SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
BRIDGING THE CYBER-
SECURITY TALENT GAP
SEPTEMBER 2016
Cyber Fighter Academy
PRESENTS
DISRUPTING THE CYBERSECURITY SPACE
WHAT WE DO
We are redefining the next generation of cybersecurity professionals, by creating an immersive
hands-on, fully funded 10-week cybersecurity bootcamp that creates certified and job-ready
cybersecurity pros. We are doing this to address the global shortage of cybersecurity
professionals.
GLOBAL,
MACRO TRENDS
Cybersecurity as an academic discipline or program of study is often inaccessible to students
with only 7% of top universities offer an undergraduate major or minors in cybersecurity.
Research show a bachelor’s degree in a technical field is ranked third among most effective
ways to acquire cybersecurity skills, behind hands-on experience and certifications.
POWERFUL
ECOSYSTEM
With a growing number of bootcamp recruits, global alumni network and hiring network we’re
allowing all parties to extract maximum value from the Cyber Fighter Academy ecosystem. The
resulting Cyber Fighter Academy network effects will drive accelerated demand for our product.
MASSIVE
OPPORTUNITY
Demand for cybersecurity professionals is outpacing the supply of qualified workers. Estimates
of the global cybersecurity workforce shortfall range from one to two million positions unfilled by
2019. In 2015, about 209,000 cybersecurity jobs went unfilled in the United States alone.
FIRST MOVER
The current barrier to entry into cybersecurity is huge, expensive and boring. Conventions needs
to be challenged to meet the needs from the industry, and the needs and behaviors of the rising
generations , the Millenials and Generation Z. Think a San Diego conference hotel with 50 year
old geeks vs. a entrepreneurial startup vibe co-working space in Berlin. We are the first to do
Cybercrime is on the rise and organizations all over the world is facing a crisis in finding cybersecurity professionals.
THE CYBERSECURITY TALENT GAP IS HUGE AND GROWING
1.5 Million 82 % 52 % 209.000
more cybersecurity
professionals will be needed
to accommodate the
predicted global shortfall
by 2020.
of study respondents
reported a shortage of
cybersecurity skills, with
71% of them linking this
shortage to direct and
measurable damages their
companies suffered.
of IT professionals
surveyed stated fewer
than 25% of all
applicants were qualified.
cybersecurity positions went
unfilled in 2015 in the
United States alone.
Source: (ISC)² 2015 Global
Information Security
Workforce Study
Source: Hacking the Skills
Shortage: Intel Security report
Source: State of Cybersecurity:
Implications for 2015:
An ISACA and
RSA Conference Survey
Source: Hacking the Skills
Shortage: Intel Security report
CFA is an immersive fully funded 10-week cybersecurity bootcamp that creates certified and job-ready cybersecurity pros.
CYBER FIGHTER ACADEMY (CFA) FULFILLS THIS TALENT GAP
Application · Assessment · Selection
Costs
Training
Costs
Certifications
Costs
Deployment
Revenue
• Recruiting campaigns targeted graduates with relevant degrees (E.g.
Computer Science), and IT people working in specific industries (E.g.
Telecommunication).
• Rigorous process to select high potential recruits.
• The majority of the training draws on practical, hands-on, draws on real-world
scenarios, simulates realistic enterprise environments and hacking competitions etc.
• Hands-on experienced instructors (white & black hat hackers) are assisting full time
during the entire program.
• Certifications lay the theoretical foundation and ensures that recruits are qualified to an
industry standard, and are in high demand from a recruiting perspective.
• Certified instructors are hired on a consulting basis to specifically conduct the certifications
training and official material for a few days.
• Recruits will receive interview prep and will be interviewing with organizations from our hiring
partner network.
• Hiring partners who hire CFA graduates will pay a recruitment fee that varies based on
graduate performance, location, industry etc.
Conventions needs to be challenged to meet the needs and behaviors of the rising generations , the Millenials and Generation Z.
REDEFINING THE NEXT GENERATION OF CYBERSECURITY PROS
INSPIRATIONAL HANDS-ON
ACCESSIBLE
COMMUNITY
TECH ENABLEDENTREPRENURIAL
Recruiting campaigns targeted graduates with relevant degrees (E.g. Computer Science), and IT people working in specific
industries (E.g. Telecommunication, Sysadmin).
TARGETING CS GRADUATES LOOKING FOR A CAUSE
CS GRADUATES IT PEOPLE
• Social media
• University seminars
• Job ads
• Recommendations
• LinkedIn
• Job ads
• Recommendations
The majority of the training draws on practical, hands-on, draws on real-world scenarios and simulates realistic enterprise
environments etc.
80/20 RULE IN FAVOR OF HANDS-ON TRAINING
CERTIFICATION TRAINING
Certified instructors are hired on a consulting basis to specifically
conduct the certifications training and official material for a few days.
HANDS-ON TRAINING


Hands-on experienced instructors (white & black hat hackers)
are assisting full time during the entire program.
The hacking simulations are a mix of freely available
and custom made.
Focus will be on building up a hiring network within the fastest cybersecurity demand sectors, which primarily are in industries
managing consumer data.
A HIRING NETWORK OF COMPANIES WITH GROWING DEMANDS
40 % 30 % 16 % 14 %
Professional Services Other Finance & Insurance Manufacturing & Defense
Source: Job Market Intelligence: Cybersecurity Jobs,
2015–2016 Burning Glass Technologies
Fastest cybersecurity demand sectors are in
industries managing consumer data
A GROWING ALUMNI NETWORK IS KEY TO LONG TERM SUCCESS
Valuable services and offerings free of charge will keep alumni engaged. Furthermore alumni will become part of the hiring network
‘on the other side of the table’.
SHARPEN UP SKILLS
• Hacking competitions
• Access to simulations
• Industry leading keynotes
EVENTS
• Inspirational talks
(‘Cybersecurity TED’)
• Industry leading keynotes
• Network
HIRING NETWORK
• Access to new opportunities
(job replacement)
• Access to HR services
• Alumni matching (job
replacement)
COMMUNITY
• Brand ambassadors
• Mentors
• Cybersecurity sharing groups
• Network
THE CYBER FIGHTER ACADEMY NETWORK EFFECT
Creating a new ecosystem for cybersecurity training and recruiting.
MORE
COMMUNITY
ACTIVITY
BOOTCAMP ALUMNI
MORE LOCATIONS /
RECRUITS /
BOOTCAMPS
BIGGER HIRING
NETWORK,
BETTER REPUTATION
BETTER JOB
PLACEMENTS,
MORE REVENUE
BIGGER ALUMNI,
BETTER ALUMNI
SERVICES/
BIGGER HIRING
NETWORK,
BETTER REPUTATION
JOB REPLACEMENTS,
MORE REVENUE
MONETIZING A GROWING ALUMNI
Job hopping every 3-4 years is normal and we need to be the facilitator when alumni are looking for new challenges. Furthermore by
layering services & offerings on top of our community we are creating an increasingly valuable offering while driving revenue.
JOB REPLACEMENT
RECRUITING FEE
• Companies looking to hire
senior cybersecurity
professionals through
hiring network
• Alumni actively looking for
a new job (matching
services with other alumni
in the industry/market/
location candidate is
looking for)
SERVICES & OFFERINGS
• Vendors
• Software
• Reports / intelligence
As CFA grows its ability to
curate, negotiate and offer best
in class services & offerings - at
a discounted CFA alumni price
- increases.
HUGE AND GROWING MARKET
According to Bank of America’s CEO, cybersecurity is the company’s only business unit with no budget limit.
$100 BILLION
in 2015
7% - 16%
over the next 5 years
Total annual global
cybersecurity spending
Project annual cybersecurity
spending increases
Source: Hacking the Skills Shortage: Intel Security report
PROVE MODEL, EXPAND GLOBALLY AND THEN SCALE
STAGE 1
PROVE MODEL
STAGE 2
EU EXPANSION
STAGE 3
READY TO SCALE
STAGE 4
SCALE
Avg. Costs per recruitment $12K $10K $8K $6K
Avg. Recruitment fee $15K $20K $25K $30K
# of recruitments / Year 100 500 1.000 10.000
Revenue / Year $1.5M $10M $25M $300M
APPENDIX A: ASSESSMENT / SELECTION
The program is intensive and only those who display the greatest potential are secured a place.
ASSESSMENT

The candidates progress through two online assessment phases:

• Pre-Qualification:
• A series of test and background questions.

• Aptitude Assessment:
• A technical and psychometric assessment designed to uncover
traits that suggest suitability for a career in cyber security.
SELECTION

Candidates who show potential in the assessment phases are invited
to a series of face-to-face interviews with our instructors.
On the balance of their cumulative performance, the strongest
candidates are offered a place.
APPENDIX B: TRAINING
The training is in person and students spend 10 weeks immersed in learning and honing the cyber security skills that organizations
demand.
HANDS-ON TRAINING

The training is practical, hands-on, draws on real-world scenarios and simulates realistic enterprise environments, including:
⁃ Technology fundamentals
⁃ Security essentials
⁃ Virtualisation and cloud infrastructure security
⁃ Compliance audit and risk
⁃ Incident response
⁃ Forensics
⁃ Penetration testing and ethical hacking
⁃ And much more
CERTIFICATION TRAINING

A more theoretical approach covering each certification specifically.
⁃ 100% up-to-date and official training
⁃ Authorized Instructors for all training sessions
APPENDIX C: POSSIBLE BOOTCAMPS AND CERTIFICATIONS
We will start focus on the category ‘Protect & Defend’. At a later stage we might be expanding our bootcamp offering over time with
any of the other categories.
BOOTCAMPS / DoD 8140 CATEGORIES

The DoD 8140 model is based on National Institute of Standard and Technology (NIST) National Initiative
for Cybersecurity Education (NICE) standard. This model defines job categories very clearly:
⁃ Security Provision
⁃ Operate & Maintain
⁃ Protect & Defend
⁃ Analyze
⁃ Operate & Collect
⁃ Oversight & Development
⁃ Investigate
EACH CATEGORY HAS RECOMMENDED CERTIFICATIONS/CLASSES

The 8140 framework allowed for many different classes, certifications, and formalized training to now qualify an individual as
“certified” in that task. Having different avenues of training allows individuals to obtain inexpensive training and still be qualified in a
task.
⁃ Category
⁃ Certification X
⁃ Certification Y
⁃ Class Z
APPENDIX D: DEPLOYMENT / HIRING NETWORK
Organizations in our hiring network hire out of our community and pay a recruitment fee to Cyber Fighter Academy.
INTERVIEW PREP

Post-training the graduates will receive interview preparations and be asked to complete a series of job
interviews with our hiring partners.
Our hiring partners can be organizations within different sectors:
⁃ Technology and Internet
⁃ Security software
⁃ Defense
⁃ Government departments and defense/intelligence agencies
⁃ E-Commerce
⁃ Financial institutions, financial firms and credit card
⁃ Telcos
⁃ And many more
HIRING PARTNER

Hiring partners has the opportunity to recruit new and immediately deployable cyber security professionals.

Weitere ähnliche Inhalte

Was ist angesagt?

CodersTrust Presentation at Digital World, Dhaka 2014
CodersTrust Presentation at Digital World, Dhaka 2014CodersTrust Presentation at Digital World, Dhaka 2014
CodersTrust Presentation at Digital World, Dhaka 2014Ferdinand Kjærulff
 
Vinsys ! Leading Corporate Technology Training ! PMP, ITSM, COBIT Training fo...
Vinsys ! Leading Corporate Technology Training ! PMP, ITSM, COBIT Training fo...Vinsys ! Leading Corporate Technology Training ! PMP, ITSM, COBIT Training fo...
Vinsys ! Leading Corporate Technology Training ! PMP, ITSM, COBIT Training fo...Vinsys IT Services
 
Introduction to huawei learn for the future campaign
Introduction to huawei learn for the future campaignIntroduction to huawei learn for the future campaign
Introduction to huawei learn for the future campaignKirk Redhead
 
Aventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber securityAventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber securityAventis School of Management
 
TE summit 23-24.10.2013.-Wilfried Paroubek-Improving the IT skills
TE summit 23-24.10.2013.-Wilfried Paroubek-Improving the IT skillsTE summit 23-24.10.2013.-Wilfried Paroubek-Improving the IT skills
TE summit 23-24.10.2013.-Wilfried Paroubek-Improving the IT skillsTELECENTRE EUROPE
 
Skills Development Prospectus 2014
Skills Development Prospectus 2014Skills Development Prospectus 2014
Skills Development Prospectus 2014CTU_Corporate
 
Milanity Relationship Partner Program
Milanity Relationship Partner ProgramMilanity Relationship Partner Program
Milanity Relationship Partner ProgramParag Gautam (PG)
 
Emerging career options in the current word career guidance
Emerging career options in the current word career guidanceEmerging career options in the current word career guidance
Emerging career options in the current word career guidanceBhaskar Reddy
 
FDM Graduate Programme - SBA Presentation
FDM Graduate Programme - SBA PresentationFDM Graduate Programme - SBA Presentation
FDM Graduate Programme - SBA PresentationCarmen Paputa Dutu
 
Why ICDL Digital Marketing Syllabus? AcademySID
Why ICDL Digital Marketing Syllabus? AcademySIDWhy ICDL Digital Marketing Syllabus? AcademySID
Why ICDL Digital Marketing Syllabus? AcademySIDAcademy Sid
 

Was ist angesagt? (19)

CodersTrust Presentation at Digital World, Dhaka 2014
CodersTrust Presentation at Digital World, Dhaka 2014CodersTrust Presentation at Digital World, Dhaka 2014
CodersTrust Presentation at Digital World, Dhaka 2014
 
CodersTrust PitchDeck 2015
CodersTrust PitchDeck 2015CodersTrust PitchDeck 2015
CodersTrust PitchDeck 2015
 
Prologue to DWG
Prologue to DWGPrologue to DWG
Prologue to DWG
 
Prologue.compressed
Prologue.compressedPrologue.compressed
Prologue.compressed
 
Vinsys ! Leading Corporate Technology Training ! PMP, ITSM, COBIT Training fo...
Vinsys ! Leading Corporate Technology Training ! PMP, ITSM, COBIT Training fo...Vinsys ! Leading Corporate Technology Training ! PMP, ITSM, COBIT Training fo...
Vinsys ! Leading Corporate Technology Training ! PMP, ITSM, COBIT Training fo...
 
Introduction to huawei learn for the future campaign
Introduction to huawei learn for the future campaignIntroduction to huawei learn for the future campaign
Introduction to huawei learn for the future campaign
 
Lionwood.software
Lionwood.software Lionwood.software
Lionwood.software
 
Aventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber securityAventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber security
 
TE summit 23-24.10.2013.-Wilfried Paroubek-Improving the IT skills
TE summit 23-24.10.2013.-Wilfried Paroubek-Improving the IT skillsTE summit 23-24.10.2013.-Wilfried Paroubek-Improving the IT skills
TE summit 23-24.10.2013.-Wilfried Paroubek-Improving the IT skills
 
CodersTrust Pitch Deck
CodersTrust Pitch DeckCodersTrust Pitch Deck
CodersTrust Pitch Deck
 
Skills Development Prospectus 2014
Skills Development Prospectus 2014Skills Development Prospectus 2014
Skills Development Prospectus 2014
 
Milanity Relationship Partner Program
Milanity Relationship Partner ProgramMilanity Relationship Partner Program
Milanity Relationship Partner Program
 
SEO London 2011
SEO London 2011SEO London 2011
SEO London 2011
 
Emerging career options in the current word career guidance
Emerging career options in the current word career guidanceEmerging career options in the current word career guidance
Emerging career options in the current word career guidance
 
FDM Graduate Programme - SBA Presentation
FDM Graduate Programme - SBA PresentationFDM Graduate Programme - SBA Presentation
FDM Graduate Programme - SBA Presentation
 
Mohammad Jawabreh CV
Mohammad Jawabreh CVMohammad Jawabreh CV
Mohammad Jawabreh CV
 
Why ICDL Digital Marketing Syllabus? AcademySID
Why ICDL Digital Marketing Syllabus? AcademySIDWhy ICDL Digital Marketing Syllabus? AcademySID
Why ICDL Digital Marketing Syllabus? AcademySID
 
Entrepreneur
EntrepreneurEntrepreneur
Entrepreneur
 
PGDM Courses in Delhi NCR
PGDM Courses in Delhi NCRPGDM Courses in Delhi NCR
PGDM Courses in Delhi NCR
 

Andere mochten auch

CodersTrust Student Presentation
CodersTrust Student PresentationCodersTrust Student Presentation
CodersTrust Student PresentationFerdinand Kjærulff
 
Klipfolio The 8 must have metrics for your marketing dashboard
Klipfolio   The 8 must have metrics for your marketing dashboardKlipfolio   The 8 must have metrics for your marketing dashboard
Klipfolio The 8 must have metrics for your marketing dashboardKlipfolio
 
Strategia nationala de dezvoltare durabila
Strategia nationala de dezvoltare durabilaStrategia nationala de dezvoltare durabila
Strategia nationala de dezvoltare durabiladtds
 
Aws
Aws   Aws
Aws TauCt
 
Narciso.it il bello degli uomini
Narciso.it il bello degli uominiNarciso.it il bello degli uomini
Narciso.it il bello degli uominiciorci
 
Citizen Voices in a Networked Age of #BigData
Citizen Voices in a Networked Age of #BigDataCitizen Voices in a Networked Age of #BigData
Citizen Voices in a Networked Age of #BigDataStuart Shulman
 
Becoming a worthy leader
Becoming a worthy leaderBecoming a worthy leader
Becoming a worthy leaderAtty Garfinkel
 
Succesful selling in today's digital world
Succesful selling in today's digital worldSuccesful selling in today's digital world
Succesful selling in today's digital worldBranching Out Euroupe
 
Creating a college support team
Creating a college support teamCreating a college support team
Creating a college support teamAtty Garfinkel
 

Andere mochten auch (17)

THE CODERS TRUST SCORE
THE CODERS TRUST SCORETHE CODERS TRUST SCORE
THE CODERS TRUST SCORE
 
What is CodersTrust?
What is CodersTrust?What is CodersTrust?
What is CodersTrust?
 
CodersTrust Student Presentation
CodersTrust Student PresentationCodersTrust Student Presentation
CodersTrust Student Presentation
 
Career boosting
Career boostingCareer boosting
Career boosting
 
Become a student ambassador
Become a student ambassadorBecome a student ambassador
Become a student ambassador
 
Coderstrust explained
Coderstrust explainedCoderstrust explained
Coderstrust explained
 
Klipfolio The 8 must have metrics for your marketing dashboard
Klipfolio   The 8 must have metrics for your marketing dashboardKlipfolio   The 8 must have metrics for your marketing dashboard
Klipfolio The 8 must have metrics for your marketing dashboard
 
Strategia nationala de dezvoltare durabila
Strategia nationala de dezvoltare durabilaStrategia nationala de dezvoltare durabila
Strategia nationala de dezvoltare durabila
 
Plenum 1
Plenum 1Plenum 1
Plenum 1
 
Aws
Aws   Aws
Aws
 
Coders trust pitchdeck
Coders trust pitchdeck Coders trust pitchdeck
Coders trust pitchdeck
 
Narciso.it il bello degli uomini
Narciso.it il bello degli uominiNarciso.it il bello degli uomini
Narciso.it il bello degli uomini
 
Citizen Voices in a Networked Age of #BigData
Citizen Voices in a Networked Age of #BigDataCitizen Voices in a Networked Age of #BigData
Citizen Voices in a Networked Age of #BigData
 
Becoming a worthy leader
Becoming a worthy leaderBecoming a worthy leader
Becoming a worthy leader
 
Succesful selling in today's digital world
Succesful selling in today's digital worldSuccesful selling in today's digital world
Succesful selling in today's digital world
 
The Coder
The CoderThe Coder
The Coder
 
Creating a college support team
Creating a college support teamCreating a college support team
Creating a college support team
 

Ähnlich wie CodersTrust - Defend and Protect the Free World

Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Skillogic Solutions
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Skillogic Solutions
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxSkillogic Solutions
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Skillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Skillogic Solutions
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad JanuarySkillogic Solutions
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxSkillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Skillogic Solutions
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Skillogic Solutions
 
Cyber Security Course in Bangalore January
Cyber Security Course in Bangalore JanuaryCyber Security Course in Bangalore January
Cyber Security Course in Bangalore JanuarySkillogic Solutions
 
Cyber Security Course in Bangalore February
Cyber Security Course in Bangalore FebruaryCyber Security Course in Bangalore February
Cyber Security Course in Bangalore FebruarySkillogic Solutions
 
Cyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptxCyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptxSkillogic Solutions
 
Cyber Security Course in Bangalore February 2024
Cyber Security Course in Bangalore February 2024Cyber Security Course in Bangalore February 2024
Cyber Security Course in Bangalore February 2024Skillogic Solutions
 
Cyber Security Course in Bangalore March 2024
Cyber Security Course in Bangalore March 2024Cyber Security Course in Bangalore March 2024
Cyber Security Course in Bangalore March 2024Skillogic Solutions
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
 
Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024Skillogic Solutions
 

Ähnlich wie CodersTrust - Defend and Protect the Free World (20)

Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad January
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptx
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Cyber Security Course in Bangalore January
Cyber Security Course in Bangalore JanuaryCyber Security Course in Bangalore January
Cyber Security Course in Bangalore January
 
Cyber Security Course in Bangalore February
Cyber Security Course in Bangalore FebruaryCyber Security Course in Bangalore February
Cyber Security Course in Bangalore February
 
Cyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptxCyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptx
 
Cyber Security Course in Bangalore February 2024
Cyber Security Course in Bangalore February 2024Cyber Security Course in Bangalore February 2024
Cyber Security Course in Bangalore February 2024
 
Cyber Security Course in Bangalore March 2024
Cyber Security Course in Bangalore March 2024Cyber Security Course in Bangalore March 2024
Cyber Security Course in Bangalore March 2024
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024Cyber Security Course in Hyderabad April 2024
Cyber Security Course in Hyderabad April 2024
 

Mehr von Ferdinand Kjærulff

Mehr von Ferdinand Kjærulff (13)

CODERSTRUST BROCHURE
CODERSTRUST BROCHURECODERSTRUST BROCHURE
CODERSTRUST BROCHURE
 
Techrefugee Presentation Paris NOV
Techrefugee  Presentation Paris NOVTechrefugee  Presentation Paris NOV
Techrefugee Presentation Paris NOV
 
Get student funding
Get student fundingGet student funding
Get student funding
 
Why you should join CodersTrust!
Why you should join CodersTrust!Why you should join CodersTrust!
Why you should join CodersTrust!
 
Why CodersTrust
Why CodersTrustWhy CodersTrust
Why CodersTrust
 
CodersTrust Graduate Program
CodersTrust Graduate ProgramCodersTrust Graduate Program
CodersTrust Graduate Program
 
CodersTrust Graduate Program
CodersTrust Graduate Program CodersTrust Graduate Program
CodersTrust Graduate Program
 
CodersTrust Product Presentation
CodersTrust Product PresentationCodersTrust Product Presentation
CodersTrust Product Presentation
 
Fintech for students
Fintech for studentsFintech for students
Fintech for students
 
CodersTrust Product Presentation
CodersTrust Product PresentationCodersTrust Product Presentation
CodersTrust Product Presentation
 
Three Disruptions In One
Three Disruptions In OneThree Disruptions In One
Three Disruptions In One
 
Cloud Academy pitch - Early version of Coderstrust
Cloud Academy pitch - Early version of CoderstrustCloud Academy pitch - Early version of Coderstrust
Cloud Academy pitch - Early version of Coderstrust
 
Founders for Forum - Rising Star - CodersTrust pitch
Founders for Forum - Rising Star - CodersTrust pitchFounders for Forum - Rising Star - CodersTrust pitch
Founders for Forum - Rising Star - CodersTrust pitch
 

Kürzlich hochgeladen

Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Availablepr788182
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistanvineshkumarsajnani12
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...pujan9679
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSkajalroy875762
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTSkajalroy875762
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubaijaehdlyzca
 

Kürzlich hochgeladen (20)

Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 

CodersTrust - Defend and Protect the Free World

  • 1. BRIDGING THE CYBER- SECURITY TALENT GAP SEPTEMBER 2016 Cyber Fighter Academy PRESENTS
  • 2. DISRUPTING THE CYBERSECURITY SPACE WHAT WE DO We are redefining the next generation of cybersecurity professionals, by creating an immersive hands-on, fully funded 10-week cybersecurity bootcamp that creates certified and job-ready cybersecurity pros. We are doing this to address the global shortage of cybersecurity professionals. GLOBAL, MACRO TRENDS Cybersecurity as an academic discipline or program of study is often inaccessible to students with only 7% of top universities offer an undergraduate major or minors in cybersecurity. Research show a bachelor’s degree in a technical field is ranked third among most effective ways to acquire cybersecurity skills, behind hands-on experience and certifications. POWERFUL ECOSYSTEM With a growing number of bootcamp recruits, global alumni network and hiring network we’re allowing all parties to extract maximum value from the Cyber Fighter Academy ecosystem. The resulting Cyber Fighter Academy network effects will drive accelerated demand for our product. MASSIVE OPPORTUNITY Demand for cybersecurity professionals is outpacing the supply of qualified workers. Estimates of the global cybersecurity workforce shortfall range from one to two million positions unfilled by 2019. In 2015, about 209,000 cybersecurity jobs went unfilled in the United States alone. FIRST MOVER The current barrier to entry into cybersecurity is huge, expensive and boring. Conventions needs to be challenged to meet the needs from the industry, and the needs and behaviors of the rising generations , the Millenials and Generation Z. Think a San Diego conference hotel with 50 year old geeks vs. a entrepreneurial startup vibe co-working space in Berlin. We are the first to do
  • 3. Cybercrime is on the rise and organizations all over the world is facing a crisis in finding cybersecurity professionals. THE CYBERSECURITY TALENT GAP IS HUGE AND GROWING 1.5 Million 82 % 52 % 209.000 more cybersecurity professionals will be needed to accommodate the predicted global shortfall by 2020. of study respondents reported a shortage of cybersecurity skills, with 71% of them linking this shortage to direct and measurable damages their companies suffered. of IT professionals surveyed stated fewer than 25% of all applicants were qualified. cybersecurity positions went unfilled in 2015 in the United States alone. Source: (ISC)² 2015 Global Information Security Workforce Study Source: Hacking the Skills Shortage: Intel Security report Source: State of Cybersecurity: Implications for 2015: An ISACA and RSA Conference Survey Source: Hacking the Skills Shortage: Intel Security report
  • 4. CFA is an immersive fully funded 10-week cybersecurity bootcamp that creates certified and job-ready cybersecurity pros. CYBER FIGHTER ACADEMY (CFA) FULFILLS THIS TALENT GAP Application · Assessment · Selection Costs Training Costs Certifications Costs Deployment Revenue • Recruiting campaigns targeted graduates with relevant degrees (E.g. Computer Science), and IT people working in specific industries (E.g. Telecommunication). • Rigorous process to select high potential recruits. • The majority of the training draws on practical, hands-on, draws on real-world scenarios, simulates realistic enterprise environments and hacking competitions etc. • Hands-on experienced instructors (white & black hat hackers) are assisting full time during the entire program. • Certifications lay the theoretical foundation and ensures that recruits are qualified to an industry standard, and are in high demand from a recruiting perspective. • Certified instructors are hired on a consulting basis to specifically conduct the certifications training and official material for a few days. • Recruits will receive interview prep and will be interviewing with organizations from our hiring partner network. • Hiring partners who hire CFA graduates will pay a recruitment fee that varies based on graduate performance, location, industry etc.
  • 5. Conventions needs to be challenged to meet the needs and behaviors of the rising generations , the Millenials and Generation Z. REDEFINING THE NEXT GENERATION OF CYBERSECURITY PROS INSPIRATIONAL HANDS-ON ACCESSIBLE COMMUNITY TECH ENABLEDENTREPRENURIAL
  • 6. Recruiting campaigns targeted graduates with relevant degrees (E.g. Computer Science), and IT people working in specific industries (E.g. Telecommunication, Sysadmin). TARGETING CS GRADUATES LOOKING FOR A CAUSE CS GRADUATES IT PEOPLE • Social media • University seminars • Job ads • Recommendations • LinkedIn • Job ads • Recommendations
  • 7. The majority of the training draws on practical, hands-on, draws on real-world scenarios and simulates realistic enterprise environments etc. 80/20 RULE IN FAVOR OF HANDS-ON TRAINING CERTIFICATION TRAINING Certified instructors are hired on a consulting basis to specifically conduct the certifications training and official material for a few days. HANDS-ON TRAINING 
 Hands-on experienced instructors (white & black hat hackers) are assisting full time during the entire program. The hacking simulations are a mix of freely available and custom made.
  • 8. Focus will be on building up a hiring network within the fastest cybersecurity demand sectors, which primarily are in industries managing consumer data. A HIRING NETWORK OF COMPANIES WITH GROWING DEMANDS 40 % 30 % 16 % 14 % Professional Services Other Finance & Insurance Manufacturing & Defense Source: Job Market Intelligence: Cybersecurity Jobs, 2015–2016 Burning Glass Technologies Fastest cybersecurity demand sectors are in industries managing consumer data
  • 9. A GROWING ALUMNI NETWORK IS KEY TO LONG TERM SUCCESS Valuable services and offerings free of charge will keep alumni engaged. Furthermore alumni will become part of the hiring network ‘on the other side of the table’. SHARPEN UP SKILLS • Hacking competitions • Access to simulations • Industry leading keynotes EVENTS • Inspirational talks (‘Cybersecurity TED’) • Industry leading keynotes • Network HIRING NETWORK • Access to new opportunities (job replacement) • Access to HR services • Alumni matching (job replacement) COMMUNITY • Brand ambassadors • Mentors • Cybersecurity sharing groups • Network
  • 10. THE CYBER FIGHTER ACADEMY NETWORK EFFECT Creating a new ecosystem for cybersecurity training and recruiting. MORE COMMUNITY ACTIVITY BOOTCAMP ALUMNI MORE LOCATIONS / RECRUITS / BOOTCAMPS BIGGER HIRING NETWORK, BETTER REPUTATION BETTER JOB PLACEMENTS, MORE REVENUE BIGGER ALUMNI, BETTER ALUMNI SERVICES/ BIGGER HIRING NETWORK, BETTER REPUTATION JOB REPLACEMENTS, MORE REVENUE
  • 11. MONETIZING A GROWING ALUMNI Job hopping every 3-4 years is normal and we need to be the facilitator when alumni are looking for new challenges. Furthermore by layering services & offerings on top of our community we are creating an increasingly valuable offering while driving revenue. JOB REPLACEMENT RECRUITING FEE • Companies looking to hire senior cybersecurity professionals through hiring network • Alumni actively looking for a new job (matching services with other alumni in the industry/market/ location candidate is looking for) SERVICES & OFFERINGS • Vendors • Software • Reports / intelligence As CFA grows its ability to curate, negotiate and offer best in class services & offerings - at a discounted CFA alumni price - increases.
  • 12. HUGE AND GROWING MARKET According to Bank of America’s CEO, cybersecurity is the company’s only business unit with no budget limit. $100 BILLION in 2015 7% - 16% over the next 5 years Total annual global cybersecurity spending Project annual cybersecurity spending increases Source: Hacking the Skills Shortage: Intel Security report
  • 13. PROVE MODEL, EXPAND GLOBALLY AND THEN SCALE STAGE 1 PROVE MODEL STAGE 2 EU EXPANSION STAGE 3 READY TO SCALE STAGE 4 SCALE Avg. Costs per recruitment $12K $10K $8K $6K Avg. Recruitment fee $15K $20K $25K $30K # of recruitments / Year 100 500 1.000 10.000 Revenue / Year $1.5M $10M $25M $300M
  • 14. APPENDIX A: ASSESSMENT / SELECTION The program is intensive and only those who display the greatest potential are secured a place. ASSESSMENT
 The candidates progress through two online assessment phases:
 • Pre-Qualification: • A series of test and background questions.
 • Aptitude Assessment: • A technical and psychometric assessment designed to uncover traits that suggest suitability for a career in cyber security. SELECTION
 Candidates who show potential in the assessment phases are invited to a series of face-to-face interviews with our instructors. On the balance of their cumulative performance, the strongest candidates are offered a place.
  • 15. APPENDIX B: TRAINING The training is in person and students spend 10 weeks immersed in learning and honing the cyber security skills that organizations demand. HANDS-ON TRAINING
 The training is practical, hands-on, draws on real-world scenarios and simulates realistic enterprise environments, including: ⁃ Technology fundamentals ⁃ Security essentials ⁃ Virtualisation and cloud infrastructure security ⁃ Compliance audit and risk ⁃ Incident response ⁃ Forensics ⁃ Penetration testing and ethical hacking ⁃ And much more CERTIFICATION TRAINING
 A more theoretical approach covering each certification specifically. ⁃ 100% up-to-date and official training ⁃ Authorized Instructors for all training sessions
  • 16. APPENDIX C: POSSIBLE BOOTCAMPS AND CERTIFICATIONS We will start focus on the category ‘Protect & Defend’. At a later stage we might be expanding our bootcamp offering over time with any of the other categories. BOOTCAMPS / DoD 8140 CATEGORIES
 The DoD 8140 model is based on National Institute of Standard and Technology (NIST) National Initiative for Cybersecurity Education (NICE) standard. This model defines job categories very clearly: ⁃ Security Provision ⁃ Operate & Maintain ⁃ Protect & Defend ⁃ Analyze ⁃ Operate & Collect ⁃ Oversight & Development ⁃ Investigate EACH CATEGORY HAS RECOMMENDED CERTIFICATIONS/CLASSES
 The 8140 framework allowed for many different classes, certifications, and formalized training to now qualify an individual as “certified” in that task. Having different avenues of training allows individuals to obtain inexpensive training and still be qualified in a task. ⁃ Category ⁃ Certification X ⁃ Certification Y ⁃ Class Z
  • 17. APPENDIX D: DEPLOYMENT / HIRING NETWORK Organizations in our hiring network hire out of our community and pay a recruitment fee to Cyber Fighter Academy. INTERVIEW PREP
 Post-training the graduates will receive interview preparations and be asked to complete a series of job interviews with our hiring partners. Our hiring partners can be organizations within different sectors: ⁃ Technology and Internet ⁃ Security software ⁃ Defense ⁃ Government departments and defense/intelligence agencies ⁃ E-Commerce ⁃ Financial institutions, financial firms and credit card ⁃ Telcos ⁃ And many more HIRING PARTNER
 Hiring partners has the opportunity to recruit new and immediately deployable cyber security professionals.