Northrop Grumman Cyber Warfare Seminars
Monday, April 18, 8:00 a.m.-5:00p.m.
Tuesday, April 19, 8:00 a.m.-5:00 p.m.
Northrop Grumman Cyber Warrior IT Security Training
Learn about the latest threats, tactics and defense measures. Mark your calendar for Northrop Grumman’s next Cyber Warrior IT Security Training Sessions:
The two-day Cyber Warrior Course uses fundamental computer and networking
concepts as a foundation for indepth description and demonstration of hacker
tools, techniques, and strategies. This course covers the systematic, phased
approach or methodology used by hackers in attacks as well as the defensive
countermeasures that can be employed against them. Learn how to defend your
networks through comprehensive analysis and demonstrations of the anatomy of
an attack. The course is unique in its breadth and presentation methods, including more than 40 live demonstrations of hacker and security professional tools and techniques, with over 200 animated tutorial diagrams and screen-shots.
Who should attend:
Directors, engineers, managers, staff, and project leaders
working with computer systems and networks and those interested in the field of
information security. System administrators who desire to broaden their expertise with network security concepts will also benefit from the course. As an alternative to the two-day course, an executive-level version is also available for C-level executives and senior decision makers concerned about the network security of their organization.
Cyber Warrior Executive
As an alternative to the two-day Cyber Warrior Course, a half-day executive
version is available. As an executive or decision maker, you must determine
how to manage risk and protect your network. The Executive Course was
designed specifically for non-technical managers and staff to get them “up-to-
speed” quickly on computer networking, security concepts, hacker
methodology, and defensive countermeasures. This half-day course is a
condensed version of the larger course offering and takes place in an informal
setting that encourages questions, discussion, and interaction with the
Who should attend:
Vice presidents, directors, managers, staff, and project leaders concerned with computer network security. System administrators who desire to broaden their expertise with network security concepts will also benefit from the course. This executive-level version of the course is ideal for C-level executives and senior decision makers concerned about the network security of their organization. A two-day version is also available and recommended for a more indepth presentation of the course material.
Cyber Warrior Forensics and Incident Response
A two-day comprehensive introduction to Forensics and Incident Response,
this course was designed to help IT professionals understand how to prepare
for and respond to internal and external network and information security
violations from both a cyber criminal and terrorist perspective. This course is intended to cover entry level and intermediate concepts in digital forensics and provide insight into the legal reforms that surround current privacy and compliance legislation. The issues covered are privacy protection, plans for data reduction, destruction during the course of business, and electronic document discovery and forensic examinations. Explore forensic investigation techniques, including pre-incident preparation and methods that hackers use to evade audit logging controls and intrusion detection mechanisms. Jump start the creation of an effective Computer Security Incident Response Team (CSIRT) by walking through gathering of forensic evidence.
Who should attend:
Managers, staff, and project leaders responsible for Computer Security Incident Response Teams and /or tasks. Law enforcement agents and intelligence analysts from both a national and business competitive interest. First Responders who desire to broaden their expertise with network
Northrop Grumman’s Promise
You’ll be given a checklist at the end of these courses to run against your
network systems. You’ll see immediate measurable improvements and
return on investment through implementation of Northrop Grumman’s
proven Cyber Warfare techniques.
Northrop Grumman – A Name to Trust in IT Security Training
Northrop Grumman brings a unique perspective to IT security training. We’re
trusted to provide security for some of the nation’s most important networks,
including those of the U.S. Government and the Department of Defense
– networks that are subject to attacks from the most advanced hackers using the
latest tools and techniques. If you are concerned about maintaining the highest
security for your business or agency, Northrop Grumman’s Cyber Warrior Courses will make you aware of the latest threats and how to defend against them.