Web Based Training (WBT)
|
You’ll have access to these courses every minute of the day.
Our “Cybersecurity” courses offer in-depth, practical video training that is led by some of the most experienced instructors in the world.
These Courses are Eligible for Continuing Professional Education Credit (CPE).
|
|
|||
|
|
High Definition Video (HDV)
Providing you with a clear and colorful personal learning experience. |
|||
HDV with Audio
Providing audio to the text presentation keeps all of your senses engaged in the learning experience. |
|
|||
|
HTML5
Providing your with Text and Images on a Video-Centric Delivery format presentable on all your stationary and mobile devices. |
|||
Instructor Led
Providing you with a face-to-face with the instructor sharing decades of wisdom. |
|
|||
Cybersecurity and Access ControlCPE = 20 hoursThis course is designed for key personnel responsible for the management and implementation of the Cyber Security/Computer Security in their organization. This course will provide a practical and historical reference to all relevant legislation and guidance. In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus. Cyber Security/Computer Security measures and controls that ensure confidentiality, integrity, and availability (CIA) of informationsystem assets including hardware, software, firmware, and information being processed, stored, and communicated. Cyber Security Overview
|
Cryptography
CPE = 20 hours This course is designed for key personnel responsible for the management and implementation of the cryptography in their organization. This course will provide a practical and historical reference to all relevant legislation and guidance. In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus. Cryptography Overview
|
Telecommunications and Network SecurityCPE = 20 hoursThis course is designed for key personnel responsible for the management and implementation of the Cyber Security/Computer Security in their organization. This course will provide a practical and historical reference to all relevant legislation and guidance. In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus. Cyber Security/Computer Security measures and controls that ensure confidentiality, integrity, and availability (CIA) of information system assets including hardware, software, firmware, and information being processed, stored, and communicated. Network Security Overview
|
Information Security and Risk ManagementCPE = 10 hoursThis course is designed for key personnel responsible for the management and implementation of the Cyber Security/Computer Security in their organization. This course will provide a practical and historical reference to all relevant Information Security and Risk Management guidance. In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus. Information Security and Risk Management measures and controls that ensure confidentiality, integrity, and availability (CIA) of information system assets including hardware, software, firmware, and information being processed, stored, and communicated. Information Security and Risk Management Overview
|
Application SecurityCPE = 10 hoursThis course is designed for key personnel responsible for the management and implementation of the Application Security in their organization. This course examines the security components within operating systems and applications and how to best develop and measure their effectiveness. It looks at software life cycles, change control, and application security. In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus. It looks at software life cycles, change control, and application security. Cyber Security/Computer Security measures and controls that ensure confidentiality, integrity, and availability (CIA) of information system assets including hardware, software, firmware, and information being processed, stored, and communicated. Application Security Overview
|
Risk Management Framework (RMF) Process – NIST SP 800-37 Rev 1 – (Introduction)
CPE = 5 hours
This course is designed for key personnel responsible for the management and implementation of the NIST SP 800-37 Rev 1 Risk Management Framework (RMF) process. This course will provide a practical and historical reference to all relevant legislation and guidance. In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus. Who Should Attend: Commercial Organizations as well as Federal Government Information Security and IT managers; Information Assurance Officers and Managers; Information Security Analysts, Consultants and Contractors; Security and Certification Officials responsible for developing Security Authorization Packages (SAP). Risk Management Framework (RMF) Overview
|
Risk Management Framework (RMF) Process – NIST SP 800-37 Rev 1 – (Advance)
CPE = 20 hours This class is designed for key personnel responsible for the management and implementation of the NIST SP 800-37 Rev 1 Risk Management Framework (RMF) process. This course will provide a practical and historical reference to all relevant legislation and guidance. In addition, interactive workshops during the course will engage students to directly participate, thus ensuring a higher degree of retention and focus. Prerequisite: Fundamentals of Information Security or How to Manage an Information Security Program, or equivalent experience. Who Should Attend: Commercial Organizations as well as Federal Government Information Security and IT managers; Information Assurance Officers and Managers; Information Security Analysts, Consultants and Contractors; Security and Certification Officials responsible for developing Security Authorization Packages (SAP). Risk Management Framework (RMF) Overview
|
Major Changes in Cyber Security
CPE = 1 hour This class is designed for Cyber Security Professionals responsible for the management and implementation of the NIST SP 800-37 Rev 1 Risk Management Framework (RMF) process. This course will provide a look at the Major Changes in Cyber Security. Who Should Attend: Commercial Organizations as well as Federal Government Information Security and IT managers; Information Assurance Officers and Managers; Information Security Analysts, Consultants and Contractors; Security and Certification Officials responsible for developing Security Authorization Packages (SAP). Major Changes Overview
|
Authorizing Official (AO) Handbook
CPE = 5 hours This course provides an overview of the Authorizing Official (AO) role in the Risk Management Framework (RMF) process, discusses implications of performing AO duties and emphasizing RMF as a continuous process. In addition, it provides guidance for analyzing the Security Authorization Package (SAP) and making the authorization decision. It provides a means to protect the information system (IS), the information it processes, and thus, the Authorization Official from civil prosecution (or if appropriate military prosecution) by providing evidence of the AO’s intentions to manage the system’s risk. Relay authorization information regarding:
AO Handbook Overview
|
Independent Testing for Risk Management Framework (RMF) Assessment Test Plan (ATP)
CPE = 10 hours This course describes the method by which the security controls will be assessed. In addition, the test methodology, test procedures, and test tools are described to ensure consistency and repeatability of the assessment process. The execution of this plan provides the assessment results, which are used as the basis for the decision by the Authorizing Official. This course is primarily aimed at Information Assurance (IA) and Cyber Professionals that have been given the task of assessing or auditing the cyber profile of their assets. However, not all organizations have the luxury of a having a formally trained, full-time IA/Cyber expert on-staff. In many cases, programmers, network engineers, system administrators, managers and even users are given the undoubting task of performing security duties. This course attempts to address the subject in a way that fulfills the needs of all of you, regardless of your level of experience. Independent Testing, ATP, Overview
|