Post-Quantum Cryptography (PQC)
This course covers the essentials of Quantum Computing and Post-Quantum Cryptography (PQC). The course enables organizational leaders, security officers, and IT professionals to plan for the fast approaching quantum computing reality. At present, adversaries of organizations and nation states are harvesting data at rest and in transit that may be secure by present cryptography standards […]
Securing The Software Supply Chain: Software Bills Of Materials
This seminar provides a high-level overview of Software Bills of Materials (SBOMs). It focuses on how using SBOMs in software development can provide traceability, insight, and security. Any system that consumes or produces software can benefit from using SBOMs, either as fuel or output. A Software Bill of Materials is an enumeration of a product’s […]
Cybersecurity in the Age of AI
This course delves into the unique cybersecurity risks posed by AI systems and strategies to mitigate vulnerabilities and protect sensitive data. Hands-on Activities Conduct a security risk assessment for an agency’s proposed AI project. Simulate a cybersecurity incident response scenario involving AI. Course Duration 1-2 days
Reverse Engineering Malware
Reverse Engineering Malware is an intermediate course that exposes students to the theoretical knowledge and hands-on techniques to analyze malware of greater complexity. Students will learn to analyze malicious Windows programs, debug user-mode and kernel-mode malware with WinDbg, identify common malware functionality, in addition to reversing covert and encoded malware. Objectives This course will provide […]
NICE Framework Role-Specific Training Courses
Below are UMBC Training Centers’ recommendations for NICE Framework Role Specific Training. Courses in Bold are strongly recommended for everyone in that role to complete, even if they have some prior knowledge and experience (to ensure currency with the latest technologies and standards). The other courses listed for each role address important skills for the […]
Cybersecurity Risk Management and Compliance
Cybersecurity Risk Management is an informed approach to planning, implementing, and operating in a connected environment through a risk-based approach, informed by business/mission objectives. This approach recognizes that cybersecurity is not an isolated function within any organization, but rather requires coordination with other organizational and executive functions – human resources, legal, finance, operations, technology. Identifying […]
Cybersecurity Risk Management and Compliance Primer/Review
The Cybersecurity Risk Management and Compliance Primer/Review course provides a high-level overview of Federal Information Security and Compliance Standards, Requirements, and Processes. The course is primarily aimed at IT and Business professionals who do not have primary responsibility for Information Security, but who work in IT environments where they need to have a good understanding […]
Operational Cybersecurity
This course presents a real-world view of Enterprise Cybersecurity Operations for Security Professionals. Topics covered include Network Traffic Analysis, Threat Detection, Penetration Testing, Incident Response, High Availability & Disaster Recovery, and Data Analytics for Cyber. Students will see demonstrations and get some hands-on exposure to each of these topics.
Certified Information Systems Security Professional (CISSP) Training Plus
UMBC Training Centers offers a 5-day CISSP Training class to prepare students for the ISC2 CISSP certification exam. Certified Information Systems Security Professional (CISSP) Certification was designed to recognize mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The certification is managed by the International Information Systems […]