TRAINING OVERVIEW

  Please click here: Payment Options for Civilian Federal, DoD and private sector clients

Security Risk Management for Decision Makers
This two day intensive course was designed for the real risk takers. The CIO's, program managers, project managers in the Security field. IT will help technical and non-technical professionals better understand the issues and concerns surrounding cyber risk management. Attendees will be taught how to identify high-level risks, map their impact across an organization, and identify actionable mitigation strategies using case studies. You will be able to get one on one consulting advice for real world problems. Breakout sessions will be conducted in small groups for personalized attention. Meet your Instructors - View the Schedule - View the Course Outline

DIACAP to RMF Transition Training for ISSOs and SCAs
This course provides a comprehensive immersion into the Risk Management Framework (RMF) for security professionals in the DoD and IC. This course, which is taught by the author of one of the first RMF system security plans in all of the military and DoD to obtain an RMF ATO, will address both the roles of those who implement security controls such as the Information System Security Engineer (ISSE), Information System Security Officer (ISSO) and Information System Security Manager (ISSM) as well as the Security Control Assessor (SCA) who assesses the security implemented. It covers all roles and responsibilities based on methods used to implement and assess DoD security as identified in DoDI 8510.01, NIST 800-53, Rev. 4 and CNSSI 1253, making direct use of these references throughout the class. This course will teach ISSO/E/M and SCA to build and assess a system security plan (SSP) covering all RMF security control families identified in NIST 800-53, Rev. 4 and CNSSI 1253. The training will cover the DoD defined information technology types and the associated security controls, vulnerability scanning, and DoD-approved automated scanning tools (i.e. ACAS). The course will provide an in-depth explanation with interactive labs thoroughly covering of each control family identified in NIST 800-53, Rev. 4 and CNSSI 1253 to include the appropriate testing methods, associated supporting body of evidence, and how to efficiently and effectively test and validate DoD systems and infrastructure. The manual provided with the class includes all security controls with recommended assessment procedures and artifacts as well as a sample SSP with numerous DoD references for implementation guidance. Depending on the access available in the LS-provided or government-provided training facility and student user accounts, the training will incorporate hands on learning sessions with applicable tools (e.g. eMASS, etc.) for the documentation and assessment of all applicable security controls in accordance with standards defined by DoD, IC, and NIST policies. The course will incorporate the DISA and DIA approved capabilities, IC, and industry standards for vulnerability assessment to include reporting capabilities to higher echelons such as Continuous Monitoring and Risk Scoring (CMRS) system. After completing this training, SCAs will have the ability to perform assessment validation via manual and automated procedures once training is complete. This training will provide samples of the ISSO/E/M produced SSP and SCA reports needed to document security assessments performed using both automated means (such as eMASS) and manual documentation such as an Security Requirements Traceability Matrix (SRTM) and Security Assessment Report (SAR). Meet your Instructors - View the Schedule - View the Course Outline

CISSP Jump Start
Cyberspace has developed a unique method for preparing students to PASS the CISSP exam. A two day course that includes theory and full proof study methods. In this two day course our Certified Information Systems Security Professional (CISSP) instructors will teach you the Broad Range of Security Subjects, Technology and Concepts you’ll need to learn to effectively pass the CISSP Exam. Then we will immerse you in a study methodology that will increase your recall 100%. This combination of methods has given our students a very high success rate. Meet your Instructors - View the Schedule

CEH Jump Start
In this two day course you will master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You will learn how to think like a hacker. Then we will immerse you in a study methodology that will increase your recall 100%. This combination of methods has given our students a very high success rate. Meet your Instructors - View the Schedule