"There's no silver bullet solution with cyber security, a layered defense is the only viable defense" - James Scott, | Institute for Critical Infrastructure Technology


All time zones are listed as CST!


Join us for a series of CyberSecurity seminars, presented by industry experts and top trainers from New Horizons Computer Learning Centers.  As more and more confidential information is stored and processed electronically, the risk of unauthorized access is on the rise. Data breaches and attacks make protection critical.  Join us for a day of seminars on CyberSecurity best practices for your organization.

8:30am - 9:30am CST: The Five Step Risk Assessment
Even the most educated CEOs and CFOs often view the IT Department as simply a cost center. The concept of security being a cyclical process can be a foreign concept to many that are not in the technology field. It takes time and energy to re-evaluate the vulnerabilities, risks, and potential threats that can devastate an organization’s data security. In order to stay apprised of the latest methodologies of hackers, it also takes continual education. This webinar will focus on the Five Step Risk Assessment and its importance in maintaining a secure, regulatory-compliant network, as well as how important it is to convince upper management that security is a cyclical process, but well-worth continual investment.
9:45am - 10:45am CST: IT Security: An Introduction to Hashing and Encryption
Technologies that were once known by only a handful of professionals have found their way onto the front pages of today's headlines. If you are confused and confounded by the assortment of acronyms and security technologies used and written about, join us for a look at two of the most important ones - hashing and encryption. This session serves as a kind of secret decoder ring for understanding how they work and what they are used for.
11:00am - 12:00pm CST: Escaping the Cybersecurity Matrix: Red Pill or Blue Pill?
Over this past year, Dr. James Stanger has consulted with IT pros and management worldwide about pen testing and cybersecurity analytics. He’s noticed two common threads in his conversations. The first is that cybersecurity professionals and executive managers continue to struggle with defining useful metrics for improving cybersecurity. Join James to learn about these two issues, how it’s time for a fundamental shift in the network security mindset. Ever wonder why so few useful security metrics exist? Then join James to discuss mindsets, practical tools, mappings, indicators, and approaches for creating useful security metrics that will get you out of the cybersecurity matrix.
12:15pm - 1:15pm CST: What to expect with the New CEH Practical Test
EC-Council has added a practical examination to their Certified Ethical Hacker certification, which will test your understanding of how to prepare for, and prevent, hackers from infiltrating a network. This presentation will help you understand what to expect, as well as which penetration testing tools to focus on when preparing for the CEH Practical Exam.
1:30pm - 2:30pm CST: Overview of Cisco's CCNA Cyber Ops Certification
With the ever increasing amount of cyberattacks faced by businesses on a daily basis, there is a need for quick detection and response to protect sensitive data. To meet the challenge of preparing front-line network cyberattack defenders, Cisco has created the CCNA CyberOps certification track. Join us for an overview of the new CCNA CyberOps curriculum (SECFND and SECOPS) and the associated exams needed for certification.
2:45pm - 3:45pm CST: Intelligent CyberSecurity with Microsoft 365
When you think of cyber security, what comes to mind? How do you automate and scale to protect your organization against today’s advanced threats? Join us as we discuss Microsoft 365 and how Microsoft enables you with the intelligence you need to protect, detect, and respond to the challenging cyber security landscape. You will learn about the Microsoft security story, and how solutions across Identity & Access Management, Information Protection and Threat Protection can help you solve real business problems – and look like a rock star. You will also see real world demonstrations of key scenarios such as email phishing, and protecting third party SaaS applications.
4pm - 5pm CST: Securing Routing Protocols
Protecting routing tables is of paramount importance because routing is the core of any enterprise network--without solid and accurate routing tables traffic goes nowhere. Routing protocols (i.e.: OSPF, EIGRP, RIP, IS-IS, and BGP), while helpful, can be a vector for corrupting our routing tables. In this session you will learn different ways to protect your routing tables from corruption when you use a routing protocol. Additionally, you will learn how to lock down OSPF specifically, using basic defenses such as passive interfaces to more advanced routing protocol authentication options. We will look at this from both the IPv4 and IPv6 environments.
Enroll in a CyberSecurity Class

In this course, students will implement, monitor, and troubleshoot infrastructure, application, information, and operational security. Students will prepare for the CompTIA Security+ certification examination (SY0-501)

This course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.

The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

Enroll in a Cloud & the IoT Class

This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 6.7...

This course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career.

Students will weigh the pros and cons of cloud computing to make effective decisions and meet IT challenges.