Search Website

Validating credentials, please wait...
  • General Inquiries 1-571-481-9307

  • Fax 1-202-315-3003

Home

Course Catalog

Course Catalog

Browse through our latest course offerings

Course Catalog

3PAO/FedRAMP/Cloud Security

The 3-day Cloud Security and FedRAMP course provides students with an in-depth knowledge of cloud security requirements, cloud security issues, cloud computing architecture and security concepts for the three types of cloud computing, and provides the latest guidance for FedRAMP.

Duration: 3 Days

Certification Boot Camps

Security+ class will prepare your for the SY0-401 certification exam and  covers the most important foundational principles for securing a network and managing risk.

Duration: 5 Days

The (CAP) training and certification boot camp covers the exam objectives that tests the breadth and depth of a candidate’s knowledge by focusing on the seven domains which comprise the CAP CBK®, taxonomy of information security topics.

Duration: 3 Days

This is the worlds most advanced ethical hacking course with nineteen of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization.

Duration: 4 Days

This CISSP review seminar is the highest quality CISSP exam review available today. It is a comprehensive course discussing the entire Common Body of Knowledge relating to Information Systems Security, as determined by ISC(2).

Duration: 5 Days

Cyber Professionals

The 4-day instructor led course exposes students to exploits and and teaches them how to run vulnerability scans to better secure networks, servers and workstations.

Duration: 4 Days

This 2 day hands on course will focus on counterintelligence activities identified by The Comprehensive National Cybersecurity Initiative as it relates to DoD systems. Students will gain a working knowledge of detecting, deterring, neutralizing, and exploiting threats that could be introduced into a computing environment.

Duration: 2 Days

This 5 day course concentrates on providing cyber security specialists from various disciplines a baseline understanding across the major areas of cyber operations (network operations, defense, exploitation and attack) and planning.

Duration: 5 Days

This course provides executive leadership with a high-level overview of various aspects of Cybersecurity in the context of a modern and Internet-connected environment. Through lecture, demonstrations, and group discussion, you will gain a foundational perspective on the challenges of designing a cybersecurity program, implementing secure systems, and other factors needed for a comprehensive cybersecurity solution.

Duration: 4 Days

This hands-on 4-day course provides participants with a high-level overview of various aspects of Cybersecurity in the context of a modern and Internet-connected environment. Through lecture, hands-on exercises, and group discussion, you will gain a foundational perspective of various cyber security challenges.

Duration: 4 Days

Our hands-on course is designed to give students hands on experience with cyber tool deployments across multiple operating system platforms. Students will learn network defense and analysis techniques as well as methods to prevent network attacks.

Duration: 4 Days

The 4-day Ethical Hacking & Penetration Testing course provides students with intermediate level training in hacking and penetration testing techniques. The training immerses each student into a hand-on interactive environment where they will learn how to scan and attack with the purpose of securing networks and information systems.

Duration: 4 Days

This 3-day courseprovides participants with a high-level overview of various aspects of Software Assurance in the context of a modern and Internet-connected environment. Through lecture, hands-on exercises, and group discussion, you will gain a foundational perspective of various software assurancechallenges.

Duration: 3 Days

In this course, students will learn how to implement practical solutions for identifying, assessing, and preventing external and internal threats to networks.

Duration: 4 Days

This course is focused on a series of hands-on activities that will provide active learning in the security and securing of virtual machines and hosts. Upon completion, students will be able to apply the concepts and ensure that their organization can implement a new, secure virtual environment or apply appropriate security controls to an existing virtual environment.

Duration: 4 Days

This self-paced course will cover how to respond to a network security incident, The Incident Response Life Cycle, Legal and ethical considerations in terms of accessing data during a breach, and How an organization can use data from past incidents to strengthen their defenses This course does not cover Penetration Testing or Hacking Back.

Duration: Self-Paced

This course will assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively.

Duration: 4 Days

This course will provide an overview of the updated information security and information technology audit requirements based on the Federal Information Security Management Act (FISMA) inspector general reporting requirements; NIST Special Publication 800-53A, Guide for Assessing the Security Controls in Federal Information Systems; and Federal Information System controls Audit Manual (FISCAM).

Duration: 4 Days

This course is designed to provide a solid foundation that covers both the defensive and offensive aspects of cybersecurity. During this hands-on workshop, students will learn fundamentals of the relevant technologies and methods used to counter the most prevalent threats of this day.

Duration: 4 Days

In this 3-day workshop, students will focus on how developing and implementing a Risk Assessment process can increase the effectiveness of an organization’s IS program. This class is specifically designed around the NIST SP 800-30 Rev. 1, Guide for Conducting Risk Assessments.

Duration: 3 Days

The Malware Analysis course is a 100 level course. While intermediate topics and course material will be discussed, it is wholly designed for students interested in Basic Malware Analysis Techniques. Lunarline’s 3 day hands on course will provide students demos and lessons on basic/static analysis methodologies, conducting open source research online and real-life examples of malware capabilities and characteristics.

Duration: 3 Days

This course provides the student the concepts, methodologies, and hands-on tools to analyze network traffic for the purposes of focused operations, cyber operations, pen testing, intrusion detection, and incident response. Each student will be provided an overview on how packet analysis applies to their cyber security position.

Duration: 4 Days

This hands-on 3 day Python programming course provides students with the knowledge and training to develop and maintain effective Python programs/scripts. Students will learn to create Python scripts using functions, modules, classes, and much more as part of Python’s object-orientated paradigm.

Duration: 3 Days

This course is designed to provide an operational basis for all facets of recovery planning through information delivery and practical exercises. As a result of this course, students will be able to conduct risk analysis, business impact analysis, recovery strategy analysis and develop viable emergency response plans and recovery plans through the information obtained as a result of these assessments.

Duration: 5 Days

Upon completion of this course, you should have a basic understanding of the FISMA requirements, the risk management framework process, the assessment methods related to information security system owners, and the assessment procedures for NIST security controls related to information system owners.

Duration: Self-Paced

Upon completion of this course, you should have a basic understanding of the FISMA requirements, the risk management framework process, the assessment methods related to information system owners, and the assessment procedures for NIST security controls related to information system owners.

Duration: Self-Paced

The training is segmented into six modules. Each module will cover specifics you need to be aware of as a System Administrator. We’ll cover the many Laws, Policies, and Guidance that are available. At this point in your career, you should have a good understanding of the Cybersecurity Awareness and Essentials as we provide a brief overview.

Duration: Self-Paced

In order to secure develop web applications and websites, it is necessary to understand the underlying technologies. In order to assess risk posture, it is crucial to see these systems from the same perspective as the attackers. Attackers leverage deep knowledge of complex technology to achieve their goals; the defenders need to be similarly equipped.

Duration: Self-Paced

This course is designed as a system hardening overview with enough details and hands on learning to add new tools to even the most seasoned administrator’s tool belt.

Duration: 4 Days

Lunarline’s 4 day hands on course will focus on understanding exploits and vulnerabilities in a Wireless network. Students will gain knowledge to design and implement a secured wireless infrastructure while ensuring confidentiality, integrity, and availability.

Duration: 4 Days

The System Admin/Developer course gives an introduction into the Federal Information System Management Act methodology. The course will help identify the assessment procedures and methods related to the roles of System Administrator and Developer. Course participants will also come away with knowledge of the security controls related to the System Admin and Developer roles.

Duration: TBD

This 4 day hands-on course will assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. Students will learn incident handling, particularly for analyzing incident-related data and determining the appropriate response.

Duration: 4 Days

This course will assist organizations in establishing log management and auditing policies and procedures to discover and handle incidents efficiently and effectively. Students will learn log management, particularly skills for analyzing system related log data.

Duration: 3 Days

Health Care

This course will examine HIPAA from an executive’s perspective, and will demonstrate that a weak or nonexistent HIPAA compliance program can (and will likely be) be catastrophic for business.

Duration:  TBD
Price: Contact us for more information

With the requirement to move medical records into electronic formats, IT professionals are a vital aspect to a successful HIPAA compliance program.  This course will include practicums designed to provide students with hands-on HIPAA requirement implementations.

Duration:  TBD
Price: Contact us for more information

This course covers all the key elements of HIPAA, and ensures that managers have the HIPAA expertise necessary to do their jobs. This course effectively combines the general and the specific by discussing overarching HIPAA principles in addition to essential details.

Duration:  TBD
Price: Contact us for more information

This course is designed for health care practitioners, and takes a practical approach to understanding HIPAA’s Privacy Rule.

Duration:  TBD
Price: Contact us for more information

Privacy

This course offers vital training to federal agencies given compliance with key Federal privacy-related laws, Office of Management and Budget (OMB) memoranda, and requirements of the National Institute of Standards and Technology (NIST) Special Publications (SP) 800-53 Revision 4, Appendix J, are critical to maintaining successful privacy programs.

Duration:  TBD
Price: Contact us for more information

Global Privacy Training is one of many privacy courses taught by Lunarline’s School of Cyber Security. We provide a robust range of professional and technical services to assist you in protecting personally identifiable information (PII) or Personal Data; protected health information (PHI); electronic health records (EHR); protected financial information; sensitive or special categories of data; and intellectual property (IP).

Duration:  TBD
Price: Contact us for more information

Highlights of Federal Privacy is one of many privacy courses taught by Lunarline’s School of Cyber Security. We provide a robust range of professional and technical services to assist you in protecting personally identifiable information (PII) or Personal Data; protected health information (PHI); electronic health records (EHR); protected financial information; sensitive or special categories of data; and intellectual property (IP).

Duration:  TBD
Price: Contact us for more information

This course provides HIPAA and HITECH fundamentals and explains in detail the Safeguards of HIPAA’s Security Rule and the use and disclosure requirements of the Privacy Rule. The course will also identify what entities are subject to the HIPAA / HITECH requirements, address the government’s penalty structure, and how the “meaningful use” of healthcare data enters the picture.

Duration:  TBD
Price: Contact us for more information

Privacy for Human Resource (HR) Management Personnel is one of many privacy courses taught by Lunarline’s School of Cyber Security. We provide a robust range of professional and technical services to assist you in protecting personally identifiable information (PII) or Personal Data; protected health information (PHI); electronic health records (EHR); protected financial information; sensitive or special categories of data; and intellectual property (IP).

Duration:  TBD
Price: Contact us for more information

rivacy for Information Technology/Information System Security (IT/ISS) Professional is one of many privacy courses taught by Lunarline’s School of Cyber Security. We provide a robust range of professional and technical services to assist you in protecting personally identifiable information (PII) or Personal Data; protected health information (PHI); electronic health records (EHR); protected financial information; sensitive or special categories of data; and intellectual property (IP).

Duration:  TBD
Price: Contact us for more information

Privacy for Legal Personnel is one of many privacy courses taught by Lunarline’s School of Cyber Security. We provide a robust range of professional and technical services to assist you in protecting personally identifiable information (PII) or Personal Data; protected health information (PHI); electronic health records (EHR); protected financial information; sensitive or special categories of data; and intellectual property (IP).

Duration:  TBD
Price: Contact us for more information

Privacy for Medical Personnel is one of many privacy courses taught by Lunarline’s School of Cyber Security. We provide a robust range of professional and technical services to assist you in protecting personally identifiable information (PII) or Personal Data; protected health information (PHI); electronic health records (EHR); protected financial information; sensitive or special categories of data; and intellectual property (IP).

Duration:  TBD
Price: Contact us for more information

This course is an introduction to privacy.  Students will learn what “privacy” means in the context of both government and industry.  Key federal statutes will be identified and discussed, several privacy frameworks will be examined, and privacy documentation such as Privacy Impact Assessments and System of Record Notices will be explained.

Duration: 3 Days

System Compliance Assessment Methodology for NIST 800-53 App J is one of many privacy courses taught by Lunarline’s School of Cyber Security. We provide a robust range of professional and technical services to assist you in protecting personally identifiable information (PII) or Personal Data; protected health information (PHI); electronic health records (EHR); protected financial information; sensitive or special categories of data; and intellectual property (IP).

Duration:  TBD
Price: Contact us for more information

Social Media and Privacy is one of many privacy courses taught by Lunarline’s School of Cyber Security. We provide a robust range of professional and technical services to assist you in protecting personally identifiable information (PII) or Personal Data; protected health information (PHI); electronic health records (EHR); protected financial information; sensitive or special categories of data; and intellectual property (IP).

Duration:  TBD
Price: Contact us for more information

System of Records Notification (SORN) Privacy Training is one of many privacy courses taught by Lunarline’s School of Cyber Security. We provide a robust range of professional and technical services to assist you in protecting personally identifiable information (PII) or Personal Data; protected health information (PHI); electronic health records (EHR); protected financial information; sensitive or special categories of data; and intellectual property (IP).

Duration:  TBD
Price: Contact us for more information

Courses – RMF for DoD & Intelligence Communities

The Intro to RMF for Program Managers course is a high-level, 2-day executive level training which provides an introduction to Risk Management Framework (RMF), including a review of the laws, policy, and regulations that govern the process, the roles and responsibilities associated with the RMF, introducing risk, the 6 steps, planning for an assessment, and the documentation and artifacts required. It will primarily focus on the PM’s role on the RMF process and the impact that it can have to the cost, timeline and authorization to operate (ATO).

Duration: 2 Days

The Introduction to Risk Management Framework (RMF) for Program Managers course is a high-level, 2 hour executive level training which provides an introduction to Risk Management Framework (RMF), including a review of the laws, policy, and regulations that govern the process, the roles ad responsibilities associated with the RMF, introducing risk, the 6 steps, planning for an assessment, and the documentation and artifacts required.

Duration: Self-Paced

This 4-day course concentrates on methods used to validate DoD IA Controls as contained in NIST 800-53, Rev. 4 and CNSSI 1253.  Discussion areas include an overview of the RMF for Intelligence Communities and DoD Security Controls Assessors, the DoD-defined information system types and the associated security concerns, vulnerability scanning, DoD-approved automated scanning tools, and many more.

Duration: 4 Days

This hands-on training will enable your organization to understand the proposed changes and to position yourself early to make the transition as seamless and efficient as possible.

Duration: 4 Days

This training offers the most comprehensive and detailed hands-on training for students who want to gain an understanding of the pending transition from DIACAP to RMF for DoD IT. It will enable your organization to understand the proposed changes and to position yourself early to make the transition as seamless and efficient as possible.

Duration: 3 Days

This course equips the student with an overview of the system assessment and authorization process (formerly known as C&A) and the Risk Management Framework for National Security Systems (NSS).

Duration: 1 Day
Price: $500.00

Students will gain an understanding of the new processes, preparation of the documentation, and execution of the required security control assessments.  This training will enable your organization to understand the proposed changes and to position yourself early to make the transition as seamless and efficient as possible.

Duration: Self-Paced

The RMF for Executives course is a high-level, 2-day executive level training which provides an introduction to Risk Management Framework (RMF), including a review of the laws, policy, and regulations that govern the process, the roles and responsibilities associated with the RMF, introducing risk, the 6 steps, Defense-in-Depth, and understanding the documentation and artifacts required. It will primarily focus on the executives role in the RMF process and the impact they can have to the cost, timeline and authorization to operate (ATO). This course will also be tailored to the US Navy RMF Process Guide.

Duration: 2 Days

 

Risk Management Framework for Federal Systems

This 4 day course provides an in-depth look at testing the controls using NIST SP 800-53A Rev. 4 and ensuring the use of the Risk Management Framework (RMF) for Federal Security Systems.

Duration: 4 Days

In this course students will participate in a series of scenario-based hands-on exercises to enhance understanding of the processes used for system authorization, including all of the elements of the Risk Management Framework.

Duration: 4 Days

This training equips the students with an in-depth indoctrination into the RMF and they will learn the requirements for managing risk, and ensuring that the confidentiality, availability and integrity of federal information and information systems is protected at a level commensurate with the security requirements of the information and the information system.

Duration: 3 Days

This course provides students a practical high-level overview of the NIST approach to system authorization,  an introduction to the requirements for meeting FISMA requirements, as well as an in-depth look of the Federal system authorization process and Risk Management Framework (RMF).

Duration: 1 Day

Special Access Programs

Lunarline’s SAP C&A Transition training provides students with a fundamental knowledge of the requirements for transitioning from the DIACAP/JAFAN/DCID C&A process to the NIST/CNSS requirements.

Duration: 3  Days

Self-Paced eLearning

The Cyber Security Engineering and Architecture is a high-level, 2-hour training for Information Security Architects and Information System Security Engineers. This course provides knowledge necessary for architects and engineers to understand and apply cyber security best practices to the systems through the entire life cycle. Topics discussed include data security, secure operation and maintenance of IT systems and networks, compliance activities, risk management, and application security.

Duration:  Self-Paced
**Available May 1, 2017**

The Cyber Security Fundamentals course is a high-level, 2-hour training designed to introduce the various aspects of cybersecurity in the context of a modern, internet-connected environment. Participants in this course will gain a fundamental understanding of the various challenges of designing a cybersecurity program, implementing and maintaining secure systems, and the many demands of a comprehensive cybersecurity solution.

Duration:  Self-Paced
**Available April 1, 2017**

The Cyber Security Implementation course is a high-level, 2-hour training for system administrators, network administrators, database administrators, and infrastructure support technicians. This course provides an overview of techniques that can be applied to ensure data security, perform incident management activities, guide digital forensic operations, and assist in secure operation and maintenance of IT systems.

Duration:  Self-Paced
**Available May 1, 2017**

The Cyber Security Managers course is a high-level, 2-hour training aimed at providing managers, Authorizing Officials, System Owners, and Information Owners with fundamental cyber security knowledge. Key topics discussed in this course include compliance, enterprise continuity, data security, and risk management.

Duration:  Self-Paced
**Available May 1, 2017**

This course will cover how to respond to a network security incident, The Incident Response Life Cycle, Legal and ethical considerations in terms of accessing data during a breach, and How an organization can use data from past incidents to strengthen their defenses This course does not cover Penetration Testing or Hacking Back.

Duration:  Self-Paced

The Intro to RMF for Program Managers course is a high-level, 2 hour executive level training which provides an introduction to Risk Management Framework (RMF), including a review of the laws, policy, and regulations that govern the process, the roles ad responsibilities associated with the RMF, introducing risk, the 6 steps, planning for an assessment, and the documentation and artifacts required.

Duration:  Self-Paced

The course objective is to gain insight into common controls that are used within the risk management framework process.

Duration:  Self-Paced

Students will engage in a series of hands-on activities that will provide active learning of the new processes, preparation of the documentation, and execution of the required security control assessments.  This training will enable your organization to understand the proposed changes and to position yourself early to make the transition as seamless and efficient as possible.

Duration:  Self-Paced

Upon completion of this course, you should have a basic understanding of the FISMA requirements, the risk management framework process, the assessment methods related to information system owners, and the assessment procedures for NIST security controls related to information security system owners.

Duration:  Self-Paced

Upon completion of this course, you should have a basic understanding of the FISMA requirements, the risk management framework process, the assessment methods related to information system owners, and the assessment procedures for NIST security controls related to information system owners.

Duration:  Self-Paced

The training is segmented into six modules. Each module will cover specifics you need to be aware of as a System Administrator.  We’ll cover the many Laws, Policies, and Guidance that are available.  At this point in your career, you should have a good understanding of the Cybersecurity Awareness and Essentials as we provide a brief overview.

Duration:  Self-Paced

In order to secure develop web applications and websites, it is necessary to understand the underlying technologies. In order to assess risk posture, it is crucial to see these systems from the same perspective as the attackers. Attackers leverage deep knowledge of complex technology to achieve their goals; the defenders need to be similarly equipped.

Duration:  Self-Paced