CyberSecurityPM™ Cyber Security Project Manager™

Register, Payment, Schedule of Classes

CyberSecurityPM™ Cyber Security Project Manager™ is the leading credential certification program for Cyber Security Program Managers, Cyber Security Project Managers, Cyber Security Officers, Cyber Security Engineers, IT Managers, Cyber Security Leads and  for anyone working on Cyber Security across industry and government.

CyberSecurityPM™ Schedule of Classes

Cyber Security PM™ (Cyber Security Project Manager™) Certification –

Cyber Security PM™ PARTICIPANTS COME FROM ALL GLOBAL FIRMS & GOVERNMENTS: US Federal Government Agencies, Department of Defense (DoD), BOEING, Lockheed Martin, United Technologies, GE Aviation, IBM, and Hewlett Packard to name a few

PDUs: Completion of Cyber Security PM™ certification is 60 Professional Development Units (PDUs)
WHO MAY APPLY: All Information Technology (IT) & Cyber Security Project Managers, IT Project Managers, Engineers, Senior Managers, Project Managers, Cyber Security Analysts, and Managers who work across all industries, firms and governments globally
DURATION: 3 Days
PRICE PER PARTICIPANT: $4,999 (US)
Registration, Payment & Schedule of Classes

REGISTRATION STEP 1:

DOWNLOAD CyberSecurityPM CERTIFICATION APPLICATION AND EVMI  AFFIDAVIT OF IDENTITY FORMS HERE:

CyberSecurityPM_FactSheet

CyberSecurityPM_Application_Form

EVMI_Affidavit_of_Identity_Form-3

REGISTRATION STEP 2:

FOR ONLINE PARTICIPANTS:

EMAIL  (1) YOUR COMPLETED AND SIGNED CYBER SECURITY PM™ CERTIFICATION APPLICATION; (2) EVMI AFFIDAVIT OF IDENTITY FORMS;  (3) TWO 2×2PASSPORT SIZED PICTURES IN .jpeg FORMAT AND (4) YOUR MOST RECENT RESUME TO EMAIL ADDRESS TO: certification@evmi.com

FOR PUBLIC SITE & ONSITE/CLIENT SITE PARTICIPANTS:

EMAIL  YOUR COMPLETED AND SIGNED CYBER SECURITY PM™ APPLICATION FORM AND SEND ALONG WITH TWO 2×2PASSPORT SIZED PICTURES IN .jpeg FORMAT AND YOUR MOST RECENT RESUME TO EMAIL ADDRESS:

 

REGISTRATION STEP 3

PRICE PER ONE PARTICIPANT IS: $4,999 (US)

***MAKE YOUR PAYMENT OF $4,999  VIA PAYPAL SECURE PAYMENT GATEWAY BY CLICKING ON PAYPAL BUTTON BELOW:

ANNOUNCEMENT FOR 2019 APPLICANTS:

Beginning 1st January 2019, the CyberSecurityPM credential certification program will require 20 participants per each group. Companies will be required to sponsor training of 20 participants per group as all case studies will require 20 participants to complete. The minimum class size for CyberSecurityPM credential certification will be 20 and the maximum class size will be 1,000 participants (that is 50 groups of 20 participants).

2018 DATES/CALENDAR/SCHEDULE OF CLASSES –
OCTOBER 2018 – LOCATION: ONLINE WITH LIVE INSTRUCTOR

(USA/CANADA)

OCTOBER 1 – 3, 2018        9.00 AM to 4.00 PM (E.S.T)

ADDITIONAL NOTES:

(This class is currently full and registration is closed). 

NOVEMBER  2018 – LOCATION: ONLINE WITH LIVE INSTRUCTOR

(USA/CANADA)

NOVEMBER 12 – 14, 2018      

9.00 AM to 4.00 PM (E.S.T) (E.S.T)

ADDITIONAL NOTES:

(This class is open and accepting applications). 

NOVEMBER  2018 – LOCATION: ONLINE WITH LIVE INSTRUCTOR

(MIDDLE-EAST: QATAR, OMAN, SAUDI ARABIA, KUWAIT, UAE (DUBAI)

Calendar & Schedule Of Classes (MIDDLE-EAST):

Dates: 12 – 14 November 2018

Starts: 9.00 AM  Ends: 4.00 PM (Local Time in MUSCAT, Oman) | Online & Interactive with Live Instructor |

Starts: 9.00 AM  Ends: 4.00 PM (Local Time in DUBAI, UAE) | Online & Interactive with Live Instructor |

Starts: 8.00 AM  Ends: 3.00 PM (Local Time in DOHA, Qatar ) |Online & Interactive with Live Instructor |

Starts: 8.00 AM  Ends: 3.00 PM (Local Time in RIYADH, Saudi Arabia) | Online & Interactive with Live Instructor |

Starts: 8.00 AM  Ends: 3.00 PM (Local Time in KUWAIT CITY, Kuwait) |Online & Interactive with Live Instructor |

DECEMBER  2018 – LOCATION: ONLINE WITH LIVE INSTRUCTOR

(USA/CANADA)

DECEMBER 10 – 12, 2018      

9.00 AM to 4.00 PM (E.S.T) (E.S.T)

ADDITIONAL NOTES:

(This class is open and accepting applications). 

 

 

ADDITIONAL INFORMATION: ONSITE LOCATION: Onsite/Client Site Training Requires Minimum of 50 Registered Participants Per Seating in USA/Canada
 CyberSecurityPM™ (Cyber Security Project Manager™) is a trademark of EVMi® Earned Value Management Institute® in the USA and internationally and fully protected under International Trademark and Copyrights Treaties and Laws among nations

About

Introduction & Objectives

CyberSecurityPM™ (Cyber Security Project Manager™) CREDENTIAL CERTIFICATION PROGRAM OBJECTIVES

EVMI provides cutting edge and state of the art education in the areas of Cyber Security Project Management and managing Cyber Security & IT Security projects effectively and efficiently.

CyberSecurityPM™ (Cyber Security Project Manager™) is the leading credential certification program for Cyber Security Program Managers, Cyber Security Project Managers, Cyber Security Officers, Cyber Security Engineers, IT Managers, Cyber Security Leads and  for anyone working on Cyber Security across industry and government.

The CyberSecurityPM™ (Cyber Security Project Manager™) program is aimed at the present and next generation of government and private sector Cyber Security leaders and managers working for dynamic global companies and firms; international organizations and institutions; and government agencies/departments/ministries who need to broaden their horizons in the field and dimensions of Cyber Security Executive Management, Cyber Security Policy Formulation, Cyber Security Project Management and Cyber Security Execution and enhance their prospects of achieving successful cyber  security implementation and threats reductions.

Overview

The CyberSecurityPM™ (Cyber Security Project Manager™) functions cuts across all functions and roles and responsibilities in Cyber Security. From the CISO to the Cryptographer, everyone who works on the Cyber Security team must be fully aware and understand the dimensions and intricacies of IT Project Management in successful Cyber Security execution and implementation, and must be be willing to always collaborate and work as a team to be able to minimize the risks and threats of the  never ending daily colossal cyber attacks across the globe today.


Completion of “My Cyber Security PM™ Strategy Play Book” Requirement:

All CyberSecurityPM™ certification participants are required to attend the 3 day intensive training class which comprises of ten modules. All Participants are required to complete and submit their ten exercises for the development of their “My CyberSecurityPM™ Strategy Play Book” 24 hours after the 3 day class.

A grade of 80% is required to pass and obtain CyberSecurityPM™ certification. All Participants must complete and submit their exercises by the end of Day 3.

Completion of the CyberSecurityPM™ certification culminates in the application of all areas of Cyber Security Project Management benchmarks on a Cyber Security projects. All Participants will be given all templates and forms required to prepare and submit their “My CyberSecurityPM™ Strategy Play Book” deliverable.

PDUs:

The total Professional Development Units (PDUs) awarded for CyberSecurityPM™ course completion is 60.

Most functions, roles and job titles in the Cyber security sector often involve somewhat overlapping responsibilities, and can be broad or specialized depending on the size and special needs of the organization, however, CyberSecurityPM™ (Cyber Security Project Manager™) is required for everyone working on the Cyber Security team. Typical job titles in Cyber Security include:  Cyber security analyst, Cyber security engineer, Cyber security administrator, Cyber security architect, Cyber security specialist, and Cyber security consultant.

Cyber Security Industry Career Prospects:

Participants who complete our CyberSecurityPM™ (Cyber Security Project Manager™) certification program will have a highly in demand and highly lucrative job market available to them, and will be qualified to occupy nearly all of the roles described further below in this page. CyberSecurityPM™ (Cyber Security Project Manager™) certification benefits cuts all the functional areas in Cyber Security.

To better describe the scope of those positions, employers often precede the above titles with qualifying terms like “cyber”, “information”, “computer”, “network”, “IT”, and “applications”. This results in fuller job titles such as IT security engineer, information security analyst, network security administrator, IT security consultant, and so on.

Special variations of some of the titles are sometimes preferred, such as information assurance analyst, and security software developer. Also, some security jobs are even more specialized, such as cryptographer, intrusion detection specialist, computer security incident responder, and so on.

Additional terms are sometimes used to convey rank, such as senior IT security consultant, and chief information security officer. Graduates of the new program will normally qualify for such high ranks after several years of on-the-job experience.

As the Cyber security domain expands and develops further, new roles and titles are likely to emerge, and the roles attributed to the current titles will likely crystallize or evolve. For now, the following is a good description of the various security job titles and roles employed by the private and public sectors.

Key Cyber Security Roles and Job Functions

  • Cyber Security Project Manager: manages the life cycle project management of Cyber Security projects
  • Security Analyst: analyzes and assesses vulnerabilities in the infrastructure (software, hardware, networks), investigates available tools and countermeasures to remedy the detected vulnerabilities, and recommends solutions and best practices. Analyzes and assesses damage to the data/infrastructure as a result of security incidents, examines available recovery tools and processes, and recommends solutions. Tests for compliance with security policies and procedures. May assist in the creation, implementation, and/or management of security solutions.
  • Security Engineer: Performs security monitoring, security and data/logs analysis, and forensic analysis, to detect security incidents, and mounts incident response. Investigates and utilizes new technologies and processes to enhance security capabilities and implement improvements.
  • Security Architect: Designs a security system or major components of a security system, and may head a security design team building a new security system.
  • Security Administrator: Installs and manages organization-wide security systems. May also take on some of the tasks of a security analyst in smaller organizations.
  • Security Software Developer: Develops security software, including tools for monitoring, traffic analysis, intrusion detection, virus/spyware/malware detection, anti-virus software, and so on. Also integrates/implements security into applications software.
  • Cryptographer/Cryptologist: Uses encryption to secure information or to build security software. Also works as researcher to develop stronger encryption algorithms.
  • Cryptanalyst: Analyzes encrypted information to break the code/cipher or to determine the purpose of malicious software.
  • Security Consultant/Specialist: Broad titles that encompass any one or all of the other roles/titles, tasked with protecting computers, networks, software, data, and/or information systems against viruses, worms, spyware, malware, intrusion detection, unauthorized access, denial-of-service attacks, and an ever increasing list of attacks by hackers acting as individuals or as part of organized crime or foreign governments.
  • Chief Information Security Officer (CISO): a high-level management position responsible for the entire information security division/staff. The position may include hands-on technical work.

Very Specialized Roles:

  • Intrusion Detection Specialist: Monitors networks, computers, and applications in large organizations, looking for events and traffic indicators that signal intrusion. Determines the damage caused by detected intrusions, identifies how an intrusion occurred, and recommends safeguards against similar intrusions. Also does penetration testing to identify vulnerabilities and recommend safeguards as preemptive measures.
  • Computer Security Incident Responder: A member of team that prepares for and mounts rapid response to security threats and attacks such as viruses and denial-of-service attacks.
  • Source Code Auditor: Reviews software source code to identify potential security issues and vulnerabilities that could be exploited by hackers to gain unauthorized access to data and system resources.
  • Virus Technician: analyzes newly discovered computer viruses, and designs and develops software to defend against them.
  • Penetration Tester (also known as Ethical Hacker or Assurance Validator): Not only scans for and identifies vulnerabilities, but exploits them to provide hard evidence that they are vulnerabilities. When penetration-testing, large infrastructures such as power grids, utility systems, and nuclear facilities, large teams of penetration testers, called Red Teams, are employed.
  • Vulnerability Assessor: Scans for, identifies and assesses vulnerabilities in IT systems including computers, networks, software systems, information systems, and applications software.

Typical Employers of Cyber Security PM™ Graduates:

All organizations and firms across the globe, some of which are:

  • Technology and Internet companies
  • Security software companies
  • Defense companies
  • Many government departments and defense/intelligence agencies
  • Many IT companies, and IT divisions of companies in many industry sectors
  • The E-Commerce sector
  • Banks, financial firms, credit card companies
  • And much more

EVMI and Cyber Security Global training programs offers program participants with 3 days of intensive level training in areas of Cyber Security, Cyber Security Project Management, Cyber Security Project Control and Cyber Security Systems Engineering

The CyberSecurityPM™ (Cyber Security Project Manager™)  training program offers the participant with 3 days of intensive level training in areas of Cyber Security Project management and Project Control.

CyberSecurityPM™ (Cyber Security Project Manager™) is a trademark of EVMi® Earned Value Management Institute® in the USA and internationally and fully protected under International Trademark and Copyrights Treaties and Laws among nations

Requirements

CyberSecurityPM™ (Cyber Security Project Manager™) CREDENTIAL CERTIFICATION REQUIREMENTS PROCESS:

The prospective CyberSecurityPM™ (Cyber Security Project Manager™) applicant shall typically have a Bachelor’s Degree or Master’s Degree with four or more years of Information Technology industry work related experience preferably in project controls, program management, project management; management, financial management, accounting, business management, business, analysis, information technology, engineering (all disciplines), contracts, procurement, acquisitions, or Earned Value Management (EVM).

CyberSecurityPM™ (Cyber Security Project Manager™) is a trademark of EVMi® Earned Value Management Institute® in the USA and internationally and fully protected under International Trademark and Copyrights Treaties and Laws among nations

Outline

Program Modules covered :

The 3 day CyberSecurityPM™ (Cyber Security Project Manager™) certification class comprises of ten modules, which are:

(1), CyberSecurityPM™ (Cyber Security Project Manager™) Module 1a – Cyber Security Fundamentals & Foundations.

CyberSecurityPM™ (Cyber Security Project Manager™) Module 1b– Emerging Global Cyber Security Threats and Prevention

(2), CyberSecurityPM™ (Cyber Security Project Manager™) Module 2 – Cyber Security Project Management Strategy, Leadership, Assignment of Team Functions,  and Cyber Security Ethics and Professional Responsibility.

(3), ICyberSecurityPM™ (Cyber Security Project Manager™) Module 3 – Cyber Security Project Organization, Work Authorization and CSATOM™ (Cyber Security Accountability, Transparency & Oversight Matrix™)

(4), CyberSecurityPM™ (Cyber Security Project Manager™) Module 4 – Cyber Security Project Scope Management, Planning and Scheduling

(5),CyberSecurityPM™ (Cyber Security Project Manager™) Module 5 – Cyber Security Project Estimating, Cost, Budgeting & Setting Up Control Accounts for Cyber Security Projects

(6), CyberSecurityPM™ (Cyber Security Project Manager™) Module 6 – Setting Up Cyber Security Earned Value Management, Project Control,  and EIA 748-C Earned Value Management (EVM) Industry Standards for Cyber Projects

(7), CyberSecurityPM™ (Cyber Security Project Manager™) Module 7 – Cyber Security Project Risk Control & Cyber Risks, Threats & Vulnerabilities

(8), CyberSecurityPM™ (Cyber Security Project Manager™) Module 8 – Cyber Security Project Quality Control & Quality Managemnet

(9), CyberSecurityPM™ (Cyber Security Project Manager™) Module 9 – Cyber Security Project Communications Management

(10), CyberSecurityPM™ (Cyber Security Project Manager™)™ Module 10  – Cyber Security Project Procurement Management

 

Completion of “CyberSecurityPM™ Strategy Play Book” Requirement:

All CyberSecurityPM™ certification participants are required to attend the 3 day training class which comprises of ten modules. All Participants are required to complete and submit their ten exercises for the development of their “My CyberSecurityPM™ Strategy Play Book” 24 hours after class completion.

A grade of 80% is required to pass and obtain CyberSecurityPM™ certification. All Participants must complete and submit their exercises 24 hours after class completion.

Completion of the CyberSecurityPM™ (Cyber Security Project Manager™) certification culminates in the application of all areas of Cyber Security Project Management and Project Control benchmarks on Cyber Security projects. All Participants will be given all templates and forms required to prepare and submit their “My CyberSecurityPM Strategy Play Book” deliverable.

The total Professional Development Units (PDUs) awarded for ITPM-Cyber Security™ course completion is 60.

Most functions, roles and job titles in the Cyber security sector often involve somewhat overlapping responsibilities, and can be broad or specialized depending on the size and special needs of the organization, however, CyberSecurityPM™ (Cyber Security Project Manager™) is required for everyone working on the Cyber Security team. Typical job titles in Cyber Security include:  Cyber security analyst, Cyber security engineer, Cyber security administrator, Cyber security architect, Cyber security specialist, and Cyber security consultant.

CyberSecurityPM™ (Cyber Security Project Manager™) PROFESSIONAL DEVELOPMENT UNITS (PDUs):

60 Professional Development Units (PDUs) is awarded upon completion of the CyberSecurityPM™ (Cyber Security Project Manager™) program

CyberSecurityPM™ (Cyber Security Project Manager™) is a trademark of EVMi® Earned Value Management Institute® in the USA and internationally and fully protected under International Trademark and Copyrights Treaties and Laws among nations

Who Should Apply

The CyberSecurityPM™ (Cyber Security Project Manager™) credential certification is ideal and widely used by Information Technology Project Control Officers (ITPCOs), Information Technology Project Control Professionals (ITPCPs), Information Technology Senior Project Managers, Information Technology Senior Managers, Information Technology Managers, Information Technology Engineers, Information Technology Senior Program Managers, Information Technology Head of Finance Department; Chief Project Officer; Chief Procurement Officer; and Program Managers.

Suitability – Who should attend?

The CyberSecurityPM™ (Cyber Security Project Manager™) program is suitable for a wide range of professional functions across the Information Technology industry, notably in Cyber Security:

Information Technology Project Managers
Information Technology Operations Managers
Information Technology Executive Directors
Information Technology General Managers
Information Technology Finance Managers
Information Technology Divisional Heads
Information Technology Head of Training
Information Technology Head of Human Resources
Information Technology Area Managers
Information Technology Project Directors
Information Technology Project Engineers
Information Technology Production Engineers
Information Technology Planning Coordinators
Information Technology Project Leaders
Information Technology Team Leaders
Information Technology Supervisors
Information Technology Procurement Managers
Information Technology Risk Managers

Anyone who is involved in managing Information Technology projects and seeks or wishes to enhance and increase their Information Technology project management and Information Technology Technical and Management skills

CyberSecurityPM™ (Cyber Security Project Manager™) is a trademark of EVMi® Earned Value Management Institute® in the USA and internationally and fully protected under International Trademark and Copyrights Treaties and Laws among nations

 

Participant Mix

A typical CyberSecurityPM™ (Cyber Security Project Manager™) class included Information Technology Senior Project Managers, Information Technology Project Managers, Information Technology Project Control Officers (ITPCOs), Information Technology Project Control Professionals (ITPCPs), Information Technology Senior Managers, Managers, Information Technology Senior Program Managers, Head of Finance Department; Chief Project Officer; Chief Procurement Officer; and Program Managers who work across the Information Technology industry and government.

CyberSecurityPM™ (Cyber Security Project Manager™) is a trademark of EVMi® Earned Value Management Institute® in the USA and internationally and fully protected under International Trademark and Copyrights Treaties and Laws among nations

Testimonials

For testimonials, please visit: www.evmi.com/testimonials-page

CyberSecurityPM™ (Cyber Security Project Manager™) is a trademark of EVMi® Earned Value Management Institute® in the USA and internationally and fully protected under International Trademark and Copyrights Treaties and Laws among nations

Faculty

ALL CyberSecurityPM™ (Cyber Security Project Manager™) CREDENTIAL CERTIFICATION INSTRUCTORS:

(1) Have a Master Of Science (MS) Degree in Project Management; Master Of Science (MS) Degree in Engineering (Electrical, Civil, Chemical, Petroleum, Petrochemical, Computer, Mechanical, Aeronautical, Software)’; MS Degree in Economics (Information Technology Economics); MS Degree in Computer Science Or Information Technology; Masters of Business Administration (MBA); or Phd or DSc in related field
(2) Are EVMP® Earned Value Management Professional® Certified from EVMI®; or ITPM™ INFORMATION TECHNOLOGY PROJECT MANAGER™ Certified
(3) Have Over Fifteen Years of Earned Value Management (EVM), Project Controls and Project Management Experience in Industry Or Government Or Both;
(4) Have Implemented Several EIA 748-C Compliant and DCMA Compliant Earned Value Management Systems (EVMS) On Very Large, Complex and High Dollar (multimillion/multibillion valued) Programs and Projects;
(5) Have Taught or Teach In Graduate Programs In Accredited Universities and or at Community Colleges in the USA and abroad

CyberSecurityPM™ (Cyber Security Project Manager™) is a trademark of EVMi® Earned Value Management Institute® in the USA and internationally and fully protected under International Trademark and Copyrights Treaties and Laws among nations