars of cybersecurity policy, management, technology and digital forensics and structured across Certificate, Diploma and Nanodegree programs. This implies that they cover all the core needs of any learner, organization or state institution. While learners like corporate lawyers may require training on policy, some like IT engineers may need technical skills. Others like business leaders will find the management module useful. It has something for everyone including CEOs and Boards.
We do hope you will encourage your colleagues to take these competitively priced programs. You can also take them. To register, visit mobile-friendly facyber.com and register. Then make the payment. Facyber supports many payment options including Paypal, credit & debit cards, and bank transfer. The fees are as follows:
- Certificate Program (Online 12 weeks, $200 )
- Diploma Program (Online 12 weeks, $600)
- Nanodegree Program (Live 1 week, $1600)
Curriculum: The programs curricula are very detailed; click here (PDF) for details.
A sample curriculum is provided for Certificate in Cybersecurity Policy. Certificate in Cybersecurity Policy deals with the policy analysis and implementation aspects of cybersecurity. It presents theory and topical issues, at government and enterprise levels, with both technical and managerial components in the fields of information systems security. The program helps learners develop skills on the policy, ethical, and legal issues associated with cybersecurity and information security. The program covers the following over 12 weeks
Week 1 – Structure of Information Systems
Week 2 – Information Systems & Networks Vulnerabilities
Week 3 – Foundations of Cybersecurity
Week 4 – SMAC & BYOD Security
Week 5 – Preventing Cyber Intrusions
Week 6 – Evaluating Emerging Cybersecurity Technologies
Week 7 – Ethics in Information Technology
Week 8 – Security Policy Analysis
Week 9 – Security Policy Implementation
Week 10 –Global Cybersecurity Policy & Law
Week 11 – Enterprise Cybersecurity Policy
Week 12 –Exam
Certificate of Completion: At the end of a successful program, a learner will receive a certificate that looks thus.
Fore more, contact Audrey Kumar, Director, Learning Innovation | email@example.com