Teechas is a training and consulting firm with specialties in information technology (IT) support services including training and management, job readiness and placement, and business process improvement. We provide individual, team, and organization-wide training and services to both private and public organizations.
Let’s get your business started on the next cyber security projects, connecting you with the industry experts as well as the best solution
During this program, participants will receive various practical exercises to reinforce their learning. Most
of the sessions will be scenario based.
INTRODUCTION TO CYBER SECURITY
This course aims to provide a general overview and examination of the information security knowledge framework through the scope of 8 cyber security domains to develop an enhanced understanding on fundamental information required for information security projects and the designation.
INFORMATION SECURITY RISK MANAGEMENT AND GOVERNANCE
This course will assist the development of an understanding of the ethical, legal and regulatory issues surrounding cyber security as you learn about security principles, network fundamentals and how to apply these areas to design networks and policies for security and compliance
DATA, ASSET AND IDENTITY PROTECTION
TheĀ amount of digitized data grows in size and vulnerability every day, requiring specialized attention toward processes, protection, security and authentication. Learn how to mitigate risk and protect ownership by understanding best practices for data gathering, classification, storage, retention and protection.
32 hours
ENGINEERING FOR INFORMATION SECURITY
Security engineering requires an understanding of security models, secure design principles and the ability to assess a variety of systems for vulnerabilities. Students will learn these fundamental concepts as well as information on selecting controls and countermeasures, and the application of cryptography.
CYBER SECURITY OPERATIONS MANAGEMENT
Effective leadership in the field of information security requires an elevated understanding of security operations concepts and how to apply these in real-world situations. The content of the course provides the details of how to apply concepts, from best practices in vendor procurement, through to investigations and preventative measures, resource management, disaster recovery, and business continuity.
SECURITY ASSESSMENT AND TESTING
The development, evaluation and validation of assessment processes isĀ integral to securing system infrastructure and detecting vulnerabilities. This course will help a participant to develop an in-depth understanding of the techniques and industry standards for assessment validation, continuity, analysis, reporting and facilitating audits.
32 Hours
Experienced Cyber Security professionals