Cybersecurity

Cybersecurity for Decision Makers


Be the first to rate
An overview course oriented on enhancing effective decision making across the span of national security stakeholders in the context of cyber operations and cybersecurity.

Upcoming Offerings

Request Info
Duration: 3-Day Course
$2,340.00

[ultimate_heading main_heading=”Course Description” main_heading_color=”#333333″ alignment=”left” spacer=”line_only” spacer_position=”bottom” line_height=”5″ line_color=”#ffc000″ main_heading_margin=”margin-top:30px;margin-bottom:20px;” line_width=”30″ main_heading_font_family=”font_family:Rubik|font_call:Rubik|variant:500″ main_heading_font_size=”desktop:18px;” el_class=”lin-heading-separator” spacer_margin=”margin-bottom:25px;” sub_heading_font_family=”font_family:Rubik|font_call:Rubik” main_heading_style=”font-weight:500;”][/ultimate_heading]

Cyber security threat. Computer screen with programming code.

This overview course offers a launchpad for several integrated and dynamically updated courses oriented on enhancing effective decision making across the span of national security stakeholders. Built on a framework of real-world cyber operations and adversary threat knowledge, this offering baselines an understanding of cyber operations in design and execution, adversary motivation and tradecraft, understanding and assessing risk, cybersecurity and network operations, the impact of human factors in cyber, cyber threat intelligence, vulnerability management, incident response, and shifting from a culture of compliance to a culture of trust. Follow-on courses will offer deep-dives and synthesize case studies related to policy development, military and civilian decision makers, technologists, project managers and acquisition professionals, among others.

[ultimate_heading main_heading=”Key Takeaways” main_heading_color=”#333333″ alignment=”left” spacer=”line_only” spacer_position=”bottom” line_height=”5″ line_color=”#ffc000″ main_heading_margin=”margin-bottom:20px;” line_width=”30″ main_heading_font_family=”font_family:Rubik|font_call:Rubik|variant:500″ main_heading_font_size=”desktop:18px;” el_class=”lin-heading-separator” spacer_margin=”margin-bottom:20px;” main_heading_style=”font-weight:500;”][/ultimate_heading]
[info_list style=”hexagon” icon_bg_color=”#002d72″ icon_color=”#ffffff” font_size_icon=”12″ eg_br_width=”1″ connector_color=”#002d72″][info_list_item list_title=”Examine the motivations of threat actors and how they operate in cyberspace” heading_tag=”p” list_icon=”Defaults-check”][/info_list_item][info_list_item list_title=”Explain how risk is managed in cyberspace” heading_tag=”p” list_icon=”Defaults-check”][/info_list_item][info_list_item list_title=”Select best practices for network security and security operations” heading_tag=”p” list_icon=”Defaults-check”][/info_list_item][info_list_item list_title=”Analyze the roles of cyber threat intelligence, vulnerability management, and incident response in securing and defending networks” heading_tag=”p” list_icon=”Defaults-check”][/info_list_item][info_list_item list_title=”Deconstruct the human factors that impact cyberspace operations” heading_tag=”p” list_icon=”Defaults-check”][/info_list_item][info_list_item list_title=”Establish a positive cybersecurity culture” heading_tag=”p” list_icon=”Defaults-check”][/info_list_item][/info_list]
[ultimate_heading main_heading=”Prerequisites” main_heading_color=”#333333″ alignment=”left” spacer=”line_only” spacer_position=”bottom” line_height=”5″ line_color=”#ffc000″ main_heading_margin=”margin-top:30px;margin-bottom:20px;” line_width=”30″ main_heading_font_family=”font_family:Rubik|font_call:Rubik|variant:500″ main_heading_font_size=”desktop:18px;” el_class=”lin-heading-separator” spacer_margin=”margin-bottom:25px;” main_heading_style=”font-weight:500;”][/ultimate_heading]

None.

[ultimate_heading main_heading=”Who Should Take this Course” main_heading_color=”#333333″ alignment=”left” spacer=”line_only” spacer_position=”bottom” line_height=”5″ line_color=”#ffc000″ main_heading_margin=”margin-bottom:20px;” line_width=”30″ main_heading_font_family=”font_family:Rubik|font_call:Rubik|variant:500″ main_heading_font_size=”desktop:18px;” el_class=”lin-heading-separator” spacer_margin=”margin-bottom:20px;” main_heading_style=”font-weight:500;”][/ultimate_heading]
[bsf-info-box icon=”Defaults-edit pencil-square-o” icon_size=”32″ icon_color=”#b3b3b3″ title=”Attendees generally located in the Washington DC metro area (National Capital Region) to avail themselves of a combination of remote and in-person learning within a structured cohort.” heading_tag=”p” title_font=”font_family:Rubik|font_call:Rubik|variant:300″ title_font_style=”font-weight:300;” desc_font=”font_family:Rubik|font_call:Rubik|variant:300″ desc_font_style=”font-weight:300;” title_font_color=”#666666″ desc_font_color=”#666666″][/bsf-info-box][bsf-info-box icon=”Defaults-user” icon_size=”32″ icon_color=”#b3b3b3″ title=”Uniformed military stationed in the National Capital Region (NCR) who would like to initiate and sustain a disciplined track of discovery and knowledge development on cybersecurity and cyberspace operations.” heading_tag=”p” title_font=”font_family:Rubik|font_call:Rubik|variant:300″ title_font_style=”font-weight:300;” desc_font=”font_family:Rubik|font_call:Rubik|variant:300″ desc_font_style=”font-weight:300;” title_font_color=”#666666″ desc_font_color=”#666666″][/bsf-info-box][bsf-info-box icon=”Defaults-user” icon_size=”32″ icon_color=”#b3b3b3″ title=”DoD/USG professional civilian looking to develop understanding of cybersecurity and national resiliency issues to promote a continuity in planning and policy shaping.” heading_tag=”p” title_font=”font_family:Rubik|font_call:Rubik|variant:300″ title_font_style=”font-weight:300;” desc_font=”font_family:Rubik|font_call:Rubik|variant:300″ desc_font_style=”font-weight:300;” title_font_color=”#666666″ desc_font_color=”#666666″][/bsf-info-box][bsf-info-box icon=”Defaults-user” icon_size=”32″ icon_color=”#b3b3b3″ title=”Industry and/or academic cohort looking to develop a cross-disciplinary exposure into the nexus of cybersecurity, technology, and national security.” heading_tag=”p” title_font=”font_family:Rubik|font_call:Rubik|variant:300″ title_font_style=”font-weight:300;” desc_font=”font_family:Rubik|font_call:Rubik|variant:300″ desc_font_style=”font-weight:300;” title_font_color=”#666666″ desc_font_color=”#666666″][/bsf-info-box][bsf-info-box icon=”Defaults-user” icon_size=”32″ icon_color=”#b3b3b3″ title=”Program Manager/Executive or Acquisition Professional looking to understand and better assess cybersecurity risk assessment and long-term Defense Industrial Base compliance and supply chain vulnerability.” heading_tag=”p” title_font=”font_family:Rubik|font_call:Rubik|variant:300″ title_font_style=”font-weight:300;” desc_font=”font_family:Rubik|font_call:Rubik|variant:300″ desc_font_style=”font-weight:300;” title_font_color=”#666666″ desc_font_color=”#666666″][/bsf-info-box]

Upcoming Offerings

Request Info