skip to Main Content

Aloha

Pacific Center for Adavanced Technology Training (PCATT) is located in Downtown Honolulu, with ample parking. We are on the city bus line, which makes it convenient to commute from anywhere on Oahu.

SEE CAMPUS MAP

Get In Touch

pcatt@hawaii.edu
(808) 845-9296
874 Dillingham Blvd, Honolulu, HI 96817

Our Location

Information security is everyone’s responsibility. Recent studies show that most security problems are caused by people. This series of classes is targeted to the working frontline professional, focusing on security threats encountered at work and how to prevent them. Most importantly, you will learn to practice safe computer security procedures. For managers and supervisors, this series or portions of it can be delivered exclusively to your staff. Contact the PCATT office at 808 845-9296 or email pcatt@hawaii.edu

 

Security

CCNA CyberOps

Cisco Certified Network Associate (CCNA) Cyber Ops will provide you with the knowledge and skills needed to work with a Security Operations Centers (SOC) team and can be a valuable part of beginning a career in the exciting and growing field of cybersecurity operations.

Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding to security incidents. Teams of people in SOC’s keep a vigilant eye on security systems, protecting their organizations by detecting and responding to cybersecurity threats.

By the end of the course, you will be prepared to:

  • Understand cybersecurity operations network principles, roles and responsibilities as well as the related technologies, tools, regulations and frameworks available

  • Apply knowledge and skills to monitor, detect, investigate, analyze and respond to security incidents

  • Apply for entry-level jobs as Associate Security Analyst and Incident Responder

  • Take the Understanding Cisco Cybersecurity Fundamentals (SECFND) certification exam (210-250) and Implementing Cisco Cybersecurity Operations (SECOPS) certification exam (210-255) leading to the Cisco CCNA Cybersecurity Operations certification

CCNA CyberOps is a hands-on, career-oriented course with an emphasis on practical experience to help you develop specialized skills to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC).

Cisco realizes that Security Operations Center (SOC) Analysts increasingly must focus on design, configuration, and support responsibilities as the technical consultant and device specialist or expert on a security team. Therefore, the curriculum is specific to the best practices of network security administrators, engineers, and experts using the latest Cisco equipment, devices, and appliances.

All hands-on labs in the course are performed by remotely accessing CCNAS NETLAB+ pods comprised of Cisco Catalyst Switches (Ios 15.x), ASAs (ASA 9.x and ASDM 7.x), ISR G2 devices (IOS 15.x), and virtual PCs

Prerequisites

Basic knowledge of networking concepts and computer operating systems such as Windows and Linux. Must also have access to a computer with Internet access outside of class to complete assignments.

Section - COM2127-003

CCNA Security

Cisco Certified Network Associate Security (CCNAS) equips you with the knowledge and skills representative of entry-level security specialist careers. This course emphasizes a hands-on approach to securing networks. A comprehensive set of tools is used to facilitate learning the fundamental principles of network and endpoint security:

  • Cisco Internetwork Operating System (IOS) software
  • Cisco Adaptive Security Appliance (ASA) software
  • Cisco Adaptive Security Device Manager (ASDM)
  • Cisco AnyConnect Secure Mobility Client
  • Cisco Academy Packet Tracer (PT)
  • WireShark Protocol Analyzer
  • Nmap with Zenmap GUI (Port Scanner)
  • TCP/IP utilities for SSH, SSL, HTTP, IPsec, RADIUS, TFTP, Syslog, SNMP, and Terminal Emulation

CCNAS incorporates both online and classroom learning by utilizing:

  • Cisco Networking Academy NetSpace eLearning portal
  • Network Development Group (NDG) NETLAB+ remote lab environment
  • Collaboration Software (Cisco Webex, Adobe Connect, Microsoft Business Skype)

The Cisco Networking Academy CCNASv2.0 course addresses all of the exam objectives for both the CCNAS 210-260 certification exam, informally known as the Implementing Cisco IOS Network Security (IINS) 3.0 certification exam, and the CompTIA Security+ SY0-401 exam.

CCNAS certification is a Department of Defense (DoD) 8570.01 Information Assurance Technical (IAT) Level I and II and Information Assurance Management (IAM) Level I certification. The DoD 8570 Directive provides guidance and procedures for the training, certification, and management of all DoD employees performing Information Assurance functions in their line of duty, who are required to carry an approved certification for their particular job role and classification.

All hands-on labs in the course are performed by remotely accessing CCNA NETLAB+ pods comprised of Cisco Catalyst switches (IoS 15.x), ASAs (ASA 9.x and ASDM 7.x), ISR G2 devices (IOS 15.x), and virtual PCs.

Prerequisites

Learners should have completed CCNA Routing and Switching (R&S) 1 (Introduction to Networks) and CCNA R&S 2 (Routing and Switching Essentials), or Cisco Certified Entry-Level Network Technician (CCENT) certification, or equivalent knowledge and experience. Access to a computer outside of class is required to complete the assignments - the computer should support Java-enabled, browser-based Internet access.

Learner Outcomes

Upon completion of the CCNA Security course, learners will be able to perform the following tasks:

  • Explain network threats, mitigation techniques, and the basics of securing a network
  • Secure administrative access on Cisco routers
  • Secure administrative access with authentication, authorization, and accounting (AAA)
  • Implement firewall technologies to secure the network perimeter
  • Configure intrusion prevention services (IPS) to mitigate attacks on the network
  • Describe LAN security considerations and implement endpoint and Layer 2 security features
  • Describe methods for implementing data confidentiality and integrity
  • Implement secure virtual private networks
  • Implement an ASA firewall configuration using the command-line interface (CLI)
  • Implement an ASA firewall configuration and VPNs using ASDM
  • Test network security and create a technical security policy

Section - COM2016-017

CISSP Certification Examination Preparation

If you have experience or have previously completed a CISSP course, taking these certification exam prep sessions may be just what you need. For those of you who completed the review of Domains 1 through 8, this is the logical next step, exam preparation. We start with providing the exam mindset that is so important to successfully prepare for the exam. You will be exposed to the exam format and will learn to spot keywords, to select the “most” right answer, and to budget your time. We’ll run through practice tests and review the questions and answers.

Next, you take a deep dive with full practice tests and many more practice questions and answers. Selecting the best answer from several correct answers will continue to be challenging but will become manageable with our review. The more you do, the more comfortable you will feel when you see the actual questions when you take your certification exam.

We will provide CISSP exam tips and tricks which will help you through the long exam. You will have a last review and more practice tests. You’ll leave with suggestions for continued study before your exam. Once you pass your exam, you will need to complete the endorsement process and we will explain this along with exam experience requirements and the need for recertification through earning CPEs.

Section - COM2117-004

Section - COM2117-006

CISSP Domains 1 - 3

“CISSP is the most globally recognized certification in the information security market”, per (ISC)2. Most industry professionals and hiring managers agree. PCATT is pleased to offer a thorough approach to preparing for the CISSP certification exam. This training is appropriate for people working in all areas of security as well as IT managers and network architects. More information about the CISSP is available at: https://www.isc2.org/cissp

This first course introduces you to the areas covered by the CISSP exam and the expectations of the knowledge you must have to prepare for certification. You will understand the scope of the CISSP and how the knowledge areas interrelate and build on each other.

This session starts the domain of Security and Risk Management covering confidentiality, integrity, and availability concepts, security governance principles, compliance, legal and regulatory issues, professional ethic, security policies, standards, procedures and guidelines.

The course continues with Asset Security from CBK Domain 2 and Security Engineering from CBK Domain 3. Topics include but are not limited to information and asset classification, ownership, protect privacy, appropriate retention, data security controls, and handling requirements. We continue with engineering processes using secure design principles, security models fundamental concepts, security evaluation models, security capabilities of information systems, security architectures, designs, and solution elements vulnerabilities.

CBK Domain 3, Security Engineering, includes web-based systems vulnerabilities, mobile systems vulnerabilities, embedded devices and cyber-physical systems vulnerabilities. Site and facility design secure principles, physical security, and cryptography are also discussed.

Topics are presented in a meaningful manner so that you are able to make connections to reinforce comprehension. Your instructor will explain how to approach this volume and breadth of knowledge for the purposes of CISSP certification.

Section - COM2115-004

CISSP Domains 4 - 8

The second course in the series starts with Communication and Network Security from CBK Domain 4. Topics include but are not limited to secure network architecture design (e.g. IP and non-IP protocols, segmentation), secure network components, secure communication channels, and network attacks.

CISSP Identity and Access Management from CBK Domain 5, Security Assessment and Testing from CBK Domain 6, and Software Development Security from CBK Domain 8 are the primary areas for this session. Topics from Domain 5 include physical and logical assets control, identification and authentication of people and devices, identity as a service, third-party identity services, access control attacks, and identity and access provisioning lifecycle. Topics from Domain 6 include assessment and test strategies, security process data, security control testing, test outputs, and security architectures vulnerabilities. Domain 6 topics include security in the software development lifecycle, development environment security controls, software security effectiveness, and acquired software security impact.

As with the other courses, we leave time for your questions and provide hands-on opportunities for exploring topics. You’ll see the value of collaborating with your fellow participants.

CISSP Security Operations from CBK Domain 7 is the last domain to be covered. Topics include investigations support and requirements, logging and monitoring activities, provisioning of resources, foundational security operations concepts, resource protection techniques, incident management, preventative measures, patch, and vulnerability management, change management processes, recovery strategies, disaster recovery processes and plans, business continuity planning and exercises, physical security, and personnel safety concerns.

You’ll see that our instructor approaches topics in the context of real-world activities. As with the other courses, we leave time for your questions and provide hands-on opportunities for exploring topics.

At this point and probably sooner, you’re appreciating what people say about the CISSP: It’s a mile wide and an inch deep.

Section - COM2116-005

CompTIA Cybersecurity Analyst (CySA+)

CompTIA CySA+ is for IT professionals looking to gain the following security analyst skills:

• Perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization

• Configure and use threat-detection tools

• Secure and protect applications and systems within an organization

Training maps with the CompTIA CySA+ certification objectives for exam CSO-001 in the areas of:

• Threat management

• Vulnerability management

• Cyber-incident response

• Security architecture and tool sets

CompTIA describes CySA+ as “the only intermediate high-stakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response. “

In a hands-on and collaborative manner, you will gain the skills needed for positions such as IT security, vulnerability, threat intelligence, and cybersecurity analyst.

The CompTIA CySA+ certification meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).

Section - COM2133-002

CompTIA PenTest+

CompTIA PenTest+ is a certification for intermediate skills level cybersecurity professionals who are tasked with hands-on penetration testing to identify, exploit, report, and manage vulnerabilities on a network. Skills covered in this training include:

• Planning and scoping

• Information gathering and vulnerability identification

• Attacks and exploits

• Penetration testing tools

• Reporting and communication

While CySA+ focuses on defense through incident detection and response, PenTest+ teaches you offense through penetration testing and vulnerability assessment. It’s important for cybersecurity professionals to have both offensive and defensive skills.

As with all PCATT courses, you will have hands-on experiences to learn skills. Professionals who have these skills have jobs as penetration and vulnerability testers, security and vulnerability assessment analysts, and work in the fields of network security operations and application security vulnerability.

CompTIA says their certification “is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.” Additionally, the exam measures management skills in planning.

The certification exam voucher for PT0-001 and study guide are included in this course. CompTIA PenTest+ meets the ISO 17024 standard.

Prerequisites

Network+ and Security+ certifications or equivalent knowledge and experience

Section - COM2134-002

Junos Security

For Juniper Networks users, we bring Junos Security training to you. The course covers security zones and policies and the configuration, monitoring and troubleshooting of them. You will go in depth with IPsec VPNs covering implementation, monitoring, and troubleshooting and you will do the same with chassis clusters. You will apply your knowledge and experience with the Junos Operating System to the configuration, operation, and implementation of SRX Series Services Gateways in a network environment.

As with all PCATT courses, there are demonstrations and opportunities for hands-on labs to reinforce concepts and learning. Your expert instructor will apply your learning to real-world situations to give you a practical foundation combining theory with hands-on learning. 

This course is taught through the Juniper Academic Alliance in the College CENT (Computing, Electronics, and Networking Technologies) program.

Prerequisites

Completion of Introduction to the Junos Operating System (IJOS) and Junos Routing Essentials (JRE) or equivalent which includes basic knowledge of networking, understanding of concepts such as the OSI model and the TCP/IP protocol suite, experience with the Junos operating system in a networking environment

Section - COM2126-002

Back To Top