Department of Defense Directive 8570, DoD 8570 training provides guidance and procedures for the certification, and management of all government employees who conduct Information Assurance functions in assigned duty positions. These individuals are required to carry an approved certification for their particular job classification. GIAC certifications are among those required for Technical, Management, CND, and IASAE classifications.
Who is affected by DOD 8570?
Any full- or part-time military service member, contractor, or local nationals with privileged access to a DoD information system performing information assurance (security) functions -- regardless of job or occupational series.
- Office of the Secretary of Dept Defense
- Military Departments
- Chairman of the Joint Chiefs of Staff
- Combatant Commands
- Office of the Inspector General of the DoD
- Defense Agencies
- DoD Field Activities
- All other organizational entities in the DoD
Training Includes the Following Courses
- CompTIA A+
- CompTIA Network+
- CompTIA Security+
- C|EH Ethical Hacker
- ISC2 CISSP SSCP
Live Boot Camp Classes Nationally for DOD Certification
Training Courses Include
Full Multi Media Training Course
Simulated test preps. Hundreds of Practice Test Questions to prepare you for the certification exam.
Interactive Labs and Exercises
Printable Transcripts of all lessons - no need for books.
Certificate of Completion
Online Instructor mentoring 24 x 7 to answer any of your questions
Choose your Deployment - Online access (one year subscripton) or CD-ROMs
Outline of Courses that make up Compliance Requirements
CompTIA A+
CompTIA A+ Essentials
Computer Hardware Components
Configuring Displays, Peripherals, Laptops, and Printers
Troubleshooting Computers and Printers
Operational Procedures and Preventative Maintenance
Installing Windows Operating Systems (Windows 7 update)
Using and Managing Windows (Windows 7 update)
Security and Network Fundamentals (IPv6 update)
CompTIA A+ Practical Application
Personal Computer Components
Troubleshooting Hardware
Maintaining Networks
Security
Maintaining Operating Systems (Windows 7 update)
CompTIA Network+
Network Concepts Part 1
Network Concepts Part 2
Network Installation and Configuration Part 1
Network Installation and Configuration Part 2
Network Media and Topologies
Network Management
Network Security
CompTIA Security+
Control Fundamentals and Security Threats
Network Protocols, Attacks, and Defenses
Creating Secure Networks and Performing Security Assessments
Network and System Security Mechanisms
Remote Access and Wireless Security
Authentication, Biometrics, and Security Controls
Securing the IT Environment
Cryptography and Public Key Infrastructures
Securing Applications, Virtualized Environments, and Cloud Computing
Business Continuity, Disaster Recovery, Security Training, and Forensics
Countering IT Security Threats: Ethical Hacking CEH
Ethical Hacking and the Need for Penetration Testing
Footprinting, Scanning, and Enumeration
System Hacking and Malicious Content
Social Engineering and Sniffing
Deterring Electronic Intrusions
Denial of Service and Session Hacking
Linux Hacking
Cryptography
Internet-based and Database-based Attacks
Wireless Attacks and Countermeasures
Physical Security
CISSP The Certified Information Systems Security Professional Domains
Access Control
Telecommunications and Network Security
Information Security Governance and Risk Management
Cryptography
Operations Security
Business Continuity and Disaster Recovery Planning
Legal, Regulations, Investigations, and Compliance
Physical (Environment) Security
Software Development Security
Security Architecture and Design
|