{"id":1239,"date":"2021-10-30T17:28:59","date_gmt":"2021-10-30T11:58:59","guid":{"rendered":"https:\/\/www.symbizsolutions.com\/academy\/?page_id=1239"},"modified":"2022-03-17T13:28:20","modified_gmt":"2022-03-17T07:58:20","slug":"rocheston-certified-cyber-security-specialist","status":"publish","type":"page","link":"https:\/\/symbizsolutions.com\/academy\/rocheston-certified-cyber-security-specialist\/","title":{"rendered":"Rocheston Certified Cyber Security Specialist"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1239\" class=\"elementor elementor-1239\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5e1cd5ad elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"5e1cd5ad\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-44daefaa\" data-id=\"44daefaa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-466e648e elementor-widget elementor-widget-heading\" data-id=\"466e648e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RCCS \u2013 ROCHESTON CERTIFIED CYBERSECURITY SPECIALIST<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5fda7b94 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5fda7b94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-bc4a4e1\" data-id=\"bc4a4e1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1d896a0 elementor-widget elementor-widget-heading\" data-id=\"1d896a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the Course<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ce32a14 elementor-widget elementor-widget-text-editor\" data-id=\"4ce32a14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The curriculum has been created by subject matter experts (SMEs) of Rocheston, who have gone through extensive research to create content that is practical and connects perfectly with current industry standards. The program acts as a stepping stone for becoming an accomplished cybersecurity specialist, who can turn tables at a dynamic organization with the acquired insights. The program teaches you about the best practices associated with security risks, both at home and otherwise.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d1672b8 elementor-widget elementor-widget-heading\" data-id=\"6d1672b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What\u2019s unique about the course?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-623b6201 elementor-widget elementor-widget-text-editor\" data-id=\"623b6201\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Rocheston Ros\u00e9 OS (Consists of all lab materials)<\/li><li>Training Videos<\/li><li>RCCE\u00ae Sample Test<\/li><li>Whitepapers<\/li><li>Online Support<\/li><li>6-month subscription to Cyberclass\u00ae access with course and Ros\u00e9 updates<\/li><li>Trainer will be an Authorized Rocheston Trainer.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4ee5c4 elementor-widget elementor-widget-heading\" data-id=\"f4ee5c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Duration: 3 Days<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-706db918 elementor-widget elementor-widget-heading\" data-id=\"706db918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mode: Classroom or Online Session<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6433c463 elementor-tabs-view-horizontal elementor-widget elementor-widget-tabs\" data-id=\"6433c463\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1681\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1681\" aria-expanded=\"false\">Outline<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1682\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1682\" aria-expanded=\"false\">Who can Join<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1683\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1683\" aria-expanded=\"false\">Course Outcome<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1684\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1684\" aria-expanded=\"false\">Instructor<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1681\" aria-expanded=\"false\">Outline<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1681\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1681\" tabindex=\"0\" hidden=\"false\"><ul><li>Securing Data and Privacy<\/li><li>How to Avoid Getting Scammed Online<\/li><li>Securing Networks<\/li><li>Securing Websites<\/li><li>Securing Emails<\/li><li>Securing Mobile Devices<\/li><li>Securing Employees<\/li><li>Securing Operations<\/li><li>Securing Payments<\/li><li>Incident Response and Reporting: A Guideline<\/li><li>Social Media: Policy Development and Management<\/li><li>SecurityOne 101: Cybersecurity Basics<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1682\" aria-expanded=\"false\">Who can Join<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1682\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1682\" tabindex=\"0\" hidden=\"hidden\"><p>Any individual, organization, government agency, including schools and colleges,would benefit from the course. Most importantly, the course is designed for ordinary day today users who do not have the advantage of specialized technical knowledge, i.e. for the restof us.<\/p><p>The RCCS certification will primarily provide you with a working knowledge of all thefundamental threats to cybersecurity in our everyday life, and how to deal with them. Everyend user, that is almost every single one of us in today\u2019s world, who has a minimum digitalfootprint, needs being educated in the ways to secure their devices and systems. Join us in ourendeavors to enable a cyber secure life for everyone.<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1683\" aria-expanded=\"false\">Course Outcome<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1683\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1683\" tabindex=\"0\" hidden=\"hidden\"><p><strong>What you will learn<\/strong><\/p><ul><li>Identify the threats in your environment that could be detrimental to cybersecurity<\/li><li>Note if the threat is coming from users and human error<\/li><li>Try to identify how, if at all, users are creating IT risks<\/li><li>What are the potential vulnerabilities in your system and how can they be targeted, due to user misuse<\/li><li>Note the gaps in the network<\/li><li>Find ways to improve security infrastructure<\/li><li>Educate your employees on the importance of cyber security<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1684\" aria-expanded=\"false\">Instructor<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1684\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1684\" tabindex=\"0\" hidden=\"hidden\"><p><strong>Ganesh Kannan<\/strong>&nbsp;has more than 15 years of IT experience in Software testing, test Consulting, Project and Change management. He has worked for Investment Banks like Barclays Capital and IT services firm like Zensar Technologies. He has managed the testing tools and process function for a top tier investment bank and have managed large off-shore testing teams. He possess extensive project management and consulting experience in delivering IT applications and spearheads the classroom and Online courses<\/p>\n<p><\/p><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4c66952d\" data-id=\"4c66952d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16c70df8 elementor-widget elementor-widget-heading\" data-id=\"16c70df8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Related Course<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-624dca6f elementor-widget elementor-widget-text-editor\" data-id=\"624dca6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><a href=\"https:\/\/www.symbizsolutions.com\/academy\/rocheston-certified-cyber-security-training\/\" style=\"text-decoration: none;\">Rocheston Certified Cyber Security Training<\/a><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70c53240 elementor-widget elementor-widget-video\" data-id=\"70c53240\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/qaAS9tMi-AA&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-778a279b elementor-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"778a279b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-shrink\" href=\"https:\/\/www.symbizsolutions.com\/academy\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">jOIN now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>RCCS \u2013 ROCHESTON CERTIFIED CYBERSECURITY SPECIALIST About the Course The curriculum has been created by subject matter experts (SMEs) of Rocheston, who have gone through extensive research to create content that is practical and connects perfectly with current industry standards. The program acts as a stepping stone for becoming an accomplished cybersecurity specialist, who can [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1239","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages\/1239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":39,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages\/1239\/revisions"}],"predecessor-version":[{"id":3361,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages\/1239\/revisions\/3361"}],"wp:attachment":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/media?parent=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}