skip to Main Content

Aloha

Pacific Center for Adavanced Technology Training (PCATT) is located in Downtown Honolulu, with ample parking. We are on the city bus line, which makes it convenient to commute from anywhere on Oahu.

SEE CAMPUS MAP

Get In Touch

pcatt@hawaii.edu
(808) 845-9296
874 Dillingham Blvd, Honolulu, HI 96817

Our Location

Information security is everyone’s responsibility. Recent studies show that most security problems are caused by people. This series of classes is targeted to the working frontline professional, focusing on security threats encountered at work and how to prevent them. Most importantly, you will learn to practice safe computer security procedures. For managers and supervisors, this series or portions of it can be delivered exclusively to your staff. Contact the PCATT office at 808 845-9296 or email pcatt@hawaii.edu

 

Security

CCNA CyberOps

Cisco Certified Network Associate (CCNA) Cyber Ops will provide you with the knowledge and skills needed to work with a Security Operations Centers (SOC) team and can be a valuable part of beginning a career in the exciting and growing field of cybersecurity operations.

Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding to security incidents. Teams of people in SOC’s keep a vigilant eye on security systems, protecting their organizations by detecting and responding to cybersecurity threats.

By the end of the course, you will be prepared to:

  • Understand cybersecurity operations network principles, roles and responsibilities as well as the related technologies, tools, regulations and frameworks available

  • Apply knowledge and skills to monitor, detect, investigate, analyze and respond to security incidents

  • Apply for entry-level jobs as Associate Security Analyst and Incident Responder

  • Take the Understanding Cisco Cybersecurity Fundamentals (SECFND) certification exam (210-250) and Implementing Cisco Cybersecurity Operations (SECOPS) certification exam (210-255) leading to the Cisco CCNA Cybersecurity Operations certification

CCNA CyberOps is a hands-on, career-oriented course with an emphasis on practical experience to help you develop specialized skills to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC).

Cisco realizes that Security Operations Center (SOC) Analysts increasingly must focus on design, configuration, and support responsibilities as the technical consultant and device specialist or expert on a security team. Therefore, the curriculum is specific to the best practices of network security administrators, engineers, and experts using the latest Cisco equipment, devices, and appliances.

All hands-on labs in the course are performed by remotely accessing CCNAS NETLAB+ pods comprised of Cisco Catalyst Switches (Ios 15.x), ASAs (ASA 9.x and ASDM 7.x), ISR G2 devices (IOS 15.x), and virtual PCs

Prequisites

Basic knowledge of networking concepts and computer operating systems such as Windows and Linux. Must also have access to a computer with Internet access outside of class to complete assignments.

Section - COM2127-002

CISSP Certification Examination Preparation

If you have experience or have previously completed a CISSP course, taking these certification exam prep sessions may be just what you need. For those of you who completed the review of Domains 1 through 8, this is the logical next step, exam preparation. We start with providing the exam mindset that is so important to successfully prepare for the exam. You will be exposed to the exam format and will learn to spot keywords, to select the “most” right answer, and to budget your time. We’ll run through practice tests and review the questions and answers.

Next, you take a deep dive with full practice tests and many more practice questions and answers. Selecting the best answer from several correct answers will continue to be challenging but will become manageable with our review. The more you do, the more comfortable you will feel when you see the actual questions when you take your certification exam.

We will provide CISSP exam tips and tricks which will help you through the long exam. You will have a last review and more practice tests. You’ll leave with suggestions for continued study before your exam. Once you pass your exam, you will need to complete the endorsement process and we will explain this along with exam experience requirements and the need for recertification through earning CPEs.

Section - COM2117-004

CISSP Domains 1 - 3

“CISSP is the most globally recognized certification in the information security market”, per (ISC)2. Most industry professionals and hiring managers agree. PCATT is pleased to offer a thorough approach to preparing for the CISSP certification exam. This training is appropriate for people working in all areas of security as well as IT managers and network architects. More information about the CISSP is available at: https://www.isc2.org/cissp

This first course introduces you to the areas covered by the CISSP exam and the expectations of the knowledge you must have to prepare for certification. You will understand the scope of the CISSP and how the knowledge areas interrelate and build on each other.

This session starts the domain of Security and Risk Management covering confidentiality, integrity, and availability concepts, security governance principles, compliance, legal and regulatory issues, professional ethic, security policies, standards, procedures and guidelines.

The course continues with Asset Security from CBK Domain 2 and Security Engineering from CBK Domain 3. Topics include but are not limited to information and asset classification, ownership, protect privacy, appropriate retention, data security controls, and handling requirements. We continue with engineering processes using secure design principles, security models fundamental concepts, security evaluation models, security capabilities of information systems, security architectures, designs, and solution elements vulnerabilities.

CBK Domain 3, Security Engineering, includes web-based systems vulnerabilities, mobile systems vulnerabilities, embedded devices and cyber-physical systems vulnerabilities. Site and facility design secure principles, physical security, and cryptography are also discussed.

Topics are presented in a meaningful manner so that you are able to make connections to reinforce comprehension. Your instructor will explain how to approach this volume and breadth of knowledge for the purposes of CISSP certification.

Section - COM2115-003

CISSP Domains 4 - 8

The second course in the series starts with Communication and Network Security from CBK Domain 4. Topics include but are not limited to secure network architecture design (e.g. IP and non-IP protocols, segmentation), secure network components, secure communication channels, and network attacks.

CISSP Identity and Access Management from CBK Domain 5, Security Assessment and Testing from CBK Domain 6, and Software Development Security from CBK Domain 8 are the primary areas for this session. Topics from Domain 5 include physical and logical assets control, identification and authentication of people and devices, identity as a service, third-party identity services, access control attacks, and identity and access provisioning lifecycle. Topics from Domain 6 include assessment and test strategies, security process data, security control testing, test outputs, and security architectures vulnerabilities. Domain 6 topics include security in the software development lifecycle, development environment security controls, software security effectiveness, and acquired software security impact.

As with the other courses, we leave time for your questions and provide hands-on opportunities for exploring topics. You’ll see the value of collaborating with your fellow participants.

CISSP Security Operations from CBK Domain 7 is the last domain to be covered. Topics include investigations support and requirements, logging and monitoring activities, provisioning of resources, foundational security operations concepts, resource protection techniques, incident management, preventative measures, patch, and vulnerability management, change management processes, recovery strategies, disaster recovery processes and plans, business continuity planning and exercises, physical security, and personnel safety concerns.

You’ll see that our instructor approaches topics in the context of real-world activities. As with the other courses, we leave time for your questions and provide hands-on opportunities for exploring topics.

At this point and probably sooner, you’re appreciating what people say about the CISSP: It’s a mile wide and an inch deep.

Section - COM2116-004

CompTIA Cybersecurity Analyst (CySA+)

CompTIA CySA+ is for IT professionals looking to gain the following security analyst skills:

• Perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization

• Configure and use threat-detection tools

• Secure and protect applications and systems within an organization

Training maps with the CompTIA CySA+ certification objectives for exam CSO-001 in the areas of:

• Threat management

• Vulnerability management

• Cyber-incident response

• Security architecture and tool sets

CompTIA describes CySA+ as “the only intermediate high-stakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response. “

In a hands-on and collaborative manner, you will gain the skills needed for positions such as IT security, vulnerability, threat intelligence, and cybersecurity analyst.

The CompTIA CySA+ certification meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).

Section - COM2133-001

CompTIA PenTest+

CompTIA PenTest+ is a certification for intermediate skills level cybersecurity professionals who are tasked with hands-on penetration testing to identify, exploit, report, and manage vulnerabilities on a network. Skills covered in this training include:

• Planning and scoping

• Information gathering and vulnerability identification

• Attacks and exploits

• Penetration testing tools

• Reporting and communication

While CySA+ focuses on defense through incident detection and response, PenTest+ teaches you offense through penetration testing and vulnerability assessment. It’s important for cybersecurity professionals to have both offensive and defensive skills.

As with all PCATT courses, you will have hands-on experiences to learn skills. Professionals who have these skills have jobs as penetration and vulnerability testers, security and vulnerability assessment analysts, and work in the fields of network security operations and application security vulnerability.

CompTIA says their certification “is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.” Additionally, the exam measures management skills in planning.

The certification exam voucher for PT0-001 and study guide are included in this course. CompTIA PenTest+ meets the ISO 17024 standard.

Prequisites

Network+ and Security+ certifications or equivalent knowledge and experience

Section - COM2134-001

Junos Security

For Juniper Networks users, we bring Junos Security training to you. The course covers security zones and policies and the configuration, monitoring and troubleshooting of them. You will go in depth with IPsec VPNs covering implementation, monitoring, and troubleshooting and you will do the same with chassis clusters. You will apply your knowledge and experience with the Junos Operating System to the configuration, operation, and implementation of SRX Series Services Gateways in a network environment.

As with all PCATT courses, there are demonstrations and opportunities for hands-on labs to reinforce concepts and learning. Your expert instructor will apply your learning to real-world situations to give you a practical foundation combining theory with hands-on learning. 

This course is taught through the Juniper Academic Alliance in the College CENT (Computing, Electronics, and Networking Technologies) program.

Prequisites

Completion of Introduction to the Junos Operating System (IJOS) and Junos Routing Essentials (JRE) or equivalent which includes basic knowledge of networking, understanding of concepts such as the OSI model and the TCP/IP protocol suite, experience with the Junos operating system in a networking environment

Section - COM2126-002

Security+

CompTIA® Security+ is a good first course for people wanting to begin their cybersecurity career. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents - not just identify them.

Human error along with spyware, malware, e-mail attacks, viruses, worms, and wireless technology are reasons for security training and certification. This Security+ course is taught with a practical approach to prepare you for the certification exam and for skills required on the job. You will apply general security concepts to real world scenarios. Competencies exactly match the CompTIA® certification exam areas:

  • Network Security
  • Compliance and operational security
  • Threats and vulnerabilities
  • Application, data, and host security
  • Access control and identity management
  • Cyrptography

Both the Security+ certification exam and a study guide are included. Security+ is compliant with ISA 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

Prequisites

Two years of IT administration experience in a professional environment with emphasis on security. Network+ or equivalent knowledge is also recommended.

Section - COM2036-013

Back To Top