Students should have certifications in A+, Network+, or Security+, or possess equivalent professional experience. Students may have one or more of the following certifications or equivalent experience: MCSE, SCNP, CCNP, RHCE, LCE, CNE, SSCP, SANS, or GIAC.

Course Outline

Security Governance Through Principles and Policies

Personnel Security and Risk Management Concepts


Students pursuing CISSP training want to establish themselves as credible computer security professionals through a study of all 8 CISSP Common Body of Knowledge domains. Validating this knowledge is the goal of certification; therefore, students attending this training should also meet the requirements needed to sit for the CISSP certification exam. These include four years of direct professional work experience in one or more fields related to 8 CBK security domains, or a college degree and three years of experience. Check with (ISC)2 for the most up-to-date requirements. New certifications have emerged and will continue to emerge from (ISC)2, which may cause changes to base requirements.

Course Description

Welcome to Certified Information Systems Security Professional (CISSP). With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. The course offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification.

Course Objectives

You will control access to data and information systems using common access control best practices. You will discover how networks are designed for security, and the components, protocols, and services that allow telecommunications to occur in a secure manner. Next, you will learn about the principles of security management and how to manage risk as part of a comprehensive information security management program. You will explore applications and systems development security controls. Then, you will learn how to perform cryptography and how to secure system architecture. You will examine operations security and the appropriate controls and best practices to use to keep operations secure. You will learn how to perform business continuity planning and apply physical security to protect organizational assets and resources. Finally, you will explore law, investigations, and ethics with respect to information systems security and computer forensics.

The eight domains are:
Security and Risk Management
Asset Security
Security Engineering
Communication and Network Security
Identity and Access Management

Business Continuity Planning

Laws, Regulations, and Compliance

Protecting Security of Assets

Cryptography and Symmetric Key Algorithms

PKI and Cryptographic Applications

Principles of Security Models, Design, and Capabilities

Security Vulnerabilities, Threats, and Countermeasures

Physical Security Requirements

Secure Network Architecture and Securing Network Components

Secure Communications and Network Attacks

Managing Identity and Authentication

Controlling and Monitoring Access

Security Assessment and Testing

Managing Security Operations

Preventing and Responding to Incidents

Disaster Recovery Planning

Incidents and Ethics

Software Development Security

Malicious Cods and Application Attacks

October Cyber Coffee


Come join us for our October Cyber Coffee where we’ll observe demos from SixThirty CYBER’s inaugural cohort: Trust Stamp and CyberObserver. Please note that this is a demo and NOT a product sales pitch.

Trust Stamp protects against identity theft, fraud and stranger-danger, by providing a secure digital token verifying the user’s photograph, identity and trustworthiness.

CyberObserver is a powerful, comprehensive and easy-to-use management solution that enables Chief Security Officers, Chief Compliance Officers and IT executives to effectively secure their organizations against cyber-threats.

Afterwards, we’ll break into groups and discuss important topics faced in the industry today.





0730 – 0830 – Demo from Trust Stamp and CyberObserver

0830 – 0900 – Breakout group session




A big Thank You to SWIC for sponsoring this event!

Cyber Coffee will be held at the Liberal Arts Complex in Room 2311.

August Cyber Breakfast

Creating the Next “Cyber City” 

Cybersecurity has  become a white-hot industry, with a growth curve into the future to match. Attention and interest in the rapidly growing field of cybersecurity is not new for our country, but in the St. Louis region, it has started to take shape as something special.Greater St. Louis has a significant regional IT workforce and diverse corporate, educational, and governmental resources. St. Louis has several key organizations that are heavily involved in cybersecurity including Scott AFB, Boeing, MasterCard, and others. The region’s many college and university computer science and MIS programs produce a large talent pool for employers. These assets, coupled with our exceptional telecommunications infrastructure, make St. Louis a very attractive IT and cybersecurity market.

As we look to build on our above successes, CyberSTL will create an ecosystem where private and public companies truly collaborate. An environment where start-ups, universities and colleges, nonprofits and workforce investment boards partner to strengthen our cyber footprint and lead the region to become the next “Cyber City.” CyberSTL will unite the region’s cybersecurity efforts into one voice. Together, we will educate, inform and update. As a collective, we will create measurements of success for the region and work as one to make those goals a reality.

Current CyberSTL Partners:
AAEAAQAAAAAAAAUyAAAAJGQ5OGM0YTE3LWU5NTQtNGNiNi1iMDVkLWE4NzVkOTE0ZjI3Yw    Six-Thirty-CYBER-Logo MWCCOE Official Logo no White Spaceiten_logoT-REX-logo

The Midwest Cyber Center’s August breakfast will provide three outcomes:

  1. Introduce the concept of CyberSTL and share our desired outputs and outcomes for 2016 and beyond
  2. Bring together the leadership of CyberSTL to share the roles of their organization in our collective effort
  3.  Highlight an already proven collective impact model established in the region, BioSTL

Run of Show for the Event

  • 7:30 – 8:00: Open Networking & Breakfast
  • 8:00 – 8:10: Welcome from MWCCOE & why CyberSTL is important
  • 8:10 – 8:15: Introduce Panel of Speakers
  • 8:15 – 8:35: Panel Discussion
  • 8:35 – 8:45: Discussion of BioSTL model and impact for region
  • 8:45 – 8:50: Goals for CyberSTL in 2016 and beyond
  • 8:50 – 9:00: Questions from attendees

Biographies of Speakers at Breakfast


Francis joined the ITEN at its opening, where his duties included recruitment of new client companies, management of TEC’s mentoring program, as well as directing the incubator’s growth and funding. In the for-profit arena, Mr. Chmelir held numerous positions in retail and business to business sales. Additionally, Mr. Chmelir has experience in human resources with an emphasis on employee training and development. These skills were utilized in his sales training jobs with various employers. Francis Chmelir’s educational background includes a bachelor’s degree from St. Louis University with an emphasis on organizational psychology as well as graduate work at the University of Missouri-St. Louis and University of Missouri-Columbia.

Vijay Chauhan

Vijay Chauhan is experienced Corporate Business Development Executive and a startup CEO of multiple companies in the Life Sciences space. He was CEO of companies in the Consumer Healthcare, Ag/Renewable Energy and Cancer Diagnostics space. He is leading BioSTL’s initiative, GobalSTL ( to attract companies from Israel and Ireland to St. Louis that are a fit with St. Louis corporations and investors. GlobalSTL’s mission is to be a gateway to St. Louis’ world-class corporate and innovation ecosystem and to deliver strategic partners to drive business growth in North America for the companies it attracts. To date 4 Israeli companies have setup US HQ in St. Louis. GlobalSTL has developed a strong platform for sourcing Cybersecurity innovation from Israel, a leader in Cybersecurity technology.


Jason is a retired United States Navy officer and Missouri native. During his 20-year Navy career, he earned two Master’s degrees in Military Operational Art and Science and Information Technology Management, and sailed on five deployments. A husband of one and father of five, Jason enjoys hunting, reading, and a good scotch or bourbon. He is competent at pool and bad at golf, though he aspires to greatness in each. He is an active member in his community and promoter and supporter of local industry. Jason is the President of the Board of the Aegis Strategies Foundation, the President of the Board of the Midwest Cyber Center of Excellence, Executive Vice President and Board Member of the Navy League – St. Louis Council, a Board Member of the Leadership Council Southwestern Illinois, Immediate Past President and Permanent Board Member of the Scott-St. Louis chapter of the Armed Forces Communications and Electronics Association (AFCEA), and a Ruling Elder at Providence Reformed Presbyterian Church in Sunset Hills, MO.  He serves on Industrial Advisory Boards for Washington University’s Sever Institute and Carrollton Bank.


As Executive Director of Midwest Cyber Center of Excellence (MWCCOE), Tony brings a wide variety of expertise, and a big desire to serve his community. Tony is responsible for building strong programs to engage veterans and students in the cyber industry and ensuring long-term viability of the organization’s mission. Prior to joining the MWCCOE, Tony was an original team member of the nationally recognized nonprofit organization, The Mission Continues. He built and managed all fundraising efforts resulting in multiple corporate partnerships and strong individual giving programs. Tony also served as a Military Police soldier in the United States Army for 9 years. During his time in service, Tony was selected to be the youngest Drill Sergeant in his organization and prepared over 2000 young men and women to serve their country.

June MWC² Cyber Breakfast

The conversation will provide a 20 minute look into challenges faced by Department of Defense, 20 minutes from a corporate perspective, and a 20 minute question and answer session. We have heard from many partners out and about the desire for these types of conversation so big or small businesses are all invited. The information shared will be educational and we believe attendees will leave better informed of ways to protect themselves.
Brigadier General Mitchel Butikofer – 

Official Photo- Brig Gen Mitchel Butikofer (U.S. Air Force Photo by Michael J Pausic)

Gen. Butikofer is the Director, Command, Control, Communications and Cyber (C4) Systems, U.S. Transportation Command, Scott Air Force Base, Illnois. He is responsible for the planning, integration, operations, and maintenance of USTRANSCOM’s C4 systems. He also serves as the command’s chief information officer, responsible for the investment strategy for all information technology resources. General Butikofer received his commission in 1989 through the Air Force Reserve Officer Training Corps at Utah State University.  His career highlights include two squadron commands; two group commands; wing command; various headquarters staffs; and the Air Staff and the Office of Secretary of Defense Staff.
Craig Byrkit –


Craig currently leads the Edward Jones Information Systems Threats and Vulnerability Department encompassing network security and incident response.  He successfully served in law enforcement for nearly 20 years, including 16 years with the Federal Bureau of Investigation.  He investigated cyber crimes throughout his FBI career.  As an experienced FBI leader, he developed and led the St. Louis FBI Cyber Task Force for many years.  He built a proven record of success directing the development of comprehensive cyber security strategies.  He is experienced in establishing threat based priorities and innovative best practices implemented by global corporations to reduce risk and mitigate emerging cyber threats.  He has expertise directing complex computer intrusion network incident response for global corporations through accurate cyber threat identification and in-depth intelligence analysis.  He is a St. Louis University advisory board member for the Computer Information Systems / Center for Workforce and Organizational Development board.  He is a Washington University Adjunct Professor for the School of Engineering and Applied Science Cyber Security Management program.  Formal education includes a doctorate degree, master’s degree in criminology and a bachelor’s degree.


Col Terrence Adams –

Adams 8x10_v1

Colonel Adams is the Commander, 375th Communications Group, Scott AFB, Illinois. He leads 725 personnel in two squadrons: the 375th Communications Support Squadron and the 375th Communications Squadron.  He is responsible for providing U.S. Transportation Command, Air Mobility Command, the Army’s Military Surface Deployment and Distribution Command, 18th Air Force, the 618th Air Operations Center, three total force flying wings and 28 tenants with innovative, cyberspace capabilities for their global reach missions.  His personnel operate and defend a cyberspace hub supporting systems and infrastructure for the Department of Defense at over 200 sites around the world. The unit also develops mission specific software to enhance mobility operations, monitors and maintains joint command and control systems and manages resources valued in excess of $2 billion dollars.

The program will run accordingly:

7:30 am  Registration, Breakfast & Networking
8:00 am  Presentation
9:00 am  End 

Thank you to our incredible host and sponsor, St. Louis Regional Chamber!