Security

CCNA CyberOps

Cisco Certified Network Associate (CCNA) Cyber Ops will provide you with the knowledge and skills needed to work with a Security Operations Centers (SOC) team and can be a valuable part of beginning a career in the exciting and growing field of cybersecurity operations.

Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding to security incidents. Teams of people in SOC’s keep a vigilant eye on security systems, protecting their organizations by detecting and responding to cybersecurity threats.

By the end of the course, you will be prepared to:
• Understand cybersecurity operations network principles, roles and responsibilities as well as the related technologies, tools, regulations and frameworks available
• Apply knowledge and skills to monitor, detect, investigate, analyze and respond to security incidents
• Apply for entry-level jobs as Associate Security Analyst and Incident Responder
• Take the Understanding Cisco Cybersecurity Fundamentals (SECFND) certification exam (210-250) and Implementing Cisco Cybersecurity Operations (SECOPS) certification exam (210-255) leading to the Cisco CCNA Cybersecurity Operations certification

CCNA CyberOps is a hands-on, career-oriented course with an emphasis on practical experience to help you develop specialized skills to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC).

Cisco realizes that Security Operations Center (SOC) Analysts increasingly must focus on design, configuration, and support responsibilities as the technical consultant and device specialist or expert on a security team. Therefore, the curriculum is specific to the best practices of network security administrators, engineers, and experts using the latest Cisco equipment, devices, and appliances.

All hands-on labs in the course are performed by remotely accessing CCNAS NETLAB+ pods comprised of Cisco Catalyst Switches (Ios 15.x), ASAs (ASA 9.x and ASDM 7.x), ISR G2 devices (IOS 15.x), and virtual PCs

Required Prep:

Basic knowledge of networking concepts and computer operating systems such as Windows and Linux. Must also have access to a computer with Internet access outside of class to complete assignments.

- Section 1 - Oct 3 - Dec 12; MW; 5:30 pm - 9:00 pm; 17 mtgs (Register Online)
Honolulu Community College; $2995
course code: COM2127-001

No meeting on November 12. Certification exams are not included.

CCNA Security

Cisco Certified Network Associate Security (CCNAS) equips you with the knowledge and skills representative of entry-level security specialist careers. This course emphasizes a hands-on approach to securing networks. A comprehensive set of tools is used to facilitate learning the fundamental principles of network and endpoint security:
• Cisco Internetwork Operating System (IOS) software
• Cisco Adaptive Security Appliance (ASA) software
• Cisco Adaptive Security Device Manager (ASDM)
• Cisco AnyConnect Secure Mobility Client
• Cisco Academy Packet Tracer (PT)
• WireShark Protocol Analyzer
• Nmap with Zenmap GUI (Port Scanner)
• TCP/IP utilities for SSH, SSL, HTTP, IPsec, RADIUS, TFTP, Syslog, SNMP, and Terminal Emulation

CCNAS incorporates both online and classroom learning by utilizing:
• Cisco Networking Academy NetSpace eLearning portal
• Network Development Group (NDG) NETLAB+ remote lab environment
• Collaboration Software (Cisco Webex, Adobe Connect, Microsoft Business Skype)

The Cisco Networking Academy CCNASv2.0 course addresses all of the exam objectives for both the CCNAS 210-260 certification exam, informally known as the Implementing Cisco IOS Network Security (IINS) 3.0 certification exam, and the CompTIA Security+ SY0-401 exam.

CCNAS certification is a Department of Defense (DoD) 8570.01 Information Assurance Technical (IAT) Level I and II and Information Assurance Management (IAM) Level I certification. The DoD 8570 Directive provides guidance and procedures for the training, certification, and management of all DoD employees performing Information Assurance functions in their line of duty, who are required to carry an approved certification for their particular job role and classification.

Upon completion of the CCNA Security course, learners will be able to perform the following tasks:
• Explain network threats, mitigation techniques, and the basics of securing a network
• Secure administrative access on Cisco routers
• Secure administrative access with authentication, authorization, and accounting (AAA)
• Implement firewall technologies to secure the network perimeter
• Configure intrusion prevention services (IPS) to mitigate attacks on the network
• Describe LAN security considerations and implement endpoint and Layer 2 security features
• Describe methods for implementing data confidentiality and integrity
• Implement secure virtual private networks
• Implement an ASA firewall configuration using the command-line interface (CLI)
• Implement an ASA firewall configuration and VPNs using ASDM
• Test network security and create a technical security policy

All hands-on labs in the course are performed by remotely accessing CCNAS NETLAB+ pods comprised of Cisco Catalyst switches (IoS 15.x), ASAs (ASA 9.x and ASDM 7.x), ISR G2 devices (IOS 15.x), and virtual PCs.

Required Prep:

Learners should have completed CCNA 1 (Introduction to Networks) and CCNA 2 (Routing and Switching Essentials), or Cisco Certified Entry-Level Network Technician (CCENT) certification, or equivalent knowledge and experience. Access to a computer outside of class is required to complete the assignments - the computer should support Java-enabled, browser-based Internet access.

- Section 1 - Sep 5 - Oct 29; MW; 5:30 pm - 9:00 pm; 13 mtgs (Register Online)
Honolulu Community College; Wong; $1995
course code: COM2016-015
CISSP Certification Examination Preparation

If you have experience or have previously completed a CISSP course, taking these certification exam prep sessions may be just what you need. For those of you who completed the review of Domains 1 through 8, this is the logical next step, exam preparation. We start with providing the exam mindset that is so important to successfully prepare for the exam. You will be exposed to the exam format and will learn to spot keywords, to select the “most” right answer, and to budget your time. We’ll run through practice tests and review the questions and answers.

Next, you take a deep dive with full practice tests and many more practice questions and answers. Selecting the best answer from several correct answers will continue to be challenging but will become manageable with our review. The more you do, the more comfortable you will feel when you see the actual questions when you take your certification exam.

We will provide CISSP exam tips and tricks which will help you through the long exam. You will have a last review and more practice tests. You’ll leave with suggestions for continued study before your exam. Once you pass your exam, you will need to complete the endorsement process and we will explain this along with exam experience requirements and the need for recertification through earning CPEs.

- Section 1 - Oct 1 - Oct 17; MW; 5:30 pm - 9:00 pm; 6 mtgs (Register Online)
Honolulu Community College; $1495
course code: COM2117-003
CISSP Domains 1 - 3

“CISSP is the most globally recognized certification in the information security market”, per (ISC)2. Most industry professionals and hiring managers agree. PCATT is pleased to offer a thorough approach to preparing for the CISSP certification exam. This training is appropriate for people working in all areas of security as well as IT managers and network architects.

This first course introduces you to the areas covered by the CISSP exam and the expectations of the knowledge you must have to prepare for certification. You will understand the scope of the CISSP and how the knowledge areas interrelate and build on each other.

This session starts the domain of Security and Risk Management covering confidentiality, integrity, and availability concepts, security governance principles, compliance, legal and regulatory issues, professional ethic, security policies, standards, procedures and guidelines.

The course continues with Asset Security from CBK Domain 2 and Security Engineering from CBK Domain 3. Topics include but are not limited to information and asset classification, ownership, protect privacy, appropriate retention, data security controls, and handling requirements. We continue with engineering processes using secure design principles, security models fundamental concepts, security evaluation models, security capabilities of information systems, security architectures, designs, and solution elements vulnerabilities.

CBK Domain 3, Security Engineering, includes web-based systems vulnerabilities, mobile systems vulnerabilities, embedded devices and cyber-physical systems vulnerabilities. Site and facility design secure principles, physical security, and cryptography are also discussed.

Topics are presented in a meaningful manner so that you are able to make connections to reinforce comprehension. Your instructor will explain how to approach this volume and breadth of knowledge for the purposes of CISSP certification.

- Section 1 - Aug 1 - Aug 20; MW; 5:30 pm - 9:00 pm; 6 mtgs (Register Online)
Honolulu Community College; $1495
course code: COM2115-001
CISSP Domains 4 - 8

The second course in the series starts with Communication and Network Security from CBK Domain 4. Topics include but are not limited to secure network architecture design (e.g. IP and non-IP protocols, segmentation), secure network components, secure communication channels, and network attacks.

CISSP Identity and Access Management from CBK Domain 5, Security Assessment and Testing from CBK Domain 6, and Software Development Security from CBK Domain 8 are the primary areas for this session. Topics from Domain 5 include physical and logical assets control, identification and authentication of people and devices, identity as a service, third-party identity services, access control attacks, and identity and access provisioning lifecycle. Topics from Domain 6 include assessment and test strategies, security process data, security control testing, test outputs, and security architectures vulnerabilities. Domain 6 topics include security in the software development lifecycle, development environment security controls, software security effectiveness, and acquired software security impact.

CISSP Security Operations from CBK Domain 7 is the last domain to be covered. Topics include investigations support and requirements, logging and monitoring activities, provisioning of resources, foundational security operations concepts, resource protection techniques, incident management, preventative measures, patch, and vulnerability management, change management processes, recovery strategies, disaster recovery processes and plans, business continuity planning and exercises, physical security, and personnel safety concerns.

You’ll see that our instructor approaches topics in the context of real-world activities. As with the other courses, we leave time for your questions and provide hands-on opportunities for exploring topics.

At this point and probably sooner, you’re appreciating what people say about the CISSP: It’s a mile wide and an inch deep.

- Section 1 - Aug 29 - Sep 19; MW; 5:30 pm - 9:00 pm; 6 mtgs (Register Online)
Honolulu Community College; $1495
course code: COM2116-002

No meeting on September 3.

Computer Security for Work: Basic Computer Security

Information security is everyone’s responsibility. Recent studies show that most security problems are caused by people. This series of classes is targeted to the working professional, focusing on security threats encountered at work and how to prevent them. Most importantly, you will learn to practice safe computer security procedures. For managers and supervisors, this series or portions of it can be delivered exclusively to your staff. Contact the PCATT office at 808 845-9296 or email pcatt@hawaii.edu

Learn about the importance of user level security in the layers of security model. Is this website safe? How do I protect my computer and documents? Basic computer security topics will be presented and you will practice these skills in a safe lab environment.

- Section 1 - Aug 31; F; 8:30 am - 10:30 am; 1 mtg (Register Online)
Honolulu Community College; $55
course code: COM2088-006
Computer Security for Work: Email Security and Phishing

Information security is everyone’s responsibility. Recent studies show that most security problems are caused by people. This series of classes is targeted to the working professional, focusing on security threats encountered at work and how to prevent them. Most importantly, you will learn to practice safe computer security procedures. For managers and supervisors, this series or portions of it can be delivered exclusively to your staff. Contact the PCATT office at 808 845-9296 or email pcatt@hawaii.edu

Learn about phishing and how to keep your email safe. In this class, you will be able to identify markers of suspicious emails. What should I do if I get a suspicious email? How do I protect my email address? Email security and the types of phishing will be presented and you will practice these skills in a safe lab environment.

- Section 1 - Sep 7; F; 8:30 am - 10:30 am; 1 mtg (Register Online)
Honolulu Community College; $55
course code: COM2089-005
Computer Security for Work: Ransomware

Information security is everyone’s responsibility. Recent studies show that most security problems are caused by people. This series of classes is targeted to the working professional, focusing on security threats encountered at work and how to prevent them. Most importantly, you will learn to practice safe computer security procedures. For managers and supervisors, this series or portions of it can be delivered exclusively to your staff. Contact the PCATT office at 808 845-9296 or email pcatt@hawaii.edu

Ransomware is a newer exploit employed by hackers and if you are not prepared, it can be devastating. Learn how to protect your computer and what do if you become infected with ransomware. In addition to gaining awareness, learn and practice how to back up your computer in a safe lab environment.

- Section 1 - Sep 14; F; 8:30 am - 10:30 am; 1 mtg (Register Online)
Honolulu Community College; $55
course code: COM2091-005
Computer Security for Work: Social Engineering and Malware

Information security is everyone’s responsibility. Recent studies show that most security problems are caused by people. This series of classes is targeted to the working professional, focusing on security threats encountered at work and how to prevent them. Most importantly, you will learn to practice safe computer security procedures. For managers and supervisors, this series or portions of it can be delivered exclusively to your staff. Contact the PCATT office at 808 845-9296 or email pcatt@hawaii.edu

In this class, you will learn about a very effective tactic utilized by scammers and hackers: social engineering. You will also learn about various types of malware. What do I do if I become a victim of social engineering? What do I do if I think I have been hacked? Various methods of social engineering will be explained and you will practice identifying them.

- Section 1 - Sep 21; F; 8:30 am - 10:30 am; 1 mtg (Register Online)
Honolulu Community College; $55
course code: COM2090-005
Junos Security

For Juniper Networks users, we bring Junos Security training to you. The course covers security zones and policies and the configuration, monitoring and troubleshooting of them. You will go in depth with IPsec VPNs covering implementation, monitoring, and troubleshooting and you will do the same with chassis clusters. You will apply your knowledge and experience with the Junos Operating System to the configuration, operation, and implementation of SRX Series Services Gateways in a network environment.

As with all PCATT courses, there are demonstrations and opportunities for hands-on labs to reinforce concepts and learning. Your expert instructor will apply your learning to real-world situations to give you a practical foundation combining theory with hands-on learning.

Required Prep:

Completion of Introduction to the Junos Operating System (IJOS) and Junos Routing Essentials (JRE) or equivalent which includes basic knowledge of networking, understanding of concepts such as the OSI model and the TCP/IP protocol suite, experience with the Junos operating system in a networking environment

- Section 1 - Oct 4 - Dec 13; TTh; 5:30 pm - 8:30 pm; 16 mtgs (Register Online)
Honolulu Community College; Mirante; $1975
course code: COM2126-001

No meetings on November 6 and 22.
This course is taught through the Juniper Academic Alliance in the College CENT (Computing, Electronics, and Networking Technologies) program.

Security+

The CompTIA® Security+™ certification exam is a vendor neutral world-wide standard for foundation-level security practitioners. Exam objectives were developed with input from industry, government, and academic professionals. Although available, you don't need research to tell you the importance of IT security. Human error along with spyware, malware, e-mail attacks, viruses, worms, and wireless technology are reasons for security training and certification. This Security+ course is taught with a practical approach to prepare you for the certification exam and for skills required on the job. You will apply general security concepts to real world scenarios. Competencies exactly match the CompTIA® certification exam areas:

  • Threats, Attacks, and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
  • Cryptography and PKI

A study guide is included. If you are interested in getting CISSP certified, starting with Security+ is advisable. Prior to moving on to CISSP, taking CCNA Security gives you more depth and understanding of network security.



About the CompTIA® Security+™ Exam: 
CompTIA® Security+™ is a vendor-neutral certification that is recognized by major corporations and is accredited by the International Organization for Standardization (ISO) and the American National Standards Institute (ANSI). If you are planning to take the CompTIA® Security+™ certification exam, it is recommended that you have two years of IT administration experience with an emphasis on security. For more information about the certification exam, go to: 
 http://certification.comptia.org

Required Prep:

Two years of IT administration experience in a professional environment with emphasis on security.

- Section 1 - Sep 17 - Sep 21; M-F; 7:30 am - 4:00 pm; 5 mtgs (Register Online)
Honolulu Community College; Green; $1525
course code: COM2036-010

Price includes study guide and certification exam to be scheduled after the end of the course. Exam must be taken within 30 days after the end of the course at the Pearson VUE Test Center @ Honolulu Community College. The course focuses on Exam 501.

Windows Security Fundamentals

Along with learning basic concepts, professionals must have an understanding of
security fundamentals. This course provides an overview of the Windows security
topic areas that require attention. These include Security Layers, Operating System
Security, Network Security, and Security Software. The topics map to the Microsoft
Technology Associate Exam 98-367. While the course provides an operational
approach to these topics, preparation for the certification exam is to be completed
on your own time. A book is provided along with hands-on labs during class.
Recommended preparation: Some hands-on experience with Microsoft Windows
Certification exam not included.

- Section 1 - Oct 25 - Dec 4; TTh; 5:30 pm - 8:30 pm; 9 mtgs (Register Online)
Honolulu Community College; $1275
course code: COM2119-001

No meetings on November 6 and 22.