International Cyber Security Academy

Preparing the Front Lines for Tomorrow's Cyber Threats

The International Cyber Security Academy (ICSA) is a specialized series of hands-on training seminars and lectures to teach cyber warriors the most cutting edge tools, techniques, and protocols (TTPs) of information security beyond mere concepts and terminology. ICSA is ideal for professionals in security and other related fields who want industry leading knowledge on creating a defensible network, maintaining systems targeted by adversaries, effectively deploying information security tools, and tracking cyber criminals.

Attendees will partake in classroom style lectures and laboratory research, learning how to develop, install, and configure the tools needed for comprehensive security in a hands-on environment.  After learning the specialized tools, techniques, and protocols, the cyber warriors will be tested in training scenarios.  These training sessions will simulate real-world scenarios faced by front-line security professionals and cyber investigators every day, allowing cyber warriors to utilize the learned TTPs in real time on the wire. Professionals in other fields will gain from cross-disciplinary teachings at the Academy, helping them understand and apply the nuanced technical details of cyber security to work in their prospective fields.

Cyber warriors attending ICSA join the ranks of the privileged few, the Society of Few, Protectors of Many, who receive training on the skills and techniques needed to combat emerging cyber threats and exploitations from leading U.S. government professionals and private industry leaders. The hands-on approach to learning in the Academy, in conjunction with the complimentary admittance to the International Conference on Cyber Security (ICCS) and all of its lectures, will prepare the future leaders of secure and sustainable cyberspace.  Please click here to view the Official ICSA Program & Schedule.

August 2013 ICSA Training Seminars

  • Enterprise Incident Response, by Mandiant  (Saturday, August 3 & Sunday, August 4 + ICCS; $2,350)
    • The International Cyber Security Academy (ICSA), the pre-eminent cyber security academy, and Mandiant have partnered to provide industry leading training on Enterprise Incident Response.  Cyber warriors will pair with expert Mandiant trainers to learn how to identify, triage, quarantine, and investigate complex cyber security incidents through case studies and unique hands-on lab exercises.  This course will cover the incident response process, containment, forensic collection and imaging, analysis of volatile and nonvolatile data, identifying persistence mechanisms, and more.  Register Now!
        • Who Should Attend
          • Anyone involved in the information technology and information security fields responsible for responding to computer intrusions or securing corporate networks.  The training covers the basics of the incident response process and proper handling of incidents as well as investigative techniques.
          • Security Professionals and Management who want to understand and deploy complex information security tools, techniques and protocols beyond basic levels.
          • Security Professionals and Management who want to learn how to deploy complex information security tools, techniques and protocols in an industry-leading training laboratory.
          • Engineers and Management who need a high level understanding of what is involved in operating a defensible network that is facing attacks.
          • Networking, Forensic, Penetration Testers, and Security Auditors who need more nuanced understanding of network and information security principles so they can be more effective at their jobs.
          • Security Professionals and Management responsible for building and maintaining systems that are being targeted by complex malicious actors.
          • Attorneys and Legal Professionals in need of a pragmatic understanding of computer and networking technologies and their high level functions.
          • Anyone new to information security with a strong background in information systems and networking.
        • Laptop Requirements
          • Attendees are required to bring their own properly configured laptops to the training seminar.
          • You must be running Windows 7.
          • You must have Administrator access to the laptop.
          • You must remove all anti-virus applications.
          • You must remove all personal firewall applications.
          • You must have a wired ethernet connection
          • You must have VMWare’s VMWare Workstation installed and functioning.
          • You must be familiar with command line utilities in Windows, navigating the Windows file system using the command line.
          • You must be familiar with common file system structures, Windows Registry.
          • You must have a fundamental understanding of basic information and network security concepts and protocols.
        • Laptop Recommendations
          • Use discretion with what computer you bring to ICSA (ie, personal computers or company production computers are not recommended).  With the research and training in advanced tools, techniques and protocols, there is always the risk of data loss and corruption of your operating system.
  • (ISC)2® Half Day CSSLP® Credential Clinic  (Monday, August 5 + ICCS; $1,500)
    • The International Cyber Security Academy (ICSA), the pre-eminent cyber security academy, and (ISC)2® have partnered to provide industry leading training on the software development lifecycle. Software must be developed with security in mind in order to defend and mitigate hackers. We all know this is critical but now is the time to ensure it happens. In this clinic, we will cover two of the eight domains from the CSSLP certification that ensures that security is considered for each phase of the software lifecycle. The CSSLP is for everyone involved in the SDLC with at least 4 years' experience.  Register Now!
        • Who Should Attend
          • Each software lifecycle stakeholder is responsible for certain phase(s) of the SDLC, but all phases must have security built into them. CSSLP is for all the stakeholders involved in the process. Each of the 7 CSSLP Domains covers how to build security into the different phases. Don’t have the experience? Become an Associate of (ISC)² by successfully passing the CSSLP CBT exam. You’ll have 5 years to earn your experience to become a CSSLP.
        • Laptop Requirements
          • There are no laptop requirements for this offering.
        • ​Professional Continuing Education (CPE) Credits
          • ​4 CPE credits are available upon successful completetion.
  • Cyber Security & Applications¹  (Saturday, August 3 & Sunday, August 4 + ICCS; $3,350)
    • This course provides a comprehensive and cross-disciplinary perspective on the ways and means to build a secure and sustainable cyberspace ecosystem.  Topics are drawn from a variety of areas in emerging technologies, operation and enforcement, and real life experiences. Applications include projects and case studies, expert lectures and discussions with cyber security leaders from public and private sectors.  Register Now!
        • Who Should Attend
          • Security Professionals and Management who want to receive hands-on real-world experience in a research and development environment.
          • Attorneys and Legal Professionals needing a hands-on and real-world understanding of computer and networking technologies and their functions.
          • Security professionals and Management who want to understand and deploy information security tools, techniques and protocols beyond basic understanding.
          • Engineers and Management needing to understand what is involved and how to function a defensible network against attacks.
            Networking, Forensic, Penetration Testers, and Security Auditors who need a solid foundational of security principles so they can be effective at their jobs.
          • Security Professionals and Management responsible for building and maintaining systems that are being targeted by adversaries.
          • Anyone new to information security with beginners background in information systems and networking.
        • Laptop Requirements
          • Attendees are required to bring their own properly configured laptops to the training seminar.
          • You must be running Windows 7.
          • You must have Administrator access to the laptop.
          • You must remove all anti-virus applications.
          • You must have a wired ethernet connection
          • You must remove all personal firewall applications.
          • You must have VMWare’s, VMWare Workstation installed and functioning.
        • Laptop Recommendations
          • Use discretion with what computer you bring to ICSA (ie, personal computers or company production computers are not recommended).  With the research and development of tools, techniques and protocols, there is always the risk of data loss and corruption of your operating system.
  • Forensic Computing¹  (Saturday, August 3 & Sunday, August 4 + ICCS; $3,350)
    • Computing and digital technology has transformed society and the way we live.  Today, our world is filled with an array of complex multi-processing and interconnected machines that we have all become accustomed to.  This course studies technologies and practices for investigating the use, misuse and the adversarial potential of computing systems and digital devices.  It will provide insight into the digital forensics and legal world, emphasized with practical lab projects.  Register Now!
        • Who Should Attend
          • Security Professionals and Management who want to receive hands-on real-world experience in a research and development environment.
          • Security professionals and Management who want to understand and deploy information security tools, techniques and protocols beyond basic understanding.
          • Engineers and Management needing to understand what is involved and how to function a defensible network against attacks.
            Networking, Forensic, Penetration Testers, and Security Auditors who need a solid foundational of security principles so they can be effective at their jobs.
          • Security Professionals and Management responsible for building and maintaining systems that are being targeted by adversaries.
          • Anyone new to information security with beginners background in information systems and networking.
        • Laptop Requirements
          • Attendees are required to bring their own properly configured laptops to the training seminar.
          • You must be running Windows 7.
          • You must have Administrator access to the laptop.
          • You must remove all anti-virus applications.
          • You must have a wired ethernet connection
          • You must remove all personal firewall applications.
          • You must have VMWare’s, VMWare Workstation installed and functioning.
        • Laptop Recommendations
          • Use discretion with what computer you bring to ICSA (ie, personal computers or company production computers are not recommended).  With the research and development of tools, techniques and protocols, there is always the risk of data loss and corruption of your operating system.
        • ​Additional Requirements
          • ​2 GB Thumb Drive
          • Blank CD, on which to create a Boot CD
  • Leadership & Management in Cyber Security  (Saturday, August 3 & Sunday, August 4 + ICCS; $3,350)
    • In the interconnected world of combined cyber-physical-natural cyberspace, big data can be an asset but also a liability for individuals and organizations.  This course covers a variety of issues (including technological, economical, business, legal and ethical) to manage cyber risk for individual citizens, government organizations, and business enterprises.  Students will meet and work with global leaders in cyber security on projects related to best practices derived from experiences in the field.  Register Now!
        • Who Should Attend
          • Security Management who want to understand information security tools, techniques and protocols beyond basic understanding.
          • Management needing to understand what is involved and how to function a defensible network against attacks.
          • Management involved with the networking, forensic, penetration testers, and security auditors who need a solid foundational of security principles so they can be effective at their jobs.
          • Management responsible for building and maintaining systems that are being targeted by adversaries.
  • (ISC)2® CISSP CBK Review Seminar  (Monday, August 5  – Friday, August 9 + ICCS Networking Events; $1,800)
    • The Official CISSP® CBK® Review Seminar is the key to success in obtaining your certification as a Certified Information Systems Security Professional. CISSP® certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Prepared by CISSP credential holders and conducted by (ISC)² authorized instructors, the (ISC)² CISSP CBK Review Seminar is the most comprehensive review of information systems security concepts and industry best practices.  Register Now!
        • What You Will Learn
          • Access Control: a collection of mechanisms that work together to create security architecture to protect the assets of the information system.
          • Telecommunications and Network Security: network structures, transmission methods, transport formats and security measures used to provide availability, integrity, and confidentiality.
          • Information Security Governance and Risk Management: the identification of an organization's information assets and the development, documentation, and implementation of policies, standards, procedures, and guidelines.
          • Software Development Security: the controls that are included within systems and applications software and the steps used in their development.
          • Cryptography: the principles, means, and methods of disguising information to ensure its integrity, confidentiality, and authenticity.
          • Security Architecture and Design: the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity and availability.
          • Operations Security: the controls over hardware, media, and the operators with access privileges to any of these resources. Business Continuity and Disaster Recovery Planning: steps to preserve the business in the face of major disruptions to normal business operations.
          • Legal, Regulations, Investigations, and Compliance: computer crime laws and regulations; the investigative measures and techniques which can be used to determine if a crime has been committed and methods to gather evidence. Physical (Environmental) Security: the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information.
        • This exclusive seminar will help you identify areas of the CISSP CBK you need to study and features:
          • 100% up-to-date material;
          • An overview of the information security field;
          • Contributions from CISSPs, (ISC)² Authorized Instructors and subject matter experts; and
          • End-of-domain review questions

August 2013 ICSA Networking Opportunities

  • 3-Way Handshake Dinner Reception  (Sunday, August 4; 6:00pm – 9:00pm; $0.00)
    • Following your arduous training at the International Cyber Security Academy, join your fellow cyber warriors for a relaxing evening meal and cocktails at the 3-Way Handshake Dinner. This is a chance to organize future operations in cyber security together with one another, network professionally, and enjoy learning more about those who have trained beside you at the Academy.  On August 4, 2013 dinner and cocktails will be held from 6:00 pm to 9:00 pm with business formal attire encouraged for attendees. Additionally, all are encouraged to bring items from their organization such as challenge coins, pins, patches or hats to share with your fellow Academy trainees who have joined you in the Society of Few, Protectors of Many.
        • Please note, the 3-Way Handshake Dinner is part of the ICSA Program and all attendees are encouraged to attend.  The cost of the 3-Way Handshake Dinner is included with registration.

Educational Partners

(ISC)² is the largest not-for-profit membership body of certified information and software security professionals worldwide, with nearly 90,000 members in more than 135 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSPÒ) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLPÒ), Certified Authorization Professional (CAPÒ), and Systems Security Certified Practitioner (SSCPÒ) credentials to qualifying candidates. (ISC)²’s certifications are among the first information technology credentials to meet the requirements of ISO/IEC Standard 17024. (ISC)² offers education programs and services based on its CBK®, a compendium of information security topics. Visit www.isc2.org.

 

Mandiant is the leader in advanced threat detection and response solutions.  Headquartered in Alexandria, Virginia, with offices in New York, Los Angeles, San Francisco and Reston, Virginia, Mandiant provides products, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments and the world’s leading law firms.  The authors of 12 books and quoted frequently by leading media organizations, Mandiant security consultants and engineers hold top government security clearances and certifications and advanced degrees from some of the most prestigious computer science universities.  To learn more about Mandiant visit www.mandiant.com, read the company blog, M-unition™ http://blog.mandiant.com, follow on Twitter @Mandiant or Facebook at www.facebook.com/mandiantcorp.

Yellow Ribbon Program

The International Cyber Security Academy Salutes You!  Through the Yellow Ribbon Program, current Fordham University qualified veterans can attend the International Cyber Security Academy at Fordham University. At ICSA, Fordham University veterans can learn the coveted skills needed in the emerging field of cyber security amongst leading government and private industry professionals. Fordham University guarantees that all ICSA fees are fully covered for current Fordham University admitted veterans who fall in the Veteran Affairs’ maximum benefit category. Veterans who attend ICSA will be future leaders on the frontlines of cyber security.²  For more information, please visit the FordhamVets website (link).  Not enrolled at Fordham University yet?  Start the process now (link)!

 

¹If desired, taking these hands-on training seminars will entitle the attendee to three Fordham University credits.  Special instructions will be communicated once the attendee is successfully registered for the seminar.

²At this time, the Yellow Ribbon Program is only available for the Cyber Security & Applications and Forensic Computing hands-on training seminars.