Cyber Skill Certificates
May 10 - 11
2022
Cyber Leadership Certificate
- Leadership Certificate: Cyber Leadership
- Becoming a new or improved Cyber Leader comes by fire. Gaining new ideas to address old and new cyber challenges from many different perspectives and leadership perspectives from small organizations or Non-profits to Fortune 100, local, state and federal government helps guide priorities for cyber leaders.
- Benefits:
- Consider old and new risks
- Learn from leaders and your peers
- Participate sharing your perspectives and engage with others
- Hear how others are dealing with Board Leadership
- Examine effective team building and collaboration improves security posture
- Hear experienced testimonials on effective methods, products and services.
- Key Concepts:
- Leadership and Mentor Relationships
- Risks/Vulnerabilities Comparisons
- Budget Priorities
- Development of Cloud Architecture
- Building Cyber Expertise in your organization
- Focus on improving end-user security through better technology
- Competencies:
- Confidence gained from a well-rounded cyber world view
- Learn to use networking to improve your performance
- Gain practical knowledge from new product and services
- Prerequisites:
- Basic understanding of network and security fundamentals
- Certificate Requirements: Session attendance and Successful completion of Certificate Exam.
- Upon successful exam completion, Certificate will be sent to conference attendee registration email.
Breach Defense Certificate
- AustinCyber.Show Cyber-by-Fire Certificate
- Technical Certificate: Breach Defense
- SolarWinds Supply Chain Attack, notwithstanding nation-state criminal involvement, continues a global blame game. Even today, elements of the SolarWinds attack are at work in unsuspecting organizations. In this certification course, you will learn how organizations can determine if they are victim to undetected infiltration and how to defend against this and similar type supply chain attacks through a detailed case study and analysis of the Solar Winds Breach.
- Benefits:
- Learn detail steps of the SolarWinds Breach
- Gain insights from lessons learned
- Improve Best Practice methods to stop supply chain attacks
- See packet analysis case study from SolarWinds Breach
- Get printed copy of 48-page detailed SolarWinds Breach Report
- Key Concepts:
- Why maintaining application development unpublished helps security
- Anatomy of a Massive Breach
- Vital Server Direct Internet Updates
- Four Communications Perspectives of a Vital Server
- Basic 5 W Vetting of Vital Server Communications
- Software Improvement Program – An Inside Job?
- Vetting and Exterminating Entrenched Criminals
- Opinion: Breach Diagram - Color showing Responsible Party
- Preventing Data Breach Through DataTravel Limits
- Competencies:
- Best Practice System Updating
- Understanding directional communication perspectives
- Vetting Vital Server Communication
- Expose and Exterminate Infiltration
- Prerequisites:
- Basic understanding of network and security fundamentals
- Certification Requirements: Session attendance Breach Defense (a); Session attendance Breach Defense (b); Successful completion (In Person or Remote) Lab work; Successful Completion Certificate Exam.
- Upon successful exam completion, Certificate will be sent to conference attendee registration email.
Exfiltration Defense Cyber-by-Fire Certificate
- AustinCyber.Show Cyber-by-Fire Certificate
- Technical Certificate: Exfiltration Defense
- For thirty years HOP Starvation has been keeping Internet BGP (Border Gateway Routers) safe from disruption. This course will provide principles, theory, and application of this promising new security method. Learn how BGP routers have maintained route security for over 30 years.
- Benefits:
- Learn common methods of Exfiltration Defense
- Gain understanding of new Exfiltration Defense methods
- Practice new skills to discover how far data is traveling
- Visualize where data packets are going inside and on Internet
- Be able to set data travel limits on your devices
- Lab work to introduce new concepts
- See case studies on how limiting data travel stops ransomware and data exfiltration.
- Key concepts:
- Global Attack Surface
- Phish & Ransomware Attack
- Vital Server Data Protection
- Labs will discover where and how far data is traveling
- Conventional Security vs. HOP Starvation
- Competencies:
- Packet Capture Techniques & Options
- DataTravel Mapping
- Vulnerability Identification
- Block Compliance and Report Sharing
- Investigation Reporting
- HOP Investigation Portal Management
- Prerequisites:
- Basic understanding of network and security fundamentals
- Certificate Requirements: Session attendance Exfiltration Defense (a); Session attendance Exfiltration Defense (b); Successful Completion (In Person or Remote) Lab work; Successful completion Certification Exam.
- Upon successful exam completion, Certificate will be sent to conference attendee registration email.
QUIC Protocol Certificate
- AustinCyber.Show Cyber-by-Fire Certificate
- Technical Certificate: QUIC Protocol – TCP’s Replacement
- QUIC consumes 50% of Internet traffic meeting faster app and 5g speed demands. Cyber professionals need rapid understanding of the 1000 pages related to QUIC IETF rfc-9000 protocols. TCP/IP has served well as the Internet Protocol Standard for nearly 50 years. QUIC packets are blind to middle devices, causing firewall vendors to recommend blocking QUIC in all enterprise network firewalls. This timely certification training reduces time to understand about how and why it’s faster and the new security issues facing enterprises. Google and Facebook now use QUIC for near all server traffic and Microsoft Server 2022 is said to apply QUIC to connect CIFS/SMB file access across the Internet without VPN encapsulation. Get up to speed - QUIC!
- Benefits:
- Learn how QUIC is faster from packet capture benchmarks
- See how QUIC works and why it is faster
- Gain architectural insights from near 1000 pages of IETF rfc-9000 related standards
- Receive detailed printed QUIC Protocol paper with published benchmarks
- Hear what vendors are using QUIC
- Case study in finding QUIC users in your network.
- How to better manage QUIC security in enterprise networks
- Learn how you can employ QUIC benefits to your own Web Sites and Apps
- Key Concepts:
- Architecture of TC/P vs QUIC
- Latency as a factor
- Benefits of QUIC
- Risks/Vulnerabilities
- Competencies:
- Understanding TC/P vs QUIC
- Packet Capture Methods/Options
- Packet Analysis to Identify QUIC
- Maximize Benefit/Minimize Risk
- Prerequisites:
- Basic understanding of network and security fundamentals
- Certificate Requirements: Session attendance QUIC Protocol (a); Session Attendance QUIC Protocol (b); Successful Completion (In Person or Remote) Lab work; Successful completion Certification Exam.
- Upon successful exam completion, Certificate will be sent to conference attendee registration email.