fbpx

Cyber Training

Web Based Training (WBT)

 


You’ll have access to these courses every minute of the day.
Our “Cybersecurity” courses offer in-depth, practical video training that is led by some of the most experienced  instructors in the world.
These Courses are Eligible for Continuing Professional Education Credit (CPE).
High Definition Video (HDV)

Providing you with a clear and colorful personal learning experience.

 
 
 
HDV with Audio

Providing audio to the text presentation keeps all of your senses engaged in the learning experience.

 
 
 
HTML5

Providing your with Text and Images on a Video-Centric Delivery format presentable on all your stationary and mobile devices.

 
 
 
Instructor Led

Providing you with a face-to-face with the instructor sharing decades of wisdom.

Cybersecurity and Access Control

CPE = 20 hours

This course is designed for key personnel responsible for the management and implementation of the Cyber Security/Computer Security in their organization. This course will provide a practical and historical reference to all relevant legislation and guidance.  In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus.

Cyber Security/Computer Security measures and controls that ensure confidentiality, integrity, and availability (CIA) of informationsystem assets including hardware, software, firmware, and information being processed, stored, and communicated.

Cyber Security Overview

  • Introduction
  • Computer Crime
  • Threats, Vulnerabilities, and Risk
  • Threats, Vulnerabilities, and Countermeasure Example
  • Applicable Laws, Policies, Directives, and Standards
  • ISO-OSI Model
  • Protection Rings
  • Computer Components
  • Operating System Security
  • Operating System Hazards
  • Help for Operating Systems
  • Application Security
  • Web Security Client-Side Attacks
  • Web Security Server-Side Attacks
  • Database Security
  • Application Security Tools
  • Access Control Authorization
  • Access Control
  • Access Control Models
  • Authentication
  • Audit
Cryptography

CPE = 20 hours

This course is designed for key personnel responsible for the management and implementation of the cryptography in their organization. This course will provide a practical and historical reference to all relevant legislation and guidance.  In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus.

Cryptography Overview

  • Purpose, Goals, and Objectives
  • Definitions
  • History
  • Fundamentals
  • Encryption Methods
  • Symmetric Key Concepts
  • Asymmetric Key Concepts
  • Hash Functions
  • Key Management
  • Practical Usage
  • Product Type
  • Algorithms
  • FIPS 140-2
  • Other Uses for Encryption
  • Attacks

Telecommunications and Network Security

CPE = 20 hours

This course is designed for key personnel responsible for the management and implementation of the Cyber Security/Computer Security in their organization. This course will provide a practical and historical reference to all relevant legislation and guidance.  In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus.

Cyber Security/Computer Security measures and controls that ensure confidentiality, integrity, and availability (CIA) of information system assets including hardware, software, firmware, and information being processed, stored, and communicated.

Network Security Overview

  • Defining Network Security
  • Computer Crime
  • Threats, Vulnerabilities, and Risk
  • Applicable Laws, Policies, Directive and Standards
  • Network Architecture
  • Network Topologies
  • Network Protocol
  • Network Security
  • ISO/OSI Model
  • Bridges, Routers, and Gateways
  • Operating System Hardening
  • Network Services
  • Web Security
  • Database Security
  • Application Security

Information Security and Risk Management

CPE = 10 hours

This course is designed for key personnel responsible for the management and implementation of the Cyber Security/Computer Security in their organization. This course will provide a practical and historical reference to all relevant Information Security and Risk Management guidance.  In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus.

Information Security and Risk Management measures and controls that ensure confidentiality, integrity, and availability (CIA) of information system assets including hardware, software, firmware, and information being processed, stored, and communicated.

Information Security and Risk Management Overview

  • Introduction
  • Confidentiality, Integrity, and Availability (CIA)
  • Computer Crime
  • Threats, Vulnerabilities, and Risk
  • Applicable Laws, Policies, Directives, and Standards
  • Change Control
  • Protection Rings
  • Data Classification
  • Employment Policies and Practices
  • Roles and Responsibilities
  • Information Security Policies
  • Risk Management
  • Security Awareness Training
  • Security Management Planning

Application Security

CPE = 10 hours

This course is designed for key personnel responsible for the management and implementation of the Application Security in their organization.  This course examines the security components within operating systems and applications and how to best develop and measure their effectiveness.    It looks at software life cycles, change control, and application security.   In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus.  It looks at software life cycles, change control, and application security.

Cyber Security/Computer Security measures and controls that ensure confidentiality, integrity, and availability (CIA) of information system assets including hardware, software, firmware, and information being processed, stored, and communicated.

Application Security Overview

  • Introduction
  • Confidential, Integrity, and Availability
  • Threats, Vulnerabilities, and Risk
  • General Security Principles
  • Security Considerations in the SDLC
  • Operating System Security
  • Application System Development
  • Application Security
  • Web Security Client-Side Attacks
  • Web Security Server-Side Attacks
  • Database Security
  • Application Security Tools
Risk Management Framework (RMF) Process – NIST SP 800-37 Rev 1 – (Introduction)
CPE = 5 hours

This course is designed for key personnel responsible for the management and implementation of the NIST SP 800-37 Rev 1 Risk Management Framework (RMF) process. This course will provide a practical and historical reference to all relevant legislation and guidance. In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus.

Who Should Attend:

Commercial Organizations as well as Federal Government Information Security and IT managers; Information Assurance Officers and Managers; Information Security Analysts, Consultants and Contractors; Security and Certification Officials responsible for developing Security Authorization Packages (SAP).

Risk Management Framework (RMF) Overview

  • Introduction
  • Definitions
  • Security Disciplines
  • Fundamentals
  • Introduction for RMF-Steps 1 through 6
Risk Management Framework (RMF) Process – NIST SP 800-37 Rev 1 – (Advance)

CPE = 20 hours

This class is designed for key personnel responsible for the management and implementation of the NIST SP 800-37 Rev 1 Risk Management Framework (RMF) process. This course will provide a practical and historical reference to all relevant legislation and guidance. In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus.

Prerequisite: Fundamentals of Information Security or How to Manage an Information Security Program, or equivalent experience.

Who Should Attend:

Commercial Organizations as well as Federal Government Information Security and IT managers; Information Assurance Officers and Managers; Information Security Analysts, Consultants and Contractors; Security and Certification Officials responsible for developing Security Authorization Packages (SAP).

Risk Management Framework (RMF) Overview

  • Introduction
  • Major Changes-Accountability
  • Major Changes-Standardization
  • Major Changes-Certification
  • Major Changes-President Executive Order
  • Definitions
  • Security Disciplines
  • Fundamentals
  • Introduction for RMF
  • RMF Process-Step 1
  • RMF Process-Step 2
  • RMF Process-Step 3
  • RMF Process-Step 4
  • RMF Process-Step 5
  • RMF Process-Step 6
Major Changes in Cyber Security 

CPE = 1 hour

This class is designed for Cyber Security Professionals responsible for the management and implementation of the NIST SP 800-37 Rev 1 Risk Management Framework (RMF) process. This course will provide a look at the Major Changes in Cyber Security.

Who Should Attend:

Commercial Organizations as well as Federal Government Information Security and IT managers; Information Assurance Officers and Managers; Information Security Analysts, Consultants and Contractors; Security and Certification Officials responsible for developing Security Authorization Packages (SAP).

Major Changes Overview

  • Introduction
  • Accountability
  • Standardization
  • Certification
  • President Executive Order
Authorizing Official (AO) Handbook

CPE = 5 hours

This course provides an overview of the Authorizing Official (AO) role in the Risk Management Framework (RMF) process, discusses implications of performing AO duties and emphasizing RMF as a continuous process.  In addition, it provides guidance for analyzing the Security Authorization Package (SAP) and making the authorization decision.  It provides a means to protect the information system (IS), the information it processes, and thus, the Authorization Official from civil prosecution (or if appropriate military prosecution) by providing evidence of the AO’s intentions to manage the system’s risk.

Relay authorization information regarding:

  • Why is authorization essential?
  • The players and available resources.
  • The AO’s role and responsibilities.
  • The authorization process [Risk Management Framework (RMF)].
  • Instill awareness of professional accountability and personal liability.
AO Handbook Overview
  • Introduction
  • Terminology
  • Threat, Vulnerability, and Risk
  • Applicable Laws, Policies, Directives, and Standards
  • Roles and Responsibilities
  • Authorizing Official Challenges
  • Risk Management Framework (RMF)
  • RMF Phase I – Implementation
  • RMF Phase II – Assessment
  • RMF Phase III – Authorization
  • RMF Phase IV – Continuous Monitoring
Independent Testing for Risk Management Framework (RMF) Assessment Test Plan (ATP)

CPE = 10 hours

This course describes the method by which the security controls will be assessed.  In addition, the test methodology, test procedures, and test tools are described to ensure consistency and repeatability of the assessment process.  The execution of this plan provides the assessment results, which are used as the basis for the decision by the Authorizing Official.

This course is primarily aimed at Information Assurance (IA) and Cyber Professionals that have been given the task of assessing or auditing the cyber profile of their assets.  However, not all organizations have the luxury of a having a formally trained, full-time IA/Cyber expert on-staff.  In many cases, programmers, network engineers, system administrators, managers and even users are given the undoubting task of performing security duties.  This course attempts to address the subject in a way that fulfills the needs of all of you, regardless of your level of experience.

Independent Testing, ATP, Overview
  • Introduction
  • Terminology
  • Threat, Vulnerability, and Risk
  • Applicable Laws, Policies, Directives, and Standards
  • Roles and Responsibilities
  • Risk Management Framework (RMF)
  • Assessment Environment
  • Assessment Methodology
  • RMF Phase I – Implementation
  • RMF Phase II – Assessment
  • RMF Phase III – Authorization
  • RMF Phase IV – Continuous Monitoring