Search Website

Validating credentials, please wait...
  • General Inquiries 1-571-481-9307

  • Fax 1-202-315-3003

Home

Courses – Self Paced eLearning

Courses – Self Paced eLearning
Courses – Self Paced eLearning

The Cyber Security Engineering and Architecture is a high-level, 2-hour training for Information Security Architects and Information System Security Engineers. This course provides knowledge necessary for architects and engineers to understand and apply cyber security best practices to the systems through the entire life cycle. Topics discussed include data security, secure operation and maintenance of IT systems and networks, compliance activities, risk management, and application security.

Duration:  Self-Paced

**Available May 1, 2017**

The Cyber Security Fundamentals course is a high-level, 2-hour training designed to introduce the various aspects of cybersecurity in the context of a modern, internet-connected environment. Participants in this course will gain a fundamental understanding of the various challenges of designing a cybersecurity program, implementing and maintaining secure systems, and the many demands of a comprehensive cybersecurity solution.

Duration:  Self-Paced

**Available April 1, 2017**

The Cyber Security Implementation course is a high-level, 2-hour training for system administrators, network administrators, database administrators, and infrastructure support technicians. This course provides an overview of techniques that can be applied to ensure data security, perform incident management activities, guide digital forensic operations, and assist in secure operation and maintenance of IT systems.

Duration:  Self-Paced

**Available May 1, 2017**

The Cyber Security Managers course is a high-level, 2-hour training aimed at providing managers, Authorizing Officials, System Owners, and Information Owners with fundamental cyber security knowledge. Key topics discussed in this course include compliance, enterprise continuity, data security, and risk management.

Duration:  Self-Paced

**Available May 1, 2017**

This course will cover how to respond to a network security incident, The Incident Response Life Cycle, Legal and ethical considerations in terms of accessing data during a breach, and How an organization can use data from past incidents to strengthen their defenses This course does not cover Penetration Testing or Hacking Back.

Duration:  Self-Paced

The Intro to RMF for Program Managers course is a high-level, 2 hour executive level training which provides an introduction to Risk Management Framework (RMF), including a review of the laws, policy, and regulations that govern the process, the roles ad responsibilities associated with the RMF, introducing risk, the 6 steps, planning for an assessment, and the documentation and artifacts required.

Duration:  Self-Paced

The course objective is to gain insight into common controls that are used within the risk management framework process.

Duration:  Self-Paced

Students will gain an understanding of the new processes, preparation of the documentation, and execution of the required security control assessments.  This training will enable your organization to understand the proposed changes and to position yourself early to make the transition as seamless and efficient as possible.

Duration:  Self-Paced

Upon completion of this course, you should have a basic understanding of the FISMA requirements, the risk management framework process, the assessment methods related to information system owners, and the assessment procedures for NIST security controls related to information system owners.

Duration:  Self-Paced

The training is segmented into six modules. Each module will cover specifics you need to be aware of as a System Administrator.  We’ll cover the many Laws, Policies, and Guidance that are available.  At this point in your career, you should have a good understanding of the Cybersecurity Awareness and Essentials as we provide a brief overview.

Duration:  Self-Paced

In order to secure develop web applications and websites, it is necessary to understand the underlying technologies. In order to assess risk posture, it is crucial to see these systems from the same perspective as the attackers. Attackers leverage deep knowledge of complex technology to achieve their goals; the defenders need to be similarly equipped.

Duration:  Self-Paced