Certified Hacker Analyst Trainer (CHAT)
Do you need to see our Exam and Training Schedule?
If you are interested in teaching cybersecurity classes in college
or high school, or any of the ISECOM courses such as the Certified
Hacker Analyst course (CHA) or Hacker Highschool then this course is
right for you.
WHO SHOULD TAKE THE CHAT?
The CHAT is an enhancement to the Security Awareness Instructor certification which includes specific knowledge and skills required in the Certified Hacker Analyst and Hacker Highschool classes.
Since the role of Hacker / Analyst is the Swiss Army Knife of the security industry it. It’s an ideal role for anyone who wants to start in security. Beginners can use these skills towards finding a security niche or a specialty to focus on. Those who like the role can master the skill set to become highly paid consultants capable of analyzing and diagnosing the security of highly complex infrastructures and development projects.
The CHAT focus is on the method for assuring a quality training. In addition to learning the required CHA curriculum you will learn how to deliver it to specific age groups to assure the students learn the right message and are ready to apply it.
The course is based on the Certified Hacker Analyst course which includes three areas:
Network Security - includes lessons in System Tools and Techniques, Hacking Network Protocols, and Hacking Network Services.
Security Analysis - includes lessons in Hacking Malware, Attack Analysis, and Counter Forensics.
Hacking - includes lessons in Hacking Email, Hacking Websites, and Hacking Passwords.
Some of the curriculum is available off of our website based on the “Security Essentials” series which is sold through Amazon:
Previews of the material are available as part of the Hacker Highschool curriculum available here:
Other parts of the curriculum are based on SALT, the Security Awareness Learning Tactics research by ISECOM.
The exam is 100 questions, multiple choice, best answer and based on specific training in security awareness using the Security Awareness Learning Tactics body of knowledge, teaching skills, and the body of knowledge available in the Security Essentials series. The successful student will be able to explain how, when, and why to use a particular teaching strategy based on the type and age of the class as well as show the technical know-how of the CHA which includes security tactic, strategy, tool, or process. For example, questions are like this:
The main reason for having high school students work in diverse groups as opposed to individually is:
a. To have them reinforce each other’s knowledge while doing the exercises.
b. To assure they work on the exercises and get them done in a timely manner.
c. To teach them to work in a team.
d. To get them to build friendships and respect their peers.
e. To help them successfully overcome particularly difficult exercises.
Which are the main challenges to secure authentication for Access Control to a system?
a. Assuring the integrity and the origin of the connection.
b. Assuring the origin of the connection and the identity of the person connecting.
c. Assuring the confidentiality of the connection and identity of the person connecting.
d. Assuring the availability and the integrity of the connection.
e. Assuring the stability of the system and the connection.
This certification is open and requires no training courses. Anyone can register for this certification. It is recommended however that the student has become familiar with the body of knowledge available whether through self-study or a training course to successfully pass the exam.