Select Page
Intellfence Job placement and mentoring program

Intellfence Job placement and mentoring program

Job placement And mentoring program

We train and bring security professionals together with a potential employer.

Why A CyberSecurity Job Placement & Mentoring Program?

The Cybersecurity Industry is constantly evolving hence the need for more cybersecurity professionals. Due to this increased demand individuals and organizations are facing competencies problems. How do interested candidates acquire and prove their competencies? How do organizations recruit and train people with the right competencies?  This is made more complex due to the vast cybersecurity work domains.  It can be challenging for many to find their niche in this industry.

Our Job placement & mentoring program brings  potential employers and cybersecurity professionals together.

For the Employees

We help individuals to build a career in cybersecurity by providing experienced-based training and mentoring. In many ways, cybersecurity is like any other industry such as engineering or healthcare. There are many directions to choose from and many paths to specialization. To get a job and grow a career in Cybersecurity you will need to choose which of the different path you find interesting

For the Employers

We help organizations to find out the type and level of cybersecurity professionals they need and help them train candidates to fill these positions. Through our continue professional education we continue to provide these professionals the skills needed to turn their knowledge into abilities.

Who Is This Program For?

Young School Graduates

Young people just leaving school may find themselves not qualified enough to get a job with the cybersecurity industry because of lack of experience and not earning the right qualifications in school. The job placement and mentoring program help these people to increase their competencies

People Looking To Switch Career

The future is Cybersecurity, Cloud and Artificial Intelligence and Big Data. Many people in Information Technology today doing jobs as System Administrator, help desk or Database administrators might be out of job due to sophistication of AI systems in the future which could take over these types. Therefore, there a need for people to make a Switch to Cybersecurity which spans multiple sectors.

Experienced IT Specialist

If you have been in the Information Technology industry for years, and now feel you need to move higher into Information Security Management for job functions as CISO or CSO but having difficulties financing the one then this is the program for you.

Software & Database Developers

The field of cybersecurity is very wide. This is ongoing to increase in the next few years. Software are actually the best people to build security into software. However, many software developers lack security skills. This program is for you if you are such a software or database developer who would like to add security skills to software development.

How Does The Program Works?

We engage interested professionals in a one-to-one consultation, so we can create a recommendation for them based on their work experience and their choice of career they would like to pursue. During this consultation we make use of The National Initiative for Cybersecurity Education Cybersecurity Workforce Framework (NICE Framework) to help them map out their career path. Based on this a training program is created which will take the person from zero to a security professional within 6 months. 

The US national Institute of Standard and Technology (NIST) published a framework called the NICE Framework which is designed to help both employers and potential employees to zoom in on the knowledge and skills that is needed in the Cybersecurity industry. Using the NICE framework, we can help train and mentor people into cybersecurity professional within their chosen path. The NICE framework divides the Cybersecurity workforce into the following speciality areas:

For Employee

The NICE framework enables an organization to successful recruit and train security professionals for multiple roles in the organization. Provides  information about workforce needs for a giving function.

For Students

The NICE Framework presents clear information about cybersecurity work to help people looking for a new job or to change job roles, and workers looking to demonstrate or increase their competencies.

For Educators

The NICE framework provides information about what a candidate needs to know to be efficient in the Cybersecurity industry. Educators can develop better educational programs. Certificates.

Components of the NICE Framework

Securely Provision

Concerned with conceptualizing, designing, and building secure IT systems, with responsibility for some aspect of the systems’ development.

  • Risk Management
  • Software Development
  • System Architecture
  • System Development
  • Systems Requirements Planning
  • Technology R&D
  • Test and Evaluation
Oversee and Govern

Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work.

  • Cybersecurity Management
  • Executive Cyber Leadership
  • Legal Advice and Advocacy
  • Program /Project Management and Acquisition
  • Strategic Planning and Policy
  • Training, Education and Awareness
Operate and Maintain

Responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security.

  • Customer Service and Technical Support
  • Data Administration
  • Knowledge Management
  • Network Service
  • Systems Administration
  • System Analysis
Analyze

Specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.

  • All Source Analysis
  • Exploitation Analysis
  • Language Analysis
  • Targets
  • Threat Analysis
Protect And Defend

Identification, analysis, and mitigation of threats to internal IT systems or networks. Uses defensive measures and information collected from a variety of sources to identify, analyse, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.

  • Cyber Defence Analysis
  • Cyber Defence Infrastructure Support
  • Incident Response
  • Vulnerability Assessment and Management
Collect And Operate

Responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.

  • Collection Operation
  • Cyber Operational Planning
  • Cyber Operations
Investigate

Responsible for detecting and analyzing cyber events and/or crimes of IT systems, networks, and digital evidence.

  • Cyber Investigation
  • Digital Forensics

Security Management Professional Example

Using the NICE Framework we are able to map out the career path and train people with the right competencies as to effectively manage information security programs in an organization. This program provide Job competencies such for Chief Information Security Officer (CISO), Chief Security Officer (CSO), Security or Compliance Manager.

Specialty Area
Oversee & Govern
Description
Oversees the cybersecurity program of an information system or network, including managing information security implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, requirements, policy enforcement, emergency planning, security awareness, and other resources.
Related Jobs
Information Systems Security Manager
Chief Information Security Officer (CISO)
Security Security Officer (CSO)
IT Program Manager
Product Support Manager
IT Investment/Portfolio Manager
IT Program Auditor
Certification Training
CompTIA Security +
ISC2 Certified Information Systems Security Professional (CISSP)
ISC2 Certified Cloud Security Professional (CCSP)
ISACA Certified Information Security Management (CISM)
EC Council Certified Chief Information Security Officer (CCISO)
ISACA Certified in Risk and Information Security Control (CRISC)
CompTIA Advanced Security Practitioner (CASP+)
CompTIA Cloud+

To Protect & Defend Function

Specialty Area
Protect & Defend
Description
Tests, implements, deploys, maintains, reviews and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.
Related Jobs
IDS Administrator
IDS Engineer
IDS Technician
Information Systems Security Engineer
Network Administrator
Network Analyst
Network Security Engineer
Network Security Specialist
Security Analyst
Security Engineer
Security Specialist
Systems Security Engineer
Certification Training
Comptia A+
Netowrk +
Security +
Cloud +
CySA+
CASP+
PenTest+
CEH

GET IN TOUCH

Security Training and Tutoring

Security Training and Tutoring

Professional security Training & Tutoring

Take Your information security Training to the next level

Optimize Your Information Security Results Today!

Get A Free Consultation

Do More With Less

Optimize Your Training Budget And Get More Results

Information Security has become vital to every business. Data breaches have led to the demise of some organizations. Today, business leaders and government regulations demand that organizations make information security a high priority. Organizations are expected to have  someone responsible for information security.

However, having someone with the title such a Chief Information Security Office (CISO) to head information security is not always practicable for many organizations due to various constrains.

Therefore, our security training support program is designed to combine practical training with support of security professionals in the implementation of security in their organizations.  The goal is to combine security training with practical implementation. We help you take steps to create quick wins in information security with the resources you already have.

Our Security Training & Mentoring Program

Train People to take action and not just pass a certification Exam

Security And Tutoring  Service
Our Security support program combines training and tutoring that helps small & medium size businesses manage their own information security program with the resources they have.

Phishing Simulation
Through our security awareness program companies gets a phishing simulation program that helps their employees avoid serious security pitfalls.

Cloud Security Consulting
The cloud is a major challenge for modern business today. We teach you the best way to use cloud services and still ensure data safety and protection from hacking attacks.

Security Audit And Assessment Training
We teach and provide you the knowledge to have clear visibility into the vulnerabilities in your company and carry out an Information Audit and self-assessment.

Business Security Support
We educate  and provide you with a one-one tutoring with high-quality security advice and know-how to take step-step actions and to implement security in your businesses.

Roadmap To Empower Your Organization

Step 1: Orientation Meeting

The orientation meeting is a free one-hour virtual meeting with you to discuss and find out what you are trying to archive. Based on the findings from this meeting we can create a working plan that meet your needs.

Step 2: Planning

Based on the result of the orientation meeting we will set up a training plan which will cover the theory and practical hands-on implementation of the subject matter based on what you are trying to archive in your organisation.

Step 3: Working session

This series of 3-hours training workshop consist of teaching of the theory and practical knowledge of the subject. Our instructor will work with the participants to learn how to implement the security program in reallife based on company goals and objectives.

Step 4: Work Review

There will be a review at the end of a series of 3 hours working sessions to determine if more time is needed to complete the work or the participant have enough knowledge to move further on their own. The instructor will be available for further tutoring in the future as needed. 

Risk Management Case Study

In this case study you will see how you can leverage the time and resources spent on traditional training to get better ROI from training by combining our training program directly into on the job practical experience.

GDPR Compliance Case study

Combine training with the practical implementation of GDPR in your company. See how staff can learn about GDPR at the same time and actually create policies and setup plans and start putting this plan into action at the same time.

WE CAN PROVIDE  INFORMATION SECURITY TRAINING AND TUTORING IN THESE AREAS
  • ISO 27001 Certification support
  • Setting Up Risk Management Program
  • Identity and Access Management
  • Security Alignment with Organizational Goals and Objectives
  • Developing security awareness program
  • Setup Security Programs
  • Security Policies development
  • GDPR  (Privacy) implementation
  • Building Security into System Development LifeCycle (SDLC)
  • Threat Modelling
  • Incident Management
  • Security Monitoring and Management
  • Business continuity Development

 

Get In Touch

Erfstede 4b
3421 KH
Nieuwegein
info@intellfence.com

Security Certification Starting point

Security Certification Starting point

Start Your Information Security Career Here

 

Get Started Here With

Why Start With The CompTIA Security + Certification Training

CompTIA Security+ Special Offer

Help your employees to start working towards their Security certifications today by starting with the CompTIA Security+ training. Intellfence is offering you the opportunity to train multiple people in your organisation in the next one year for a fix price. 

About the CompTIA Security+ Certification Training

CompTIA Security + is a global certification that should be the starting point for any professional who wants to start a career in information security. It validates the baseline skills you need to perform core security functions and pursue an IT security career.

CompTIA Security+ covers network security, compliance, and operational security, cryptography, application data, and host security, threats and vulnerabilities, and identity management. This hands-on technical course is for you if your job involves securing network services, network devices, and network traffic.

The interesting thing about the Security+ certification is that it covers

Why it is important to start with Security+

The increasing dependency in computer systems and the concern for the security of data in these systems has increased the demand for security professionals in the market. Today, information security is one of the fastest developing areas within the IT field. Therefore, it is important to get involved in this fast-growing area of the industry. The right way to do this is to get the appropriate type of IT security certification.

The CompTIA Security + Certification, enable professionals to start with a good foundation into the field of information security. Having the CompTIA Security + Certification is a proof of the knowledge and skills in key security areas such as network security, compliance, operational security, various threats and vulnerability management, application security, data and hosts, efficient access control and general identity management, as well as cryptography.

The CompTIA Security + Certification helps professionals demonstrates sufficient professional knowledge of security concepts and tools, but also enables you to apply the required procedures to resolve security incidents. The CompTIA Security + certification also ensures that security personnel with this type of IT certification can anticipate security risks and respond accordingly to ensure protection.

What you will learn from Security+

The course will prepare you for the CompTIA Security+ exam, which you can take at your leisure, the exams are optional. Here are some of the key skills measured in the CompTIA Security+ certification exam:

  • Explaining the impacts and proper use of environmental controls
  • Identifying security threats and performing risk mitigation activities
  • Understanding applicable policies, laws, and regulations of IT security
  • Exemplifying the concepts of data confidentiality, integrity, and availability
  • Understanding and applying cryptography and Public Key Infrastructure (PKI)
  • Implementing and configuring a wireless network in a safe and secure manner
  • Explaining the concepts of user authentication, authorization, and access control
  • Applying and implementing secure network administration principles and procedures

The CompTIA Security+ certification preparation program certifies aptitude and proficiency in the field of access control, system security, Network Infrastructure, and organizational security.

CompTIA Security + Exam details

The CompTIA Security+ certification exam will verify the successful candidate has the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incident.

Current Exam is SY0-601

Number of Questions Maximum of 90 questions
Type of Questions Multiple choice and Performance-based
Length of Test 90 minutes
Passing Score 750 (on a scale of 100-900)
Recommended Experience CompTIA Network+ and two years of experience in IT administration with a security focus

 

What does it cost?

The Security + program is a bundled offer for companies to start training their employee as security professionals. So we have made it as affordable as possible. The more students you have to enroll the cheaper it is for you.

Please call for pricing

Sorry, no events were found.

Information Security Continuing Professional Education

Information Security Continuing Professional Education

Continuing Professional Education (CPE) Subscription

This is a one-year subscription program that provides security professionals updates on hop topics, workshop and accelerated training to participants for the duration of 12 months. 

Why the Continuing Professional Education (CPE) Program

3 hours workshop every month

Attend a monthly security events  conducted by security professionals in the field. This 3-hour program helps security professionals stay up to date with current security topics. It is also a source of knowledge exchange with other security professionals.

12 New Security Workshops Yearly

There are 12 new security workshops a year to attend. Each providing an in dept security discussion. Each event is recorded and available to you in our studenten social learning portal.

+

Earn & Track Your CPE Points

Each security workshop entitled participants to gain CPE points which can be applied to their certification CPE requirement. We keep track of all your educational activities on the portal and automatically update your CPE points. You can print out this list at the end of the year as evidence of your CEP points.

Let’s Build Something Together

We can help you and your security team stay up to date on hot security topics. The program is cost-efficient and can be provided in the morning or afternoon session. We can plan for evening sessions with sufficient participants.

The Information Security Continued Professional Education Program

Information Security professionals are overwhelmed with the fast growing pace of the technology. It is getting harder to keep up to date with the rapid development in the industry. At the same time they are expected to provide adequate services to their clients and keep their organization secure.

Certification can be great idea to gain the needed knowledge but will not provide the continued and regular update of security skills needed by the professionals.  Our Continued Professional Education Program provides in dept understanding of the new security topics and technologies as they happen.

Although, the live event is 3 hours, each workshop in the program will provide you with a day’s worth of educational materials on the subject. This includes topic documentation, additional course put together using available information from other professionals, researchers  and vendors.  This is equivalent to 12 days of training per year if you should attend the twelve events a year. 

We also provide you a free monthly “Security Notes” which is a monthly security magazine.  

Our Month Security Notes

GET IN TOUCH

“Thanks for sharing your inside knowledge about DLP.”

J.M

I would like to thank the whole team for a very informative and enjoyable training. I am also happy that I won the book, looking forward to reading it 🙂.”

H.E

Goede training over data loss prevention en/of data leakage prevention 😉.”

D.B

The Master Class: Information Security Management

The Master Class: Information Security Management

Master Class:
Information Security Management

This master class program is designed for people responsible for setting up and managing information security in organizations.  It contains deep learning in all major areas of information security management. It is indented for people who would like to go beyond the theory and be able to carry out the job in the various areas of information security management. As a bonus after the training candidate can prepare to take major information security certification exams.

What is included in the Master Class?

  • 1 x Master Class per subject area
  • 20 Webinars per year on selected information Security topics
  • 4 x One-day live security events per year
  • 1 x Yearly information security event
  • Several Continue Education Events
  • Certificate of completion is awarded at the end of every session for your CPE

What is in a Master Class Program

This Master class program is designed for security professionals who would like to gain the knowledge required to obtain multiple information security management certifications. The class is optimized to present the required knowledge to the student in a compact and straight form without redundancies.

One of the challenges of Information security management training offers today is the lack of dept and repetition of various subjects. In this program we have examined four certification programs that are geared toward the information security management professionals and compress them into the master class. By doing this we have reduced the time spent on these certifications totally with about 40%. Despite this we can go very deep in each subject and provide the students practical help on real life implementation.

How did we do this? Each of these certification programs has some unique subjects that are useful to the security professionals. However, there are also lots of recurring and redundant subjects such as Risk management, Business Continuity Planning, Incident management, cloud security, Assets management, Data classification, Networking, etc. Therefore, instead of doing these programs four times from different vendors, we have grouped them into similar topics and handle them at once going deep.

The Information Security Management Master class covers the following certification program:

  • ISC2 Certified Information Systems Security Professional (CISSP)
  • ISACA Certified Information Security Management (CISM)
  • EC Council Certified Chief Information Security Officer (CCISO)
  • ISACA Certified in Risk and Information Security Control (CRISC)

Despite the concentration of this program you will get additional support and resources to pass the associated certification exam.

After Class Instructor Support

Each Master class in supported through our online portal where instructors are available to answer students’ questions and help them with difficult challenges. The support is available throughout the duration of the master class program.

Exam Preparation

We organized Exam preparation days for those who are interested to help them prepare for the examination. There are four optional exam preparation days. One for the certification exam.

  • ISC2 Certified Information Systems Security Professional (CISSP) I day
  • ISACA Certified Information Security Management (CISM) 1 day
  • EC Council Certified Chief Information Security Officer (CCISO) 1 day
  • ISACA Certified in Risk and Information Security Control (CRISC) 1 day

Master Class Support Content

All our Master class participants can attend any of our security events during the year free. We have several security events each month specific to the Information Security Management field to provide the students with insights and in-depth discussions and workshops on related information security topics. Below are some examples of our security events:

  • How to protect against Social Engineering
  • Understand and protect the organisation from Ransomware
  • Helping the organisation with the GDPR Compliance
  • Introduction to cybersecurity
  • Implementing Mobile Device Security
  • Introduction to Cloud Security
  • The First 90 days of CISO
  • Cyber Security Risk Management
  • Building Security into Software Development
  • Threat Modelling in Software Development Life Cycle (SDLC).
  • Integrating security into Agile Software development.
  • Integrating security into DevOps
  • Understanding Zero Trust Security
  • Implementing Data Loss Prevention (DLP) Program
  • Severless Security

 

 

Cybersecurity Friday

Cybersecurity Friday

CyberSecurity
Friday

Coming soon in 2021

A weekly Information Security event to help you expand your knowledge about the Information Security world.

About The
CyberSecurity Friday

The CyberSecurity Friday is a weekly information security event that features top security professional who are willing to share their knowledge with the security community. It is an opportunity to learn from experience speakers from various areas within the cybersecurity arena. 

The event takes place every Friday in a professional setting and it is livestreamed through the Internet to all those who wants to be engaged with the development of the Cybersecurity World. 

Every Cybersecurity Friday has two speakers. One each for both the morning and the afternoon session.  Each session has a small public and provides lots of interaction with the speakers.

The sessions are recorded and also livestreamed to the public at home and at the office. We have a limited seats for those who want to participate in the live session so, reserve your seat on time.

The Cybersecurity Friday is not for selling products and not for advertising. It is purely for the sharing of knowledge and as such we don’t waste your time with sales speech and product demonstrations. At the end of the presentation the participant will have the opportunity to network and interact with each other and the speaker.

 

The Talks

The Cybersecurity Friday is about giving speakers the opportunity to share their experience from the field. It features talks from security professionals all over the world in their areas of expertise. The talks are about 40 min long and a deep dive into an important security subject. It provide an opportunity to security professionals to listen and learn from other professionals in their area of expertise.  Watch and listen to them talk about their security experience from the field.

Guest Interviews

As part of the Cybersecurity Friday we conduct interviews with our guest to answers questions from the audience during the live presentaiton. Our guests will take questions from live audience and from the livestreams. This way we can create additonal value by giving people the opportunity to engage with our speakers and have their security questions answered.

Live Security Demos

If a picture can speak a thousand words then a demonstration speaks ton of words. We encourage our speakers to show demonstration of security related solutions of how they achive certain results in the field. This is a powerful tool to help you see how others are applying security principles in real life environment.  This is effeciently done without trying to sell you any solution.

Videos From Past CyberSecurity Friday

Free Registration

It is absolutely free to attend the Cybersecurity Friday Event. We do not charge any fee to participate in the live event, but we have limited seats. So Register fast to reserve your seat.

Let us know if you want to speak at one of our Cybersecurity Friday Event!

We are constantly looking for good speakers that can provide insights in cybersecurity topics that would benefit the community. If you are such a person please contact us for a conversation.

Sponsor A Cybersecurity

Friday Event.

11 + 2 =