Print Page   |   Contact Us   |   Sign In   |   Register
Certification Programs



The WBA has teamed up with SBS Cybersecurity to provide educational programs that will certify a banker has the knowledge and skills to protect against today's information.


The certification programs offered by the institute are uniquely designed to address community banking needs, using community banking problems and solutions. Properly trained banking professionals will improve the security around customer data and other sensitive information entrusted to them. The certification communicates to management, the board, stakeholders, and examiners, that a professional can perform the necessary functions to manage and reduce risk to the bank.


Learning Paths


Course Delivery Options

Online Courses - click on each title to register for the online option.

              Online Schedule: 7/22/19, 10/24/19

              What you will learn:

  • Laws and Regulations
  • Complete a Business Impact Analysis
  • Complete a Risk Assessment
  • Business Continuity Plan Management and Testing
  • Pandemic Preparedness
  • Incident Response
  • Backup Planning

              Online Schedule: 8/20/19, 11/18.19

              The Certified Banking Cybersecurity Manager certification course will focus specifically on each element of the FFIEC Cybersecurity Assessment Tool, issued June 30th, 2015. This course will build a solid foundation of understanding for the FFIEC guidance,  cyber risk management practices, improving your information security program for cyber threats, and clear auditing expectations to address this new guidance. In addition to thoroughly exploring each element of the FFIEC guidance we will complete detailed lab exercises that demonstrate how each process works. Students should be able to complete their actual assessment for their institution as part of the course. This is a management level course that touches on critical knowledge needed for c-level, CEO’s, and Information Security Officers.

              Online Schedule: 9/17/19, 12/11/19

              What you will learn:

  • The four step process information gathering, scanning, exploitation, and post exploitation
  • How attackers leverage the web
  • Post scanning, fingerprinting, and versioning techniques
  • Vulnerability scanning with Nessus
  • Exploitation and privilege escalation utilizing John the Ripper
  • Exploitation with Metasploit
  • Exploiting the human by "hacking" users
  • Post exploitation and meterpreter

              Online Schedule: 8/29/19, 11/26/19

              What you will learn:

  • Data Retention
  • RAM Acquisition
  • Forensic Tools
  • Internal Investigation
  • Windows Forensics
  • Email Investigation       

              Online Schedule: 7/11/19, 10/16/19

              What you will learn:

  • Incident Response Overview and Regulations
  • Incident Response Policy
  • Preserving Evidence and Data
  • RAM Acquisition
  • Corporate Account Takeover
  • Data Breech

              Online Schedule: 8/9/19, 11/8/19

              What you will learn:

  • Hot Topics in Technology, Security, and Fraud
  • Risk Management
  • Policy and Procedures
  • Audit Programs

              Online Schedule: 8/1/19, 11/1/19

              What you will learn:

  • U.S. Information Security Laws and Regulations
  • Information Security Program Components
  • Security Awareness Programs
  • IT Audit
  • Social Engineering
  • Preparing for you IT Examinations
  • Running Effective IT and Audit Committees    

              Online Schedule: 7/1/19, 10/8/19
              What you will learn:

  • Incident Response Procedures
  • System Hardening
  • Mobile Device Management
  • Penetration and Vulnerability Testing
  • Patch Management
  • Social Engineering Testing
  • Perimeter, Network, and Endpoint Security
  • Data Backup and Replication 

              Online Schedule: 9/9/19, 12/2/19

              What you will learn:

  • Vendor Breaches, Laws, and Regulations
  • Information Security Program and Risk Management
  • Selection of Vendors
  • Ongoing Vendor Management
  • Creating a Dynamic Vendor Management Program
  • Contract Structuring
  • IT Audit and Exam Preparation

              Online Schedule: 9/24/19

              What you will learn:

  • Regulatory Overview and Vulnerability Assessments
  • Vulnerability Assessment Tools
  • Perimeter Network Testing
  • Web Application Vulnerability Testing
  • Introduction to Packet Capture and Analysis
  • Remediation, Reporting and Action Tracking
  • Cloud, Remote Access and VPN Considerations                                          


Membership Management Software Powered by YourMembership  ::  Legal