Phase2 Advantage: Cyber Security Certification Courses

Our Training Philosophy

Phase2 Advantage: Training Philosophy

Certifying organizations do an outstanding job of providing students attending courses with information they should know to pass a certification exam. Additionally, these organizations strive to ensure their students obtain a measure of subject matter expertise within the discipline they’re presenting.

However, many students have difficulty applying textbook knowledge presented in lectures to the real-world environments they operate in daily. This holds true even when certification courses include preformatted labs. While they provide a measure of “hands on” training, they tend to be very specific and task-oriented and tend not to address the broader base of potential application of the knowledge.

Our experience has reinforced a recognition that this “Theory vs. Reality” disconnect exists on a wide scale, and our training philosophy has been developed to acknowledge this disconnect and bridge this gap when possible.  In response to this reality, our instructors include dozens of training hours above and beyond that which would be required to successfully pass the certification exam.

A significant portion of that additional training occurs outside the classroom.  Our training facility at Coastal Regional Commission ranges from Data Centers and Geographic Information Systems, to Fleet Transportation and Executive Administration offices. Students work in groups to conduct interviews with CRC leadership, analyze all information gathered, and generate solutions to technical and non-technical challenges as a team.

Consider the following example from our IT Business Continuity and Disaster Response training program, just one of the more than 20 certification courses taught at our training facility.

Did You Know?

1) Taking time to create IT Asset Resource Profiles during Disaster Response planning – including functionality, classification, criticality, compliance, and end user communities – can significantly improve budget request outcomes for daily operational needs?

2) Improvisational Disaster Response exercises can be initiated around planned external events – such as scheduled power outages, facility construction, unit relocation, and government drills – but are often overlooked by IT Business Continuity Managers?

3) According to the CDC (2017-2018), influenza epidemics (localized pandemics) caused US organizations $15.3 billion in lost revenue, $21 billion in lost productivity, and 17 million missed work days – yet planning and funding for epidemics is rarely pursued by IT Business Continuity Managers?

4) The Disaster Response and Recovery Plan is not a monolithic or linear document, and consists of no less than 10 constituent plans that reinforce each other?

This type of information won’t be in the training materials or on the certification exam, but it needs to be in the head of every Information Security professional attending this type of Disaster Response certification program.

If the student enjoys the training experience, scores well on the exam, and walks away with an earned certification – but can’t apply the knowledge gained on their first day back to work – their time and their employers’ money have been wasted.

Providing students with this level of experiential knowledge serves to bridge the gap between classroom theory and operational reality. Additionally, it lays a solid foundation for students by providing them with practical skills they need to know and can apply their first day back at work.  Our goal is to have students leave our certification courses both certified and prepared. 

It’s been said that, “experience can be defined as that knowledge you gain the moment after you need it the most.” We prefer our students possess that knowledge in advance, the time they truly need it the most.

Cyber Security Supply and Demand

To further support our Training Philosophy and the utilization of experiential learning in support of certification courses, an interactive “Cybersecurity Supply and Demand” heat map has been provided below.

The most important statistic: there are over 300,000 cyber security positions open throughout the United States that cannot be filled, due to a lack of qualified applicants to fill them.

We encourage you to visit the Cyber Seek website for additional information and statistics regarding this issue.  Use the interactive map below to see open positions and training deficits either by State or Metropolitan Area.

Contact Us for The Ultimate Training Experience

Contact Us

(912) 244-0394

Contact Us

Contact US

previous arrow
next arrow