MAP IT Accelerator Presentation - 2023 05 02
MAP IT Accelerator Presentation - 2023 05 02
MAP IT Accelerator Presentation - 2023 05 02
INFORMATION TECHNOLOGY
The average
The average lifecycle of
Average cost of a data The average time to Personal data was ransomware payment
a breach is 280 days
breach is $3.86 million identify a breach in 2020 involved in 58% of rose 33% in 2020 over
from identification to
as of 2020 (IBM) was 207 days (IBM) breaches in 2020 (IBM) 2019, to $111,605
containment (IBM)
(FinTech News)
Employer Involvement
Customized OJT – Hands On
Related Instruction
Learn and Earn
Graduates receive nationally
recognized credential signaling
to employers that apprentices
are fully qualified
UNREGISTERED APPRENTICESHIP PROGRAM
• Completion Requirements
• 1 course
• 3 credits
• 64 hours of related instruction
• Customized OJT Course Optional Certification Eligible after Training
CIS2772C CCNA Cybersecurity Operations Certification: 200-201CBROPS / Vendor: CISCO
• Related Instruction
• CCNA Cybersecurity Operations
• Computer Forensics
• Cybersecurity Analyst
• System Security Certified Practitioner
• Ethical Hacking
Business Involvement
Structured OJT – Hands On • Completion Requirements
Related Instruction
Learn and Earn – Reward for Skills Gained • 5 courses – within 12-month period
Graduates receive nationally recognized credential and FLDOE • 15 credits
Certification signaling to employers that apprentices are fully
qualified meeting State of Florida requirements • 320 hours (64 per class)
• 2000 hours structured OJT
RELATED INSTRUCTION
Computer Forensics
Ethical Hacking
This course surveys the fundamental tenants of cybersecurity and the general
security concepts involved in maintaining a secure network computing
environment. The student explores the nature and scope of today’s
cybersecurity challenges and applies various network-defense strategies.
Detailed information about next-generation cybersecurity solutions is included,
allowing the student to deploy a variety of security methodologies,
technologies, and concepts involved in implementing a secure network
environment. The curriculum focuses on the information and skillsets required to
install, configure, and manage firewalls for defense of enterprise network
architecture. The student applies the theory and configuration steps for setting
up the security, networking, threat-prevention, logging, and reporting features
of next-generation firewall technologies.
TRAINING
APPROACH
COMPETENCY-BASED
LENGTH OF TIME
ALLOWED
AT THE DISCRETION OF
THE EMPLOYER
RAP OJT TRAINING SNAPSHOT
HOURS RELATED TECHNICAL INSTRUCTION
TERM OF 2,000 HOURS
APPRENTICES EMPLOYED
UNDER THESE STANDARDS
SHALL COMPLETE A
TRAINING MINIMUM OF 144 HOURS
TOTAL OF SUPPLEMENTAL
APPROACH INSTRUCTION IN TECHNICAL
SUBJECTS RELATED TO THE
COMPETENCY-BASED
OCCUPATION IN A 12 MONTH
PERIOD AND COMPLETE A
MINIMUM OF 2000 (1 YEAR ON
LENGTH OF TIME JOB) OF ON-THE-JOB
TRAINING HOURS
12 MONTHS
CONTINUOUS ON-THE-
JOB EMPLOYMENT
INCLUDING
PROBATIONARY PERIOD
EXAMPLE COMPETENCIES AFTER TRAINING
• Digital Investigations
• Understand the role forensics plays with incident response and threat hunting • Certified Cloud Security Professional can Identity and
• Describe the different types of investigations (law enforcement, administrative, and Access Management (IAM): Manage users and their roles
regulatory) according to a least-privilege model
• Digital Forensics • Securely manage keys, access credentials, and application
• Capture data and metadata of different file types; Understand popular file types secrets
and their formats
• Know the role Hardware Security Modules (HSM) plays for
• Acquisition of Evidence cloud environments
• Acquire forensic data from devices (computers, laptops, servers, mobile phones) • Platform-as-a-Service (PaaS) and Infrastructure-as-a-
• Acquire forensic data from virtual machines (virtualized computers) Service (IaaS): Understand the security responsibilities of
• Analysis of Evidence organizations for PaaS and laas environments
• Understanding how tools perform data carving and recovery • Network Security Monitoring (NSM) - policy violations and
• Identify common forensic tools for specific forensic acquisitions
misconfigurations and understand how to respond/mitigate
incidents originating in the cloud and when to contact cloud
• Reporting providers
• Understand the legal requirements for permissible court-related evidence •
• Demonstrate proficiency in maintaining the proper "Chain of Custody"
• Document the legal processes for securing evidence
• Understand the purpose of organization policies and consent
• Understand court processes, technical vs expert witnesses, and how to testify
EXAMPLE COMPETENCIES AFTER TRAINING (CONTINUED)
CIS2352C Ethical Hacking (RAP or $336.66 $60.00 $345.28 $741.94 $230.00 Certification: CEH / Vendor: EC-Council $971.94
URAP)
CTS2376C Firewall Services and $336.66 $60.00 $0.00 $396.66 $155.00 Certification: PCNSA or PCCET / Vendor: Palo Alto $551.66
Cybersecurity Essentials (URAP
only)
CTS2312C Certified Cloud Security $336.66 $60.00 228.56 $625.22 $581.03 Certification: CCSP / Vendor: ISC2 $1,206.25
Engineer (URAP only)
SPONSORING EMPLOYER PARTNERS
Kegel LLC
Alternative Choice Wireless
Quintanilla Consulting City of Fort Lauderdale
IT Protectorate City of Haines City
Polk State City of Sarasota
Badcock Hillsborough County BOCC
A-C-T Environmental & Sarasota Sheriffs
Infrastructure Zoom Video
City of Auburndale Communications Inc
City of Lakeland Dundee Tech Solutions
Alachua County BOCC I-Tech Support
Lake County Sheriff's Office Highlands County Clerk of
Martin County BOCC Courts
Sixth Judicial Court Publix Federal Credit Union
Air Force - Security
Operations
Alternative Choice Wireless
Florida Baptist Church of
Lake Wales
AgAmerica Lending
PROGRAM INVESTMENT:
APPRENTICESHIP
PROGRAM