ISG's Cyber Network Defense Course

The Cyber Network Defense Course (CNDC) addresses the nations need for cybersecurity professionals. Our program immerses you in a virtual real-world cyber environment where you apply learned skills to defend against cyber-criminals and cyber-terrorism.

CNDC is dedicated to providing real world training and enhancing skills for the cyber-workforce.

Our Cyber Network Defense Course was developed by ISG, our academic partners and local workforce boards to support cyber-education programs and fund educational opportunities for qualifying participants.

Cybersecurity is also referred to as information security, and focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. There is a considerable demand for cybersecurity professionals both locally and nationally. Our goal is to develop talent from the following three distinct groups:

The focus of initial recruitment will be in the Capital Area: Wake and Johnston Counties. Students will be recruited through this website, Capital Area NCWorks Career Centers, ISG, Fort Bragg Career Resource Center and other community partners.

Now Recruiting

Do you have what it takes to defend against cyber-terrorism?

Veterans

You Have What it Takes

Nationally there is a shortage of Cybersecurity professionals. Many of the skills that made you successful in defending our nation while in uniform can be used to help you to become a highly effective cyber professional.

Students

Get a Jump on Your Career

Cybersecurity careers offer great pay and a solid future. The work is challenging and requires problem solving skills. You will be required to be a life long learner. If you are a self starter and enjoy learning new things this may be a career for you. Our development process focuses on work based learning. We know that most people learn new skills using hands on techniques. We develop your skills thru the use of mentors and exposure to virtual simulation of the work environment.

 

IT Professionals

Expand Your IT Skills

IT workers and other skilled professionals that are seeking to be retrained represent a strong talent pool of potential Cybersecurity professionals. The fact that you have been a successful IT worker in the past gives you a better probability of success in a Cybersecurity career.

 

The Digital World We Live In

Internet in schools in Raleigh

Today, the internet touches every part of all our lives. We are connected at home, in school and at work. Our cars use it, our phones, our Fitbits and pacemakers. Wherever you go and whatever you do, something is connected to the internet.

The internet has changed the way we communicate and allowed us to connect with virtually anyone,anywhere in the world, however, these connections also come at a price and with every interaction you put yourself at risk of theft, fraud, abuse or worse.

No country, industry, town, or individual is immune to cyber threats.

As individuals, cybersecurity risks can threaten our finances, identity, and privacy. According to The 2018 Identity Fraud Study:

2018 Identity Fraud Study Stat
  • 1 in 15 consumers became victims of identity fraud in 2017

  • That equals 16.7 million victims last year, an increase of 1 million from 2016

  • Over 1 million children in the U.S. were victims of identity theft in 2017, costing families $540 million in out-of-pocket expenses

  • There’s a new victim of identity theft every 2 seconds

  • There were 1,579 data breaches exposing 179 million records last year

As a nation, we are under constant attack. In fact, we are the most attacked country in the world (38% of all cyber attacks are aimed at The United States). Cyber-criminals and cyber-terrorists want to get to our national security and corporate data. They want to harm or critical infrastructure and delicate economy. Even “Mom and Pop” shops are at risk (43% of cyber attacks are aimed at small businesses). Since our way of life depends on critical infrastructure and the digital technology that operate it, cybersecurity is one of our country’s most important national security priorities, and we each have a role to play—cybersecurity is a shared responsibility.

Evolving technologies are quickly transforming our world. In a very short period of time, most of the steadfast processes and procedures that we’ve known for a lifetime have changed. While it has expanded our reach in so many ways, it has also transformed the way criminals commit crimes.

Cybersecurity statistics for 2018
Cybersecurity statistics for 2018
Cybersecurity statistics for 2018

Why should cybersecurity be your focus and not another field?

Cybersecurity positions pay a significant wage. Cybersecurity positions are in demand now and forecasted to be in demand well into the future.

AdobeStock_80058904.jpeg

Every day we read about another breach or attack on individuals, companies and countries all over the world.

From massive data breaches to highly-sophisticated malware campaigns to nation-state-fueled attacks, we’ve seen an increased threat and it’s not going away.

No one is safe. Here are just a few high profile cases that exemplify the need for cybersecurity.

US Government

The US Office of Personnel and Management (OPM) had two breaches; the first over 4. million and the second over 21.5 million records. This is almost 7 percent of the U.S. population. OPM said the stolen personal identification data included: Social Security numbers; residency and educational history; employment history; information about immediate family and other personal and business acquaintances; and health, criminal and financial history. Also stolen were about 1.1 million fingerprints, the agency said. The evidence includes a specific piece of malicious software and the use of a stolen digital certificate, both of which had been seen in only a small number of attacks that had been tied to the same group.

Cybercrime

Hospitality

Marriott announced a massive hack that impacts as many as 500 million customers who made a reservation at a Starwood hotel. Marriott acquired the Starwood hospitality group in September 2016, which operates numerous hotel brands including Sheraton, Westin, Aloft, and W Hotels. But the intrusion that caused the enormous data breach predates Marriott's acquisition, beginning in 2014. It currently seems that about 170 million Marriott customers only had their names and basic information like address or email address stolen. But the bulk of the victims—currently thought to be 327 million people—had different combinations of name, address, phone number, email address, date of birth, gender, trip and reservation information, passport number, and Starwood Preferred Guest account information all stolen.

hacker

Banking

A Wells Fargo bank access code was used to steal the personal information of roughly 5,000 consumers, leading the bank to conduct a full-scale inquiry into the data breach.

Wells Fargo says it was notified on July 1 by MicroBilt, an online consumer and commercial credit bureau information provider, that someone had used a Wells Fargo access code to obtain data on 7,000 consumers from its computers. MicroBilt, located in Kennesaw, GA, says that because of the ongoing law enforcement investigation, they are unable to comment about any details of the case. According to Mary Berg, a Wells Fargo spokesperson, Wells Fargo immediately launched a full-scale investigation into how the information was breached and notified the US Secret Service about the data theft.

MicroBilt provides consumer information to Wells Fargo and other banks and businesses, and interfaces with the three consumer credit bureaus: Equifax, Experian and Trans Union. The data breached was for the time period between May and June 2008, says Berg. The two companies (Wells Fargo and MicroBilt) say that business between the two companies has been suspended by mutual agreement.

Credit Rating Company

Equifax, an American credit company, revealed (first six weeks after the fact), that it had suffered a cyber attack over the course of a number of months. Detected in July of 2017, it contained the personal data (names, birthdates, social insurance numbers, drivers license numbers) of 143 million American, Canadian and British customers as well as 200,000 credit card numbers. Complaints against the company as well as suspicions of insider trading were levied since the vulnerability of Apache Struts used by the hackers was well knownand several executives of the company sold stock just days before the security breach was made public.

hacker 2

All of this information speaks to the existing skills gap that cyber-criminals and cyber-terrorist are developing and the expectation that this skills gap will persist for quite some time.

Innovative Systems Groups demonstrates the need for Cybersecurity

To illustrate the size of the problem, McAfee the global security company produced a report that estimates the global economic lose due to cyber-crimes exceeds $400 Billion annually and this a conservative estimate.

Sadly, no faction of our society is immune, including government agencies, military, retail establishments, banks and individuals.

The demand for cybersecurity professionals has increased dramatically!

Up until now, our ability to train and provide workers to defend our economic infrastructure has not kept pace. The old procedures for training, re-training and certifying talent will not work to supply the marketplace with the workers that large businesses, small businesses, federal, state and local governments are demanding.

Enter CNDC!

 

The Cyber Network Defense Course

Our unique, hands-on training program is being used as a tool to transition three specific demographic groups into the high paying, high demand career field of cybersecurity.

Our goal is to provide them with CNDS to enhance current cybersecurity training programs currently available at local schools, to provide transitioning veterans, dislocated IT workers, and young adults with skills necessary to gain employment in this in-demand career field.

 
ISG provides simulated training

Simulation Training Software

Many of the training efforts identified around the country lack the ability to keep pace with the rapidly changing landscape of cybersecurity and do not meet companies’ demand for highly skilled cybersecurity professionals. The Simulation Modeling software used in the Cyber Network Defense Course will allow us to simulate the types of threats that employers are encountering every day – making students more marketable and employable.

 
ISG Provides real world experiences

Real World Experiences

Simulation Modeling creates a real world problem in a virtual environment and gives the trainee experience in handling these situations in a non-threatening environment. This approach helps us to determine whether the trainee really does know the subject matter and is a better indicator as to whether the trainee is going to be successful.

 

Multiple Levels of Support

We recognize there are support issues that need to be taken into consideration and our focus is to make sure that the proper level of support is made available to the CNDC trainees every step of the way by leveraging resources at the community college as well as the Capital Area Workforce Development and NC Works Career Center. Getting into the workforce as quickly as possible is a big focus for our trainees since most of them have families to support and the shortest path to a solid job is their focus.

 

Work at Your Own Pace

Our employers, while they are interested in supporting the trainee, have little room to tolerate work that is not being completed in a fast and efficient manner. To address the needs of all parties, CNDC is competency based where possible. Meaning, if the trainee proves they have mastered a subject they are immediately moved forward to the next step. Consequently, if they require more time to master a step we don’t move them forward before the step is mastered and at the same time we do not force the class to move at the pace of the slowest student. Each student can move at his or her own pace.

Cyber Network Defense Course

Our Cyber Network Defense Course and simulated training will give you a tremendous advantage in the highly competitive field of Cybersecurity.

This program was developed with education partners to support some of foundation education as well as local workforce boards to fund educational opportunities for qualifying participants. It was designed to prepare you with the necessary skills for the protection of networks, communications, and data, as well as provide the knowledge base for planning, implementing, and managing enterprise-level security and system integrity.

Cyber Network Defense Course

The Cyber Network Defense Course (CNDC) teaches security professionals how to protect digital assets. The training uses a virtual, real-world network through Simulation Modeling software, to provide an immersive training experience with a series of practical “live fire” hands-on labs.

Two areas make this class unique.

  • First, the lifelike, interactive environment where students can apply what they have learned in books and lectures to a simulated work environment.

  • Second, the immediate feedback provided to the student about the success of actions taken helps to reinforce good decisions and helps the student to make an adjustment when bad decisions are made.

Upon completion, students will have increased their cyber skills and understand the techniques and technology of Cyber Defense.

CNDS simulates the work environment to both train and assess the individual’s ability to defend and manage a network that is presented with various threats.

* Student-trainees will take a Human Resource Development class prior to either cybersecurity track to develop the employability skills needed to succeed in today’s competitive job market. Classes include job-hunting techniques, that make use of: social media tools such as LinkedIn, completing applications, writing resumes and cover letters, mock interviewing, and communication and problem-solving methods.

Scholarships and/or Financial Aid may be available through NC Works for those that qualify.

Deciding to work in the IT industry is an exceptionally good choice. Getting an IT certification can help you get started and get ahead in your career. The CompTIA IT Certification Roadmap can make navigating the world of certifications a little easier.