The human capital element in being able to develop a workforce capable of ongoing mission critical cybersecurity resiliency can only be filled by well-trained product developers, system integrators, installers, stakeholders and end users.
In today’s challenging times on premise and remote workforce must have competency in cybersecurity computing fundamentals and a detailed understanding of how their organization’s information systems operate within regulated federal, enterprise commercial, or public safety sectors.
SecureXperts offers industry leading training in several disciplines and is an Official Training Partner for ISC (2).
SecureXperts has on-staff certified instructors for the ISC (2) Certified Information System Security Professional (“CISSP”) program. The CISSP is the most highly recognized ANSI certified training program covering cybersecurity domains that include:
Security and Risk Management
Security Architecture and Engineering
Communication and Network Security
Identity and Access Management (IAM)
Security Assessment and Testing
Software Development Security
Since 2003, the CISSP was adopted as a baseline for the U.S. National Security Agency's Information Assurance Program and required under the DoD 8570 requirements.
We provide scenario-based exercises to enhance understanding of the processes used for system authorization, including all of the elements of the Risk Management Framework. It is designed for employees and contractors in DoD and Intel agencies, and for any supporting vendors and service providers.
This valid experience includes information systems security-related work performed in pursuit of information system authorization, or work that requires security risk management knowledge and involves direct application of that knowledge. Experience must fall within one or more of the seven domains of the (ISC)² CAP:
Domain 1 Information Security Risk Management Program
Domain 2 Categorization of Information Systems (IS)
Domain 3 Selection of Security Controls
Domain 4 Implementation of Security Controls
Domain 5 Assessment of Security Controls
Domain 6 Authorization of Information Systems (IS)
Domain 7 Continuous Monitoring
The (ISC)² CAP is the only cybersecurity certification under the DoD8570 mandate that aligns with each step with Risk Management Framework.
IT Security and Cyber Security Terminology
Identity versus Entity Management
Personal Online Computer Security and Privacy
Personally, Identifiable Information (PII) and Data Classification
Cyber Security Threats and Vulnerabilities
Mobile Device Security
Should read The Cybersecurity Awareness course is an informative, non-technical, and highly effective awareness course covering the top security issues in which enterprise end-users jeopardize information assets and the systems that are used to protect, process, store or transmit organizational data some of the questions they’ll be able to answer include:
Who is responsible for cybersecurity within your organization?
What resources are available within your organization if you suspect a cybersecurity incident has occurred?
Where can you find the document that states how an organization protects it’s Physical and Intellectual assets?
When does an employee inadvertently put their company at risk?
Why is an effective cybersecurity program important?
How can an employee take proactive steps to protect their organization's privacy?
Upon completion of the in person or online course, users will complete a questionnaire which measures the individual’s retention of the information presented in the course. Once a student passes with a score of 70% or higher, a Certificate of Completion will be awarded.
Cyber Security Training for Physical System Integrators
Dealers Security Awareness Modules