SlideShare a Scribd company logo
1 of 8
© 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc.
Cybersecurity EducationalTechnology
for the Board and Business
Cyber Intelligence 4U (CIU) Overview
• Courses are based on 3 years of research with the Fortune 1000 and cyber insurance industry to
understand why businesses cannot be cyber resilient.
• Uses hands-on keyboard cybersecurity training
• 4000 graduates between 2018 and 2019
• Cybersecurity Certificate Programs fill the gaps
from non-traditional courses and prepare the
business for new cyber related roles.
• Rated #1 by students, customers and universities
Ariel Evans, Founder & CEO of CIU
Pace Program Faculty Chairperson
Ariel Evans is a cybersecurity expert, author and
creator of the program. Ariel is a serial entrepreneur
and formerly was an Acting CISO. Her book ‘Managing
Cyber Risk’ is used for our courses.
3
© 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc.
• Clients are Universities and Corporations
Our Customers-Over 4,000 Graduates
4
© 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc.
The CIU Difference
Addressing Emerging Business Needs
We increase the cyber resiliency of the organization by increasing cyber
knowledge and training for new roles in the digital cyber ecosystem.
Tailored Education- University Certification
University certifications for each course. Courses can be tailored to a
company’s specific requirements. We update materials annually to
ensure they are relevant.
Hands OnTraining Platform - Can Use Live Data
We provide a cybersecurity risk management platform ‘VRisk’ for risk
and strategy training that can use dummy or actual live data that is
highly secured and provisioned only for each customer’s use.
TechnicalTraining - GamifiedCybersecurity Platform
Our gamified platform features over 100 gamified cybersecurity
training challenges. Duration and location of challenges vary in order to
provide your organization various options for training.
“I enjoyed and learned a lot, even after 25 years in the
industry.”
- Edward J Lopez, Verizon Enterprise Program
“I greatly enjoyed the Rutgers Enterprise Certificate
curriculum and I’m more empowered than ever in the
cybersecurity solutions space as part if my arsenal at
Verizon BusinessGroup!”
-Kimberly Powell, Verizon Enterprise Program
“We learned real life examples and how to apply those
concepts to what we do everyday.The opportunities for
jobs in this field are amazing.”
- Renee Nocker, Metlife Rutgers Program
“What I liked the most was the passion and experience
every one of the instructors brought to the classroom”
- Anwar Dyer, Hosting.com Rutgers Program
5
© 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc.
Cybersecurity Certification Offerings
Cybersecurity Business Courses CybersecurityTechnical Courses
EnterpriseCybersecurity Intensive GamifiedOffensive and Defensive Cybersecurity Programs
• •
•
•
Foundational cybersecurity from the business
perspective
Challenge based learning across 6 domains
Benchmark and improve cyber skills
Mentor based Online or 6 month In-person
Digital AssetCyber Risk Intensive IDSTuning (Jun 1)
How to build countermeasures against modern exfiltration
techniques
Remote Files &Vulnerabilities (Jun 1)
Attacks on mis-configurations in web app-based software and
how to prevent them
NIST/NICE workforce challenges (Jun 1)
• Risk metrics and KPIs for cybersecurity reporting and
analysis
ExecutiveCybersecurity Intensive
• Cyber risk metrics and KPIs for boards
•CybersecuritySalesAssociate Program 100 gamified challenges mapped to NIST NICE Roles
CyberSkill Events• Customized course modules to fit your organization’s
needs/offerings •
•
Capture the Flag
All for All
9
© 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc.
PlannedCybersecurityCertification Offerings (Available Sep 15)
Cybersecurity Buisness Courses Cybersecurity Professional Courses
• VendorCyber Risk Management Program • CloudSecurity
• MobileSecurity
Courses by Role
11
© 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc.
The Future of Cyber Intelligence 4U and Cyber Education
• Companies must fill business roles for Board Reporting - Chief Digital Asset Officer, Cyber Risk Managers
• Staff shortages in U.S. over 2 million – CIU helps you to move IT staff into Cybersecurity Technical Roles
• Certificate programs are focused, can be tailored and are effective
• Courses are available In-Person and On-line
• Scaling by adding new Universities globally
3
© 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc.
• The ONLY courses that offer Hands-on Training using state-of-the-art Educational Cybersecurity Software
© 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc.
Ariel Evans, CEO & Founder
Ariel@cyberintelu.com
US: +1-610-334-6914
Israel: +972-58-412-0028

More Related Content

What's hot

CHFI Certification
CHFI CertificationCHFI Certification
CHFI CertificationSagarNegi10
 
How To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and MetricsHow To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and MetricsTerranova Security
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeMercury Solutions Limited
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecuritylfh663
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001kmperkins85
 
Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Security Innovation
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On InternetAna Meskovska
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersSynopsys Software Integrity Group
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Servicesxband
 
Security Digital Connect
Security Digital ConnectSecurity Digital Connect
Security Digital ConnectGrafic.guru
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberWilliam McBorrough
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015Ollie Whitehouse
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsMercury Solutions Limited
 

What's hot (20)

CHFI Certification
CHFI CertificationCHFI Certification
CHFI Certification
 
How To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and MetricsHow To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and Metrics
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First Time
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001
 
Cybersecurity Essentials - Certification
Cybersecurity Essentials - CertificationCybersecurity Essentials - Certification
Cybersecurity Essentials - Certification
 
Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Security Digital Connect
Security Digital ConnectSecurity Digital Connect
Security Digital Connect
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability FeedWebinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability Feed
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 

Similar to Cyber intelligence 4 u overview for slideshare

CodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free WorldCodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free WorldFerdinand Kjærulff
 
Cybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdfCybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdfFrancescoMifsud1
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Companykeshavsecurium
 
Best Vapt Security Company Securium Solu
Best Vapt Security Company Securium SoluBest Vapt Security Company Securium Solu
Best Vapt Security Company Securium Solukeshavsecurium
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationKoenig Solutions Ltd.
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Skillogic Solutions
 
SpireTec Solutions - ppt (1).pdf
SpireTec Solutions - ppt (1).pdfSpireTec Solutions - ppt (1).pdf
SpireTec Solutions - ppt (1).pdfDigitalberge .
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Skillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Skillogic Solutions
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad JanuarySkillogic Solutions
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxSkillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Skillogic Solutions
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Skillogic Solutions
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxinfosec train
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Skillogic Solutions
 

Similar to Cyber intelligence 4 u overview for slideshare (20)

CodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free WorldCodersTrust - Defend and Protect the Free World
CodersTrust - Defend and Protect the Free World
 
Cybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdfCybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdf
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
 
Securim Solutions Pvt Ltd
Securim Solutions Pvt LtdSecurim Solutions Pvt Ltd
Securim Solutions Pvt Ltd
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Company
 
Best Vapt Security Company Securium Solu
Best Vapt Security Company Securium SoluBest Vapt Security Company Securium Solu
Best Vapt Security Company Securium Solu
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
SpireTec Solutions - ppt (1).pdf
SpireTec Solutions - ppt (1).pdfSpireTec Solutions - ppt (1).pdf
SpireTec Solutions - ppt (1).pdf
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad January
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptx
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptx
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 

Recently uploaded

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 

Recently uploaded (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Cyber intelligence 4 u overview for slideshare

  • 1. © 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc. Cybersecurity EducationalTechnology for the Board and Business
  • 2. Cyber Intelligence 4U (CIU) Overview • Courses are based on 3 years of research with the Fortune 1000 and cyber insurance industry to understand why businesses cannot be cyber resilient. • Uses hands-on keyboard cybersecurity training • 4000 graduates between 2018 and 2019 • Cybersecurity Certificate Programs fill the gaps from non-traditional courses and prepare the business for new cyber related roles. • Rated #1 by students, customers and universities Ariel Evans, Founder & CEO of CIU Pace Program Faculty Chairperson Ariel Evans is a cybersecurity expert, author and creator of the program. Ariel is a serial entrepreneur and formerly was an Acting CISO. Her book ‘Managing Cyber Risk’ is used for our courses. 3 © 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc. • Clients are Universities and Corporations
  • 3. Our Customers-Over 4,000 Graduates 4 © 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc.
  • 4. The CIU Difference Addressing Emerging Business Needs We increase the cyber resiliency of the organization by increasing cyber knowledge and training for new roles in the digital cyber ecosystem. Tailored Education- University Certification University certifications for each course. Courses can be tailored to a company’s specific requirements. We update materials annually to ensure they are relevant. Hands OnTraining Platform - Can Use Live Data We provide a cybersecurity risk management platform ‘VRisk’ for risk and strategy training that can use dummy or actual live data that is highly secured and provisioned only for each customer’s use. TechnicalTraining - GamifiedCybersecurity Platform Our gamified platform features over 100 gamified cybersecurity training challenges. Duration and location of challenges vary in order to provide your organization various options for training. “I enjoyed and learned a lot, even after 25 years in the industry.” - Edward J Lopez, Verizon Enterprise Program “I greatly enjoyed the Rutgers Enterprise Certificate curriculum and I’m more empowered than ever in the cybersecurity solutions space as part if my arsenal at Verizon BusinessGroup!” -Kimberly Powell, Verizon Enterprise Program “We learned real life examples and how to apply those concepts to what we do everyday.The opportunities for jobs in this field are amazing.” - Renee Nocker, Metlife Rutgers Program “What I liked the most was the passion and experience every one of the instructors brought to the classroom” - Anwar Dyer, Hosting.com Rutgers Program 5 © 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc.
  • 5. Cybersecurity Certification Offerings Cybersecurity Business Courses CybersecurityTechnical Courses EnterpriseCybersecurity Intensive GamifiedOffensive and Defensive Cybersecurity Programs • • • • Foundational cybersecurity from the business perspective Challenge based learning across 6 domains Benchmark and improve cyber skills Mentor based Online or 6 month In-person Digital AssetCyber Risk Intensive IDSTuning (Jun 1) How to build countermeasures against modern exfiltration techniques Remote Files &Vulnerabilities (Jun 1) Attacks on mis-configurations in web app-based software and how to prevent them NIST/NICE workforce challenges (Jun 1) • Risk metrics and KPIs for cybersecurity reporting and analysis ExecutiveCybersecurity Intensive • Cyber risk metrics and KPIs for boards •CybersecuritySalesAssociate Program 100 gamified challenges mapped to NIST NICE Roles CyberSkill Events• Customized course modules to fit your organization’s needs/offerings • • Capture the Flag All for All 9 © 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc. PlannedCybersecurityCertification Offerings (Available Sep 15) Cybersecurity Buisness Courses Cybersecurity Professional Courses • VendorCyber Risk Management Program • CloudSecurity • MobileSecurity
  • 6. Courses by Role 11 © 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc.
  • 7. The Future of Cyber Intelligence 4U and Cyber Education • Companies must fill business roles for Board Reporting - Chief Digital Asset Officer, Cyber Risk Managers • Staff shortages in U.S. over 2 million – CIU helps you to move IT staff into Cybersecurity Technical Roles • Certificate programs are focused, can be tailored and are effective • Courses are available In-Person and On-line • Scaling by adding new Universities globally 3 © 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc. • The ONLY courses that offer Hands-on Training using state-of-the-art Educational Cybersecurity Software
  • 8. © 2020 Cyber Intelligence 4U, Inc. All rights reserved. No copying or other distribution of these materials is permitted without prior written authorization from Cyber Intelligence 4U, Inc. Ariel Evans, CEO & Founder Ariel@cyberintelu.com US: +1-610-334-6914 Israel: +972-58-412-0028