TRAINING COMMERCIAL PRICELIST MANTECH INTERNATIONAL CORPORATION January 2015



Similar documents
2015 Security Training Schedule

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

TravelCampus. Complete travel and tourism education. Completely Internet delivered. Completely unique

Access FedVTE online at: fedvte.usalearning.gov

Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Executive MBA Program Overview

2015 EDUCATIONAL PROGRAMMING Mechanical Diagnosis and Therapy : McKenzie Method

Blended Learning: Revit Collaboration Tools

Distance Education Certification Program Secondary Provider Application for Subsequent Course Certification This application is required for

EDUC 660. Organization and Administration of School Counseling Programs

PREPARING TO BECOME A

Certification Program Information Packet. REVISED September coactive.com

Training Course SQL Server 2008 Implementation and Maintenance

CERTIFICATE IN ENTREPRENEURSHIP PROGRAM JUNE 16 AUGUST 8, 2014

Advanced Performance Measures

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

CompTIA Continuing Education Program and Certification Renewal Policy

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Security Training Programs

ABOUT FISHER COLLEGE AND CORPORATE ADVANTAGE PROGRAM

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

ASSOCIATE OF APPLIED SCIENCE IN BUSINESS OFFICE TECHNOLOGY ADMINISTRATION

Share responsibilities in the Forensics Program, including teaching and related activities, as assigned.!

UMAN RESOURCES ND TRAINING PROGRAM AND COURSE GUIDE

COMPUTER SCIENCE 130 Online Course CS-G130 # Survey Of Comp Science/Info Fall 2015 (8/23/15 12/13/15) Class Syllabus and Schedule

DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN. Version : 1.0 Date : April 2009 : Pink Elephant

TOOL KIT for RESIDENT EDUCATOR and MENT OR MOVES

IST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

Organizational Leadership & Change Management workshop

Distance Education Certification Program Secondary Provider Application for Initial Certification This application is required for secondary

Certified Big Data Science Professional (CBDSP)

TOPSECRETPROTECTION.COM (TSP)

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

The fast track to top skills and top jobs in cyber. Guaranteed.

The Standards of Good Practice for Education Abroad The Forum on Education Abroad May 2007

IAP2 Certification Program in Public Participation. planning communication techniques

2015 Workshops for Professors

Center for Business and Industrial Marketing

uman Resources nd Training Program and Course Guide

MASTER OF SCIENCE IN SCHOOL BUILDING LEADERSHIP

OVERVIEW DEGREES & CERTIFICATES

ONLINE CLASSES 1 MICROSOFT OFFICE ONLINE COURSE

Increasing the Use of Horizon Wimba. Analysis conducted by: Sheri Anderson, MIT Graduate Student Tom Dorgan, MIT Graduate Student

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO TABLE OF CONTENTS

2 Weeks 1 Week 5 Weeks : Microsoft Exchange Server 2010 Administration 4 Weeks Enterprise Smartphone Administration

West Charlotte High School School and Principal Profile

The IIA Global Internal Audit Competency Framework

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

Human Resource Management

Management. University of New Orleans/268

Department of Computer Science Academic Policies

COMPUTER CAREER DEVELOPMENT ONLINE CLASSES

American College Experience

BUSINESS ADMINISTRATION w/ PROJECT MANAGEMENT CERTIFICATION

LEADERSHIP ADVANCEMENT PROGRAM

Hosts HARDENING WINDOWS NETWORKS TRAINING

DoD IA Training Products, Tools Integration, and Operationalization

Interactive Medical Coding Course & Certification

Homeschool. Program. Schedule & Calendar Class Descriptions Enrollment Form

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot

WINTER 2016 ONLINE CLASSES For West Bloomfield Schools Adult Education

CATALOG ADDENDUM. CHARTER COLLEGE - Wasilla COURSE DESCRIPTION BSM301 CATALOG PAGE REFERENCE: 91 EFFECTIVE DATE:

The SHRM. School of Management. Learning System for PHR /SPHR Certification Preparation

Leadership and Human Resource Essentials (HRS402) Learning Objectives

EMBA in Real Estate Leadership Curriculum (45 credits)

2015 Cybersecurity Awareness

KPMG Learning. Delivering quality training. Driving high performance. kpmglearning.com

The SHRM. School of Management. Learning System for PHR /SPHR Certification Preparation

Principles of Information Assurance Syllabus

Program Logistics for: Cyber Security Defense Certificate

Core Solutions of Microsoft Exchange Server 2013

CMA. JB International Trainings. Distinguish Yourself. Get Certified. Khobar Jubail Riyadh Jeddah. Certified Management Accountant

Virginia Defense Force

Dietary Manager Online Training. Program Information Guide

ServiceNow Authorized Training Partner. Program Guide

BRAZOSPORT COLLEGE LAKE JACKSON, TEXAS SYLLABUS BCIS 1405: BUSINESS COMPUTER APPLICATIONS ONLINE VERSION

Master of Public Affairs Course Descriptions

Associate Dean: Justin Matus, Ph.D. Academic Advisor: Karen Alessi Coordinator ABE: Allison Pinckley

CyberNEXS Global Services

UNIVERSITY OF NAIROBI. MSc in Human Resource Management

Audit of NRC s Network Security Operations Center

True Continuous Auditing for Active Directory Derek Melber

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

UBC Certificate in Project Management

CCNA Security 2.0 Scope and Sequence

Department of Computer Science Academic Policies

Transcription:

TRAINING COMMERCIAL PRICELIST MANTECH INTERNATIONAL CORPORATION January 2015

TABLE OF CONTENTS MANAGEMENT TRAINING COURSE DESCRIPTIONS AND PRICES... 1 Using DISC Personality Diagnostics to Communicate: 4 hours... 1 Situational Leadership II: 4 hours... 1 INFORMATION SYSTEMS SECURITY TRAINING COURSE DESCRIPTIONS AND PRICES... 2 INTELLIGENCE PROFESSION EDUCATOR COURSE DESCRIPTIONS AND PRICES... 7 Interviewing Debriefing... 7 Surveillance Detection from the Perspective of the Host Service... 7 FULLY CLEARED INSTRUCTIONAL DESIGN EXECUTIVE CONSULTING PRICE... 7 GENERAL GUIDELINES... 8 CONTACT INFORMATION... 8

MANAGEMENT TRAINING COURSE DESCRIPTIONS AND PRICES Course Length Base Price Customer Site Individual Fee ManTech Site Course Description (hours) (per student) (per student) Using DISC Personality Diagnostics to 4 $3,000 --- $245 Communicate Situational Leadership II 4 $3,000 $100 $295 Number of attendees is unlimited An additional charge of $5 applies for each copy of materials Travel charges are not included in this pricing and will be negotiated on a case-by-case basis. Using DISC Personality Diagnostics to Communicate: 4 hours Participants will be exposed to the DISC personality diagnostic instrument in an effort to understand their communication and behavior patterns. Further, each personality type will be examined to assist each participant in understanding how to interact and communicate with individuals of different personalities. At the conclusion, each participant should have a basic understanding of how and why interactions with others are affected by personality. During this presentation, the use of video clips and PowerPoint slides are used to reinforce the conceptual framework of the course. Situational Leadership II: 4 hours Using Ken Blanchard s Situational Leadership Model II as a basis, participants will develop a basic understanding of their managerial and leadership role and responsibility in directing, coaching, supporting and delegating to their employees, dependent on their employees developmental and readiness level to assume additional duties and responsibilities. A further discussion of the correlation of DISC personality diagnostic will be related to situational leadership. Course materials will be provided through the Ken Blanchard Company. During this presentation, the use of video clips and PowerPoint slides are used to reinforce the conceptual framework of the course. This course contains the basic information and one diagnostic. To register, please contact: Karen Gardner, Executive Director, Training and Organizational Development Email: Karen.Gardner@ManTech.com Direct Dial: (703) 218-6074 Fax: (571) 748-6450 Page-1

INFORMATION SYSTEMS SECURITY TRAINING COURSE DESCRIPTIONS AND PRICES Course Title Course Cost Course Location Risk Management Framework (RMF) Open Enrollment $1,950.00 Various Locations Advanced Information System Security (AISS) Open Enrollment $3,500.00 Various Locations Program Security Fundamentals (PSF) Open Enrollment $1,950.00 Various Locations Windows 7 Security Audit Open Enrollment $3,000.00 Various Locations Risk Management Framework (RMF) Dedicated (Max 24 Students) $27,500.00 Customer Location Advanced Information System Security (AISS) Dedicated (Max 16 Students) $39,500.00 Customer Location Windows 7 Security Audit Dedicated (Max 16 Students) $37,500.00 Customer Location Program Security Fundamentals (PSF) Dedicated (Max 24 Students) $27,500.00 Customer Location Registration: We accept Visa, MasterCard, American Express, checks and purchase orders. Tammy Delesky, Technical Training Manager Email: Tamara.Delesky@ManTech.com Direct Dial: (703) 610-9297 Fax: (571) 297-9584 CANCELLATION POLICY: All payment arrangements (credit card, check or purchase order) must be received and finalized by the designated payment deadline to secure a confirmed reservation. Cancellation fees are as follows: Up to 30 days prior to class start date 30 to 21 days prior to class start date 21 to start of class No cancellation fee Eligible for 50% refund of course tuition Forfeit of 100% of course tuition Requests for refund due to emergency situations will be considered on a case by case basis and must be approved by the ManTech Security & Mission Assurance Training Center Director. Page-2

ManTech Advanced Systems International Risk Management Framework Course Overview The Risk Management Framework Course is an intensive 4 day training experience led by seasoned IS Security professionals. It provides the student with a broad understanding of IS Security policy, principles, rules, and procedures. The course is based upon the three principal guidelines for DoD and intelligence community IS Security: ICD 503 / Risk Management Framework Joint Special Access Program Implementation Guide (JSIG) Risk Management Framework (RMF) for DoD Information Technology (IT) Students who complete this course will gain the skills, policy familiarity, and technical understanding necessary to perform the daily job functions for implementing RMF. Course Objectives Students who attend the Risk Management Course will gain a basic understanding of IS Security, including the following functions: Explain the C&A transformation from DCID/JAFAN 6/3 to the RMF Process Understand the Roles and Responsibilities in the RMF process Understanding the Six Risk Management Framework steps Impact Values Authorization Artifacts/Body Of Evidence Required Administrative and Non-Technical Security Features Technical Security Features Risk Management Philosophy Continuous Monitoring Prerequisite(s) The Risk Management Framework Course has no prerequisite training requirement. The course is designed for the new security official. Exercises, quizzes, and examinations are used to measure student progress throughout the course. Maintaining Your 8570.0 Certification Requirements: For students who are looking for ways maintain their 8570.1 certificates, this course will do that. CompTia has listed ManTech s Risk Management Framework course as a pre approved training course and grants 40 hours of CE credit s for Security +, and 60 hours for CASP. This course will also allow you 36 CPE s in maintaining your CISSP. Page-3

ManTech Advanced Systems International Advanced Information Systems Security Overview The Advanced Information Systems Security Course is a 4.5 day, hands-on course focused on increasing the Security Officer s or System Administrator s knowledge of today s security challenges and how to protect against them. Students will take an in-depth look at different attack vectors such as Insider Threat, practice configuring WINDOWS 7/Server 2008 based systems, be introduced to tools such as AppLocker for strong user control and Windows BitLocker for Type 2 encryption, and learn about how to handle Incident Response before the experts arrive. The course will provide the student an understanding of the current threat spectrum facing information systems today and the knowledge and confidence to mitigate that threat. Course Objectives The LAN-based Advanced Information Systems Security course addresses the array of threats facing an information system today and prepares the security official to recognize and mitigate specific threats. The student leaves the class armed with the knowledge and tools required to ensure that his information system operates at an acceptable level of risk. Topics covered include: Attack Vectors Tools Network Configuration Encryption Windows 7/Service 2008 Overview and System Permissions Virtual Technologies Information Systems Media Protection Incident Response Awareness Media Analysis and Sanitization Windows Advanced Security Auditing Prerequisite(s) Students attending the Advanced Information Systems Security Course should be familiar with U.S. Government or commercial computer security practices and have a basic understanding of the WIN 7/ Server 2008 operating system. Maintaining Your 8570.0 Certification Requirements: For students who are looking for ways maintain their 8570.1 certificates, this course will do that. CompTia has listed ManTech s AISS course as a pre approved training course and grants 40 hours of CE credit s for Security +, and 60 hours for CASP. This course will also allow you 36 CPE s in maintaining your CISSP. Page-4

ManTech Advanced Systems International / LOGOS Secure Windows 7 Security Audit Course Overview The Windows 7 Security Audit Course is an intensive three-day training experience led by seasoned Information System Security and Technology professionals. It provides the student with a structured approach to auditing based on their IT policies with a slight focus on national security environments. The main goal of the course is to gain mastery of audit reduction of the Windows 7/2008 event logs with intelligent interpretation that can detect security related issues. A focused methodology based on using queries is the highlight of this audit reduction application. Based on the feedback of several years of teaching the previous Windows XP Security Audit Course, the following goals are emphasized: Analysis of the event logs is the main priority with an emphasis on methodology for successful audit reduction Microsoft provided tools will be enhanced to provide reports for audit interpretation Focus on the functionality of asking questions about audit data (queries) Understanding the differences of Windows 7/2008 versus XP/2003 that affect auditing Updated information of native tools such as Power Shell to understand system configuration for the purpose of audit interpretation. Windows 7 native tools for audit management and reduction Emphasis of policy integration, such as national security standards, towards a purpose driven audit reduction method. It is expected that students will be able to discover all findings in a sample set of audit logs by following an established method by the end of the course. This is reflective of a foundational question of the course: If there is not a method that finds actionable items in a sample known to contain such, then how will they be found in unknown samples? Hands-on labs and demonstrations will provide the student with the knowledge and confidence to address the current government auditing requirements in a rational and practical manner. Course Content The hands-on Windows 7 Security Audit Course addresses the array of auditing requirements faced by today s ISSO and System Administrators. The student leaves the class armed with the knowledge and tools required to ensure that their information system operates at an acceptable level of risk. Topics discussed include: Importance of Policy relative to Audit Security Controls with discussions and overview of associated Impact Levels Evaluation of Native Windows 7 Tools Overview of audit infrastructure requirements Understanding underlying background and using Informative and Automated Reporting Tools New Event Log Format in Windows 7 Updated Event ID s and Practical Interpretation Methodology and Practice of Audit Reduction Continued Support Forum for Continued Progress Page-5

ManTech Advanced Systems International Program Security Fundamentals Course 4 Day Course Overview The Program Security Fundamentals Course is an intensive 4.5-day training experience led by seasoned security professionals. It provides the student with a broad understanding of security policy, principles, rules, and procedures. The course is based upon applicable DoD regulatory sources, Intelligence Community guidance, Executive Orders, and select service guidance dealing with Special Access information. E.O.13526: Classified National Security Information DoDI 0-5205.11: Management, Administration and Oversight of DoD Special Access Programs DoDD5205.7: Special Access Program Policy Students who complete this course will gain the skills, policy familiarity, and technical understanding to protect the most sensitive DoD capabilities, information, technologies, and operations. Topics Covered Include Information Security Operations Security (OPSEC) Personnel Security Physical Security Industrial Security Introduction to ISS & COMSEC Other Security Topics to include Training, Insider Threat, etc. A Day in the Life of a Security Professional The Program Security Fundamentals Course has no prerequisite training requirement. The course is designed for individuals who are new to their security role or as a refresher course for more experienced security professionals. Exercises, quizzes and a final exam are used to measure student progress throughout the course. Page-6

INTELLIGENCE PROFESSION EDUCATOR COURSE DESCRIPTIONS AND PRICES Interviewing Debriefing Price: $6,000 per day, plus instructor travel expenses IF class is taught outside of the DC Metropolitan area. Location: Customer s facility Minimum of one student, maximum of eight students This two-day course is taught by an experienced core collector and covers the range of debriefing strategies from two perspectives: that of a law enforcement officer and that of an intelligence professional. Topics covered include: building rapport, question formulation, the eight-step interview process, active listening, note taking strategies, writing up the results of an interview/debriefing and several role plays and demonstrations with instructor-provided feedback. Surveillance Detection from the Perspective of the Host Service Price: $2,500 per day, plus instructor travel expenses IF class is taught outside of the DC Metropolitan area. Location: Customer s facility Minimum of one student, maximum of 24 students This two-hour inter-active presentation focuses on surveillance detection strategies from the perspective of a representative of the host service. Course also addresses surveillance tactics. FULLY CLEARED INSTRUCTIONAL DESIGN EXECUTIVE CONSULTING PRICE Price: $500 per hour Accomplished professional in developing learning solutions for government and higher education clients. Ability to meld vision with reality using goal-oriented and measurable instructional design. Significant and progressive curriculum development experience in these areas: Basic and advanced investigative techniques Interviewing and debriefing Operationalizing intelligence (targeting) Surveillance detection Certification courses for certain intelligence community career tracks E-learning and blended solutions Page-7

GENERAL GUIDELINES The compensation system of ManTech International Corporation and its subsidiaries is designed to pay equitably and fairly for services rendered in a manner which aids in attracting, retaining and motivating competent employees without regard to race, sex, age, national origin, religion, or physical ability while providing appropriate control of overall compensation costs. Price Deviation: Concessions, discounts or other deviations are addressed on a case-by-case basis and are subject to approval by executive level management. Travel and Accommodations and Other Direct Costs are handled on an order-by-order basis and are subject to open market prices. CONTACT INFORMATION For any questions or for additional information, please contact CW Etzler at (703) 218-6320. Email correspondence may be sent to CW.Etzler@ManTech.com 12015 Lee Jackson Highway, 8th Floor Fairfax, Virginia 22033 Page-8