IA CERTIFICATION TRAINING AND CONTINUING EDUCATION OPPORTUNITIES IN THE LOCAL AREA PRESENTER: DEBORAH J. SINCLAIR, Ph.D. Standard Technology, Incorporated.

Slides:



Advertisements
Similar presentations
Lifelong Learning for Innovation Jim LeValley Microsoft Learning Microsoft Corporation.
Advertisements

DoD Information Assurance Certification
Eric DeGraff Director July OVERVIEW X-Feds, Inc. Proprietary  X-Feds is dedicated to providing superior expertise in technical consulting services.
PROFESSIONAL, SCIENTIFIC AND TECHNICAL TRAINING UMBC TRAINING CENTERS © 2010, UMBC Training Centers, LLC
4/29/2009Michael J. Cohen1 Practical DIACAP Implementation CS526 Research Project by Michael J. Cohen 4/29/2009.
©2011 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals R75 Training Overview for ATC Partners Check Point.
Cybersecurity and the Risk Management Framework
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Information Assurance (IA) - Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication,
Security Controls – What Works
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
1 Cisco Networking Academy Program Brian Wright Weber Institute of Applied Science and Technology.
Christopher P. Cabuzzi CS 591 DEFENSE INFORMATION ASSURANCE CERTIFICATION & ACCREDITATION PROCESS (DIACAP) Chris Cabuzzi, DIACAP, 12/8/10 1.
College Strategic Plan by Strategic Planning and Quality Assurance Committee.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Learning Partner program requirements Worldwide Learning Partner Organization August 2014.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Security Certification
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Information Assurance Education Today LTC Clifton H. Poole, CISSP, CISM, IAM Information Resources Management College National Defense University Policy2004.
Information Assurance Workforce (IAWF)
Citrix Academic Network Leaders to power the world’s transformation to virtual computing.
The National Institute for Certification in Engineering Technologies The “Hands-On” Partner of the Engineering Team.
Florida Energy Workforce Consortium Meeting Cocoa June 15, 2010 Colleen McCann Kettles, Director Banner Center for Alternative Energy Florida Solar Energy.
9-May-2014 APPROVED FOR PUBLIC RELEASE STEM Education Summit Opportunities, Education and Credentials Larry Muzzelo Director, CECOM Software Engineering.
An introduction to DNS Arrow Partnering for value and growth.
10969A Active Directory® Services with Windows Server® Course 10699A
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Academy RENAM Evolution The next generation.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
CompTIA Advanced Security Practitioner (CASP) IT Professionals prepared to safeguard organizations worldwide.
Cybersecurity nexus (CSX)
V1.3 Network+ Certification. CompTIA Network+ Certification Vendor Neutral Certification Fulfills the U.S. Department of Defense Directive Fulfills.
Just In Time Training (JITT): How Not to Jump from the Frying Pan into the Fire.
Federal Cyber Policy and Assurance Issues Dwayne Ramsey Computer Protection Program Manager Berkeley Lab Cyber Security Summit September 27, 2004.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Move over DITSCAP… The DIACAP is here!
Michael Bender - MCT, MCITP, VCP Madison College Computer Systems Administration.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
20411B Administering Windows Server® B
Learn Academy Orientation – Chapter 3 This Session… 1.Instructor Training 2.Certification Vouchers 3.Continuing Education 4.Alumni 5.On Site Support.
A+ Certification Oct. 9, 2012 release. CompTIA A+ Certification Vendor Neutral Certification 2 exams exams ISO Certified.
Command & Control Capabilities
Overview Computer Training: Custom Training At Business Location At Training Center General Enrollment Computer Classes Available to Businesses and Individuals.
Shift Left Feb 2013 Page-1 DISTRIBUTION STATEMENT A – Cleared for Open Publication by OSR on January 17 th, 2013 – SR case number 13-S-0851 Dr. Steven.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Navigating IT Solutions.Delivering Results. Bay State Proprietary l CAPABILITY BRIEFING FOR MITRE 12TH SERVICE ORIENTED ARCHITECTURE.
Center for Cybersecurity Research and Education (CCRE)
Defense Security Service Contractor SIPRNet Process June 2013
DAU Logistics Curriculum Plans FY 04 LOG 101 How are we doing? LOG FIPT Meeting August 8, 2003 LOG 201 LOG 203 LOG 204 LOG 205 LOG 304 LOG 102 LOG 235.
CSCE 727 Industry Certifications in IA. Global IA Workforce Trends A Frost & Sullivan Market Survey Sponsored by (ISC) 2® Prepared by Robert Ayoub, CISSP,
 Local commanders understand impact of IA on mission accomplishment  Standard allies and coalition partners can emulate  IA for other workforces (acquisition,
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 IT/Cybersecurity - ICRDCE Conference Day Aligning Program, Course, and Class Objectives / Outcomes.
Citrix Academic Network
DoD Information Assurance Certification
CISSP-ISSEP® - Certified Information Systems Security Professional
Safeguarding Covered Defense Information
Team 1 – Incident Response
Team 2 – understand vulnerabilities
20341B Core Solutions of Microsoft® Exchange Server 2013.
Capabilities Briefing
IT Management Services Infrastructure Services
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

IA CERTIFICATION TRAINING AND CONTINUING EDUCATION OPPORTUNITIES IN THE LOCAL AREA PRESENTER: DEBORAH J. SINCLAIR, Ph.D. Standard Technology, Incorporated direct / cell

TRAINING OBJECTIVES Learn about: ● DoDI and DoDD M ● Why the Focus on Cybersecurity? ● Cybersecurity Requirements ● Who’s Affected by DoDI and DoDD M? ● IA Workforce structure ● Training and Certification Requirements ● Local Training Opportunities as Authorized Training Provider

DOD INSTRUCTION DOD DIRECTIVE M ● DoD IA Workforce Improvement Program ● Information Assurance ● Defense Information Assurance Certification and Accreditation Program (DIACAP) Information Assurance -> Cybersecurity ● Cyberworkforce ● Cybersecurity ● National Institute of Standards and Technology (NIST) based Risk Management Framework (RMF)

WHY THE FOCUS ON CYBERSECURITY? Cyberspace is a nervous system – the control system of our country.

REQUIREMENTS ● Make the computing environment less vulnerable ● Intrusion detection in the network environment (NE), finding and fixing unprotected vulnerabilities ● Improve the security of the systems ● Support, monitor, test, and troubleshoot hardware and software IA problems pertaining to the CE, NE, and enclave environments

WHO’S AFFECTED? All individuals performing any IA functions ● On.mil Network Components ● Certification and Accreditation (C&A) ● Vulnerability Assessment ● Applies equally to DoD civilian, military, and contractor personnel All Individuals Performing Any IA Functions

WHO’S AFFECTED? Reporting Requirements ● Contractor personnel’s IA certification ● Defense Workforce Certification Application (DWCA): All Individuals Performing Any IA Functions

BASIC IA WORKFORCE STRUCTURE Information Assurance Workforce

IA TECHNICAL WORKFORCE REQUIREMENTS Civilian, Military, Contractor* (Including Civilian or Contractor Local National (LN)) IAT Level I – III (FN and LN Levels I & II only) Initial Training**Yes IA Baseline Certification (from approved list) Yes (within 6 months) Initial OJT Evaluation Yes (for initial position) CE/OS CertificateYes Maintain Certification Status Yes (as required by certification) Continuous Education or Sustainment Training Yes (as required by certification (e.g., International Information Systems Security Certification Consortium, (ISC) 2 requires 120 hours within 3 years for the CISSP)) Background InvestigationAs required by IA level and Reference (b) Sign Privileged Access StatementYes *Contractor category, level, and certification requirements to be specified in the contract **Classroom, distributive, blended, government, or commercial provider Information Assurance Workforce

IA WORKFORCE MANAGEMENT REQUIREMENTS Civilian, Military, Contractor* (Including Local National (LN)) IAM Level I – III (FN/LN Levels I & II only) Initial Training**Yes IA Baseline Certification (from approved list) Yes (within 6 months) Initial OJT EvaluationNo CE/OS CertificateNo Maintain Certification Status Yes (as required by certification) Continuous Education or Sustainment Training Yes (as required by certification (e.g., (ISC) 2 requires 120 hours within 3 years for the CISSP)) Background InvestigationAs required by IA level and Reference (b) *Contractor category, level, and certification requirements to be specified in the contract **Classroom, distributive, blended, government, or commercial provider Information Assurance Workforce

IA SYSTEM ARCHITECTURE AND ENGINEER WORKFORCE REQUIREMENTS Civilian, Military, Contractor* (Including Local National (LN)) IASAE Level I – III (FN/LN Levels I & II only) Initial Training**Yes IA Baseline Certification (from approved list) Yes (within 6 months) Initial OJT EvaluationNo CE/OS CertificateNo Maintain Certification Status Yes (as required by certification) Continuous Education or Sustainment Training Yes (as required by certification (e.g., (ISC) 2 requires 120 hours within 3 years for the CISSP)) Background InvestigationAs required by IA level and Reference (b) *Contractor category, level, and certification requirements to be specified in the contract **Classroom, distributive, blended, government, or commercial provider Information Assurance Workforce

TRAINING & CERTIFICTION REQUIREMENTS ● Preparatory / Initial ● Continuing Education or Sustainment / Recertification

CERTIFICATIONS APPROVED FOR THE DOD IA WORKFORCE

LOCAL AUTHORIZED TRAINING PROVIDER ● Based in Warner Robins, Georgia ● Support the Robins AFB Community Customized Certification Training Courses Free Certification Exam (with course) Onsite Testing ● First Training Class held in collaboration with Learning Tree International Local Training Provider

LOCAL AUTHORIZED TRAINING PROVIDER ● Pool of Highly Qualified Instructors ● Free Certification Exam Vouchers (with course attendance) ● Certification Exams are conducted locally at our Testing Facility ● 95% and higher Pass Rate for first time test taker Local Training Provider

A FEW OF OUR INSTRUCTORS ● Kristina Nairn 15 years of instructor experience CompTIA Certified Instructor EC-Council Certified Instructor Certified Cisco Systems Instructor ● DeAngelo McDaniel 12 years of instructor experience Certified Cisco Systems Instructor ● William Hauck 25 years of instructor experience CompTIA Certified Instructor Microsoft Certified Trainer ● James L. Haner 25 years of instructor experience Check James out at: Local Training Provider

LOCAL AUTHORIZED TRAINING PROVIDER ● CompTIA Authorized Training Provider ● Cisco Learning Partner ● (ISC) 2 Official Training Provider ● EC-Council Authorized Training Provider ● Microsoft Learning Partner Local Training Provider

COMPTIA AUTHORIZED TRAINING PROVIDER ● Every CompTIA-certified IA workforce member must obtain a CompTIA CE credential as part of DoDD M Approved Continuing Education (CE) Courses ● Official CompTIA Course Material ● Certified CompTIA Instructors ● Practice Exams ● Free Certification Exam Voucher Local Training Provider

CISCO LEARNING PARTNER ● Official Cisco Course Material ● Certified Cisco Instructors ● Hands-on or Virtual Labs ● Practice Exams ● Free Certification Exam Voucher Local Training Provider

(ISC) 2 OFFICIAL TRAINING PROVIDER ● Official (ISC) 2 Course Material ● Official (ISC) 2 Instructor ● Official (ISC) 2 Practice Exam Questions ● Free Certification Exam Voucher Local Training Provider

LOCAL TESTING CENTER Local Training Provider

CONTINUING EDUCATION OR SUSTAINMENT / RECERTIFICATION Local Training Provider DOD Approved Baseline Certifications

CONCLUSION ● DoDD 8570 Training and Certification is crucial to our national security and the individual work we perform in supporting the warfighter ● You have a role to play in protecting our nervous system - Cyberspace ● Stay abreast of the changes coming as we transition from Information Assurance to Cybersecurity Protect Our Nervous System – Cyberspace

QUESTIONS ?