Cybersecurity Threats Affecting Financial Institutions


Topics to be covered include:

  • Threats from nation state actors
  • Cyber criminals: Attacks and deterrence
  • Insider threats: Securing from within
  • Hactivists: Securing your reputation and information

Courses are face-to-face, and attendance is required.

Participants will receive a certification of completion from Metropolitan State’s NSA/DHS Center of Excellence Program in Cyber Defense.

This course is targeted at information security professionals, managers and security/compliance practitioners in the financial industry.

In this course you will:

  • Understand how to successfully implement and manage components of an effective information security program
  • Boost your knowledge of threat vectors
  • Understand and apply layered security program
  • Gain confidence in your decision making with comprehensive cybersecurity knowledge

Experience in the finance information security domain.

Price: $750.00  Early Bird: $675.00 until 21 days prior to beginning of course

Please Note:

  • If you are registering through the workforce center, you must have your counselor contact IPD directly at institute@metrostate.edu

For questions or more details on all cyber security courses, please contact Dr. Kyle Swanson, Dean of College of Science at 651-793-1681.

If you want to customize this course specifically for your organization, contact kyle.swanson@metrostate.edu or info@mncyber.org

Range-Powered Incident Handling for the GCIH® Certification


The MN Cyber GCIH® training program consists of a mix of classroom content and scenarios on the MN Cyber Range, with the goal to provide analysts authentic practice in responding to frequently encountered cyber-attacks.  The scenarios aim to challenge the trainees and give them practice and success in treating many attack vectors.  This course focuses on incident response performance while using common security operations center procedures and understanding the critical processes in the organization, emphasizing teamwork, effective communication skills including appropriate escalation, and the need for institutional learning via detailed debriefing.

Courses are face-to-face, and attendance is required.

This non-credit course will prepare you to take the GCIH® certification exam.  This is a vendor-neutral and globally recognized industry certification.

*Certification exam is not included in the course price.

Length: 42 total hours

This course will significantly benefit security operations center analysts and managers at all levels.

Security Techniques Acquired:

  • The steps of the incident handling process
  • Detecting malicious applications and network activity
  • Common attack techniques that compromise hosts
  • Detecting and analyzing system and network vulnerabilities
  • Continuous process improvement by discovering the root causes of incidents

Course plan:

  1. Introduction to Incident Response Handling
  2. Risk Assessment
  3. Incident Response and Handling Steps
  4. Computer Security Incident Response Team Roles and Functions
  5. Handling Network Security Incidents
  6. Handling Malicious Code Incidents
  7. Handling Insider Threats
  8. Forensic Analysis and Incident Response
  9. Incident Reporting
  10. Incident Recovery
  11. Development and Implementation of Effective Security Policies Through the Lens of a Cyber Attack

Work experience in the Information Security Domain

Price: $3250.00  Early Bird: $2925.00 until 21 days prior to beginning of course

Please Note:

  • If you are registering through the workforce center, you must have your counselor contact IPD directly at institute@metrostate.edu
For questions or more details on all cyber security courses, please contact Dr. Kyle Swanson, Dean of College of Science at 651-793-1681.
If you want to customize this course specifically for your organization, contact kyle.swanson@metrostate.edu or info@mncyber.org

MN Cyber Training Program for CISSP® Certification


The MN Cyber CISSP® Certification Training course focuses solely on the 8 domains of knowledge as determined by (ISC)2 that form a critical part of CISSP® exam.  Each domain of knowledge is dissected into its critical components, and those components are then discussed in terms of their relationship with one another and with other areas of information security.  The Security Operations domain is supported by a scenario on the MN Cyber Range to solidify understanding of theory to application.

Courses are face-to-face, and attendance is required.

This non-credit course will prepare you to take the CISSP® certification exam.  This is a vendor-neutral and globally recognized industry certification.  Certification exam is not included in the course price.

Length: 42 total hours

The CISSP® certification is designed for:

  • IT security analysts
  • Vulnerability analysts
  • Threat intelligence analysts

The broad spectrum of topics included in the CISSP® Common Body of Knowledge (CBK) ensure its relevancy across all disciplines in the field of information security.  Successful candidates are competent in the following 8 domains:

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

The security operations domain will be supported by a full-day training experience on the MN Cyber Range.

CISSP® candidates must have a minimum of 5 years cumulative paid full-time work experience in 2 or more of the 8 domains of the CISSP® Common Body of Knowledge.  A candidate that doesn’t have the required experience to become a CISSP® may become an Associate of (ISC)2 by successfully passing the CISSP® examination.  The Associate of (ICS)2 will then have 6 years to earn the 5 years required experience.

Price: $2,500.00  Early Bird: $2250.00 until 21 days prior to beginning of course

Please Note:

  • If you are registering through the workforce center, you must have your counselor contact IPD directly at institute@metrostate.edu
For questions or more details on all cyber security courses, please contact Dr. Kyle Swanson, Dean of College of Science at 651-793-1681.
If you want to customize this course specifically for your organization, contact kyle.swanson@metrostate.edu or info@mncyber.org

Information Security in the Healthcare Domain


Courses are face-to-face, and attendance is required.

Length: 14 total hours

This course is ideal for information security professionals charged with guarding protected health information (PHI), including those in the following positions:

  • Compliance Officer
  • Information Security Manager
  • Privacy Officer
  • Compliance Auditor
  • Risk Analyst
  • Medical Records Supervisor
  • Information Technology Manager
  • Privacy and Security Consultant
  • Health Information Manager
  • Practice Manager

In this course you will gain knowledge in the following domains:

  • Healthcare industry
  • Regulatory environment
  • Third-party risk management
  • Information risk assessment
  • Information governance and risk management
  • Privacy and security in healthcare

Experience in the healthcare security, compliance and privacy areas.

Price: $750.00  Early Bird Pricing: $675.00 until 21 days prior to beginning of course

Useful Websites:

Cancellation Policy:

Class cancellations must be done fourteen full business days before the class start date.  No refunds for cancellations of less than fourteen full business days.  No Shows/Missed Classes – Refunds will not be issued for any missed class.  Late Arrivals/Early Departures – Metropolitan State University reserves the right to decrease continuing education units issued for late arrivals and early departures.  Written confirmation will be sent to you a week before class.  If a class is canceled, you will be contacted by phone, mail, or email.  Metropolitan State University reserves the right to cancel courses due to insufficient enrollment or unforeseen circumstances, such as weather (a full refund will be granted).

For questions or more details on all cyber security courses, please contact Dr. Kyle Swanson, Dean of College of Science at 651-793-1681.
If you want to customize this course specifically for your organization, contact kyle.swanson@metrostate.edu or info@mncyber.org

MN Cyber Training Program for CEH Certification


The MN Cyber CEH training program consists of 18 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training, beginning with an introduction to ethical hacking and covering such topics as malware threats, denial of service, hacking mobile platforms and cloud computing.

Courses are face-to-face, and attendance is required.

EC-Council certified course materials are included.  This non-credit course will prepare you to take the CEH certification exam.  This is a vendor-neutral and globally recognized industry certification.

Certification exam is not included in the course price.

Length: 42 total hours

Metropolitan State University is an authorized EC-Council Academia Partner.

This course will significantly benefit:

  •  Security Officers
  •  Auditors
  • Security Professionals
  • Site Administrators
  • Anyone who is concerned about the integrity of their network infrastructure

The broad spectrum of topics included in the CEH ensure its relevancy across all disciplines in the field of information security.  Successful candidates will learn:

  1. Key issues plaguing the information security world, incident management process, and penetration testing
  2. Various types of footprinting, footprinting tools, and countermeasures
  3. Network scanning techniques and scanning countermeasures
  4. Enumeration techniques and enumeration countermeasures
  5. System hacking methodology, steganography, steganography, steganalysis attacks and covering tracks
  6. Different types of Trojans, Trojan analysis, and Trojan countermeasures
  7. Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  8. Packet sniffing techniques and how to defend against sniffing
  9. Social Engineering techniques, identify theft, and social engineering countermeasures
  10. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  11. Session hijacking techniques and countermeasures
  12. Different types of webserver attacks, attack methodology, and countermeasures
  13. Different types of web application attacks, web application hacking methodology, and countermeasures
  14. SQL injection attacks and injection detection tools
  15. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
  16. Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  17. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  18. Various cloud computing concepts, threats, attacks, and security techniques and tools
  19. Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  20. Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap

Two years of work experience in the Information Security domain

Price: $2,850.00  Early Bird: $2,565.00 until 21 days prior to beginning of course

Please Note:

  • If you are registering through the workforce center, you must have your counselor contact IPD directly at institute@metrostate.edu

For questions or more details on all cyber security courses, please contact Dr. Kyle Swanson, Dean of College of Science at 651-793-1681.

 

If you want to customize this course specifically for your organization, contact kyle.swanson@metrostate.edu or info@mncyber.org