Find the Right Training for Each Job Role

As cyber threats continue to grow and ransomware attackers are more emboldened, the best defense is an organization that thinks “security” first, at all levels. Organizations can prepare for modern cyber threats through training and certification. The best approach to building a security-first culture is providing the right type of training to the right audience.

Build a Security-First Culture with Training for Each Role

 Job Role

Best Fit Training

Non-IT, General Worker

CertNexus CyberSAFE: This group of people do not specialize in information technology but represent the largest population of trainees. They are also the weakest link and the likely target of most security threats. CyberSAFE teaches basic behavioral modifications that will significantly reduce a company’s risk of breach. 

Application Developer

CertNexus Cyber Secure Coder (CSC): Application developers create tools that businesses and customers use, such as a website. Security by design principles taught in CSC can be applied to any development language and, when put into practice by the Application Developer, close “common holes” left in applications that hackers exploit. 

IoT Engineer/Developer 

CertNexus Certified Internet of Things Security Practitioner (CIoTSP): As many companies engineer and deploy IoT applications that leverage customer networks and the Internet, security risks increase exponentially. CIoTSP, or Certified IoT Security Practitioner, teaches how to build IoT applications that are secure. Imagine what could happen if someone hacked your IoT-enabled Smart TV. 

IT Security Specialist 


CompTIA Security+: Security Specialists require core cybersecurity knowledge. CompTIA Security+ provides just that by emphasizing both the practical and hands-on ability to identify and address security threats, attacks and vulnerabilities. 

CertNexus CyberSec First Responder (CFR): Security Specialists are on the front line and will likely be the First Responder when a breach occurs, and they will occur. CyberSec First Responder teaches the IT Professional how to Identify, Isolate, Remediate, and Prevent future occurrences of a threat.  

IT Security Auditor 


ISACA Certified Information Systems Auditor (CISA): Security Auditors review breaches and threats and determine the best course of action to reduce risk of future threats. Certified Information Systems Auditor (CISA) teaches the IT Auditor how to assess information systems, security controls, and vulnerabilities with improvement or “hardening” of systems’ security as the focus. 

IT Security Manager 

ISACA Certified Information Security Manager (CISM): IT professionals in management positions that include management of security professionals and/or processes require skills specific to the topic of security management. Certified Information Security Manager (CISM) is aimed at those professionals and prepares the candidate to sit for the ISACA CISM Certification Exam.


IT Security Director 

ISCCertified Information Systems Security Professional (CISSP): The Security Director sets strategy and policy for IT security within an organization.  Certified Information Systems Security Professional expands the knowledge of the candidate by exploring the essentials of each of the 8 domains of the Common Body of Knowledge for information systems security professionals, preparing them for leadership and policy setting roles. 


Senior Management


CertNexus IRBIZ: Senior Managers just need the basics. Incident Response for Business Professionals provides just that. Company executives and senior leaders are ultimately responsible for complying with incident response legislation. This course focuses on the knowledge, resources, and skills necessary to comply with incident response and incident handling process requirements. 



Data Privacy Officer (DPO)

Along with traditional IT infrastructure and application security, organizations of all sizes are beginning to call out data privacy (how data on customers and even employees is kept safe from and used ethically by those that SHOULD have access this information). Organizations that do work within the United States are often subject to various state and federal data privacy legislation, and any organization that has data on those residing in an EU country is required to be GDPR compliant. CertNexus Data Ethics for Business Professionals and
Certified Information Privacy Professional (CIPP/US)














































Get Started Now

Contact Us Today

3535 Winton Place
Rochester, NY 14623
 Email New Horizons Rochester

275 Northpointe Parkway,
Suite 1
Buffalo, NY 14228
 Email New Horizons Buffalo

445 Electronics Parkway,
Suite 206
Liverpool, NY 13088
 Email New Horizons Syracuse

2 Computer Drive West
Suite 102
Albany, NY 12205
 Email New Horizons Albany