Hosted by Lunarline: School of Cyber Security



Similar documents
The Premier IA & Cyber Security Training Specialist

LUNARLINE: School of Cyber Security. Dedicated to providing excellence in Cyber Security Training Certifications. ISO 9001: 2008 Certified

Access FedVTE online at: fedvte.usalearning.gov

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

FedRAMP Online Training Security Assessment Plan (SAP) Overview 12/9/2015 Presented by: FedRAMP PMO

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

TOPSECRETPROTECTION.COM (TSP)

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

COURSE SYLLABUS BMIS 342 CYBER SECURITY

The fast track to top skills and top jobs in cyber. Guaranteed.

Information Security Principles and Practices

DoD IA Training Products, Tools Integration, and Operationalization

Information Security Risk and Compliance Series Risking Your Business

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Hackers are here. Where are you?

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Hackers are here. Where are you?

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Security Transcends Technology

Forensic Certifications

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

Cybersecurity Education

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE

EC-Council Certified Security Analyst (ECSA)

Compliance Risk Management IT Governance Assurance

THE DATA CENTER COMPLIANCE ACRONYMS YOU NEED TO KNOW

SCADA Security Training

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

Continuous Monitoring

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Securing Government Clouds Preparing for the Rainy Days

Cyber Workforce Training

Shon Harris s Newly Updated CISSP Materials

2015 Security Training Schedule

Minnesota State Community and Technical College Detroit Lakes Campus

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Cybersecurity in a Mobile IP World

CCA CYBER SECURITY TRACK

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

SOC & HIPAA Compliance

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Bellevue University Cybersecurity Programs & Courses

Department of Homeland Security Federal Government Offerings, Products, and Services

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

Information Technology Cluster

Course Title: ITAP 3471: Web Server Management

FISMA Cloud GovDataHosting Service Portfolio

Department of Defense INSTRUCTION

Information Systems Security Engineering Professional (ISSEP)

Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C Direct: agarg@thinkbrg.

Cybersecurity Vulnerability Management:

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE

National Initiative for Cybersecurity Education

National Initiative for Cyber Security Education

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

2) trusted network, resilient against large scale Denial of Service attacks

The fast track to top skills and top jobs in cyber. Guaranteed.

IT-CNP, Inc. Capability Statement

Goal. Vision. CAE 2Y Program Eligibility and Summary

CYBER SECURITY TRAINING SAFE AND SECURE

OVERVIEW DEGREES & CERTIFICATES

Policy on Information Assurance Risk Management for National Security Systems

Network Management and Defense Telos offers a full range of managed services for:

CyberNEXS Global Services

NE-20247D Configuring and Deploying a Private Cloud

An Overview of Large US Military Cybersecurity Organizations

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Introduction to Cybersecurity Overview. October 2014

Security Control Standard

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

NNIT Cybersecurity. A new threat landscape requires a new approach

DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release January 2015

Transcription:

Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial organizations. Developed and developing nations, governments, defense departments and industries, and organizations in critical infrastructure verticals are being increasingly targeted by never-ending surges of cyber attacks from criminals and nation-states seeking information, economic or military advantage. Training is provided by To learn more about our courses please visit: www.schoolofcybersecurity.com Lunarline s Cyber courses provide participants with a high-level overview of various aspects of Cybersecurity in the context of a modern and Internet-connected environment. In our Cybersecurity Fundamentals course, you will gain a foundational perspective on the challenges of designing a cybersecurity program, implementing secure systems, and other factors needed for a comprehensive cybersecurity solution. Our Cyber tools course concentrates on cyber security tools, operating systems, applications, network architectures and best practices in government and industry network security. Purchase CyberWar Training through our catalog here.

Enter your search... HOME ABOUT TRAINING CONTACT US SIGN UP FOR COURSES Lunarline: School of Cyber Security Dedicated to providing excellence in Cyber Security Training Certifications Class Pass Taking a few courses with us? Make sure to check out if you qualify for our discount class pass! Certifications The School of Cyber Security offers a range of different certifications after taking our courses! Online Training Soon you will be able to take some of our courses online on our Learning Management System! Course Catalog check out our courses here Assessing Network Vulnerabilities Training 4 Day ISC2 Certified Authorization Professional Course CAP+ DoD Service Specific Course 5 Day ISC2 Certified Authorization Professional Course (CAP) 4 Day Course Description: Security professionals are overwhelmed by abundant security advisories, intrusion and firewall alerts, and vulnerability reports. [...] Lunarline is now authorized by (ISC)² CAP Certified Authorization Professional Class. The course is taught by [...] Lunarline is now authorized by (ISC)² CAP Certified Authorization Professional. The course is taught by (ISC)² [...]

Enter your search... HOME ABOUT TRAINING CONTACT US SIGN UP FOR COURSES Course Catalog Check out the courses we offer ISC2 Certified Authorization Professional Course CAP+ DoD Service Specific Course 5 Day Enter your search... CATEGORIES Lunarline is now authorized by (ISC)² CAP Certified Authorization Professional Class. The course is taught by (ISC)² authorized instructors who employ effective delivery of the curriculum while focusing on preparing you with the knowledge and skills required with passing the rigorous CAP examination. The CAP+ class uses the official ISC2 materials and fully prepares [...] 3PAO Applying CNSS/NIST RMF Applying FISMA/NIST RMF ISC2 Certified Authorization Professional Course (CAP) 4 Day Cloud Security CNSS CompTIA Cyber Tools Workshop DIACAP Lunarline is now authorized by (ISC)² CAP Certified Authorization Professional. The course is taught by (ISC)² authorized instructors who employ effective delivery of the curriculum while focusing on preparing you with the knowledge and skills required with passing the rigorous CAP examination. OVERVIEW: The Certified Authorization Professional (CAP) credential is an objective measure of [...] FedRAMP FISMA ISC2 Lunarline Courses Network Vulnerabilities NIST Fundamentals of Software Assurance 3 Day Risk Management Framework (RMF) for DoD Information Technology (IT)

OVERVIEW: This 3-day course provides participants with a high-level overview of various aspects of Software Assurance in the context of a modern and Internet-connected environment. Through lecture, hands-on exercises, and group discussion, you will gain a foundational perspective on the challenges of security software design and procurement, program, implementing secure software, and other factors needed [...] Security+ VIEW COURSE OFFERINGS Course Schedule Course Catalog Special Access Programs C&A Transition 3 Day Lunarline s SAP C&A Transition training provides students with a fundamental knowledge of the requirements for transitioning from the DIACAP/JAFAN/DCID C&A process to the NIST/CNSS requirements, as well as an in-depth look at the Risk Management Framework (RMF). This training equips the students with an in-depth indoctrination into the RMF and will provide them the requirements [...] Recovery Planning Practitioner 5 Day OVERVIEW: This course is designed to provide an operational basis for all facets of recovery planning through information delivery and practical exercises. As a result of this course, students will be able to conduct risk analysis, business impact analysis, recovery strategy analysis and develop viable emergency response plans and recovery plans through the information obtained [...] Cyber Tools Workshop 4 Day OVERVIEW: Do you want to better understand how to use cyber tools in securing networks? Would you like to be better prepared to answer fairly technical security questions about Microsoft Active Directory, Unix, Linux, databases, firewall, intrusion detection systems and major network services like the Domain Name Service? Would you like a combination of professional [...] NSA CNSS 415 Boot Camp 5 Day Includes the DIACAP Validator and Applying the FISMA/NIST Risk Management Framework This class combines the DIACAP Validator and NIST Risk Management Framework FISMA In-Depth class which qualifies you to earn your National Security Agency (NSA) and Committee on National Security Systems (CNSS) NSTISSI 415 Information System Certifier in 5 days. This course concentrates [...]

Cloud Security and FedRAMP Training 5 Day Are you in the cloud? Are you concerned about security in the cloud? Do you want to have a better understanding of FedRAMP? Are you a 3PAO? If you answered yes to any of the above questions, then you should register for the Lunarline School of Cybersecurity (SCS) class in Cloud Security and FedRAMP. The [...] Applying the CNSS/NIST Risk Management Framework Intensity 4 Day Certified Committee on National Security Systems OVERVIEW: This course equips the student with an overview of the system authorization process (also known as C&A) and the Risk Management Framework (RMF) for National Security Systems (NSS). In addition to the classroom instruction, the student will also participate in several scenario-based hands-on exercises in the implementation of [...] Applying the CNSS/NIST Risk Management Framework In-Depth 3 Day Certified Committee on National Security Systems OVERVIEW: This course equips the student with an overview of the system authorization process (also known as C&A) and the Risk Management Framework (RMF) for National Security Systems (NSS). In addition to the classroom instruction, the student will also participate in several scenario-based hands-on exercises in the implementation of [...] Next