Cybersecurity Courses

Cybersecurity Training

Cybersecurity Training at New Horizons Knoxville | Chattanooga | Tri-Cities

(Own + Secure + Protect) + IT

With nearly $2 trillion in losses in 2019, cybercrimes and attacks are continuing to be a major threat. Did you know that by 2027, global spending for cybersecurity will reach $10 billion? In the age of IoT, it is more important now than ever to understand the importance of cybersecurity and the types of threats that are looming.

Part of that $10 billion will not only be invested in security, but training employees. By understanding how attacks are happening, you can better prepare and see how you can prevent them from happening to you. With New Horizons, our courses and certification are essential in preparing you for the cybersecurity workforce that exists today and in the future.

Join us and industry experts throughout the month of October for an in-depth series of webinars focusing on securing data, IoT, AI and more. And don’t forget you have access to FREE assets surrounding cybersecurity!

View all available webinars and whitepapers

 

Who is Keeping Your Information Secure?

Cybersecurity

Which Path is Right for You?

Today being security-aware is not something required only of IT and Cybersecurity Professionals. It is the responsibility of everyone in an organization to have at minimum a foundational understanding of security issues and vulnerabilities.

The New Horizons Cybersecurity portfolio of courses is designed to provide security training no matter your level of experience or requisite need. Please click the buttons below to explore our interactive Cybersecurity Maps and find exactly the right training path for you!

We offer cybersecurity training and certification from the following vendors:

CyberSec First Responder (CFR)

CertNexus CyberSec First Responder is a course designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of cybersecurity capabilities for systems and networks.

There are a number of options in regards to cybersecurity training in the market today. From vendor-based product training to cybersecurity management courses, it can be difficult to determine which is best for any given individual. CFR combines a number of disciplines within cybersecurity and develops an understanding of how everything fits together. Couple this holistic security focus with hands-on, lab-based learning, and students are able to develop the skillset needed to be a valued member of any cybersecurity team.
Course: CyberSec First Responder
Exam: CyberSec First Responder

Target Audience
Designed for information assurance professionals whose job functions include development, operations, management, and enforcement of secure systems and networks.

At Course Completion
This course will prepare cybersecurity professionals to become the first line of response against cyber attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents.

CyberSAFE

CyberSAFE is a course designed for information technology end-users. There is an increasing reliance on workplace technologies and ensuring their proper use is critical to the protection of our information systems.

This course is designed to meet the needs of all organizations, irrespective of size, industry, or geographic location.

Course: CyberSAFE

Target Audience
This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.

At Course Completion
Students will be able to identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect themselves and their organizations from those risks.

The Impact of Emerging Technology on Cybersecurity
Date: Wednesday, October 9, 2019
Time: 9:00 am PDT / 12:00 pm EDT / 4:00 pm GMT
Presenter: Megan Branch, CertNexus

Register


Stop Hackers by Thinking Like One
Date: Thursday, October 10, 2019
Time: 9:00 am PDT / 12:00 pm EDT / 4:00 pm GMT
Presenter: Joseph Childrose - Instructor, New Horizons Computer Learning Centers, Inc.

Register


Where is Cisco Going with Security Certifications?
Date: Wednesday, October 16, 2019
Time: 9:00 am PDT / 12:00 pm EDT / 4:00 pm GMT
Presenter: Chris Cunningham, Instructor - New Horizons Computer Learning Centers, Inc.

Register


Cybersecurity Concerns Around Blockchain
Date: Thursday, October 17, 2019
Time: 9:00 am PDT / 12:00 pm EDT / 4:00 pm GMT
Presenter: Kris Bennett - Blockchain Training Alliance

Register


Enhancing Security With VMware NSX
Date: Tuesday, October 22, 2019
Time: 9:00 am PDT / 12:00 pm EDT / 4:00 pm GMT
Presenter: Shawn Bolan, Instructor, New Horizons Computer Learning Centers Inc.

Register


vSphere Security From the Ground Up
Date: Thursday, October 24, 2019
Time: 9:00 am PDT / 12:00 pm EDT / 4:00 pm GMT
Presenter: Shawn Bolan, Instructor, New Horizons Computer Learning Centers Inc.

Register


The Only Constant in Security is Change - Manage It!
Date: Tuesday, October 29, 2019
Time: 9:00 am PDT / 12:00 pm EDT / 4:00 pm GMT
Presenter: Ken Crawshaw, Instructor - New Horizons Computer Learning Centers, Inc.

Register

Cyber Attack Trends Cyber Attack Trends: 2019 Mid-Year Report:
To provide organizations with the best level of protection, security experts should be attuned to the ever-changing landscape and the latest threats and attack methods.
3 Cyber Trends that are stil relevant in 2019 3 Cyber Trends that are stil relevant in 2019:
As new threats emerge from the changing landscape, three cyber threats from 2018 are still relevant today
4 Growing Cybersecurity Threats in 2019 4 Growing Cybersecurity Threats in 2019:
No environment is immune to cyber attacks. In fact, new threats are emerging every day. Check out four growing threats to be aware of.
Best Practices to Secure Apps and Data Best Practices to Secure Apps and Data:
Instead of managing only devices, successful organizations take a holistic view of security. Balance the user experience and productivity with security across devices, apps, data, networks and identity.
State of  Cybersecurity  Report 2019 State of Cybersecurity Report 2019:
Free from commercial influence and marketing incentive, this piece of research was intended to illustrate what a sample of security experts considered to be the factors driving the industry forward.
Internet of Things
 Tip Card
Internet of Things Tip Card :
Without a doubt, the Internet of Things makes our lives easier; but we can only reap these benefits if our Internet-enabled devices are secure and trusted. Here are some tips to increase the security of your Internet-enabled devices.
The IoT Revolution: Uncovering Opportunities, Challenges and the Scale of the Security Threat The IoT Revolution: Uncovering Opportunities, Challenges and the Scale of the Security Threat :
Find out about the kinds of IoT projects being driven by global organisations, their key challenges and perceived threats, along with hard data outlining the frequency and type of attacks they’ve already experienced.
Leveraging the Agility of DevOps Processes to Secure Hybrid Clouds Leveraging the Agility of DevOps Processes to Secure Hybrid Clouds:
Securing cloud infrastructure requires not only understanding what is technically different about today’s data center but also fully embracing and exploiting the benefits of DevOps as a means to codify cybersecurity practices and controls.
Manage risk by protecting apps, data and usage Manage risk by protecting apps, data and usage:
Trusted to address risk management priorities by controlling application and data access across any location, network and device.
Mobile Security Tip Card Mobile Security Tip Card:
Mobile devices — from smart watches to phones and tablets — can be extremely useful and convenient, there are also potential threats users may face with such technology. It’s important to understand how to protect yourself when connecting on the go.
Six Steps to Comprehensive Container Security Six Steps to Comprehensive Container Security:
As with any technology, there are trade-offs. With containers, those costs come via infrastructure complexity which can have serious security consequences if not properly accounted for. To understand these issues, we'll look at how containers accelerate the developer experience.
The Future of Cybersecurity The Future of Cybersecurity:
As AI and Machine Learning start to pick up speed, the future of cybersecurity lies within automation. As the technological landscape continues to change, we’ve reached a point where people and advanced automation can work hand-in-hand.