Cybersecurity Fundamentals for ISSOs
The Cybersecurity Fundamentals course provides students with an overview of core information assurance (IA) and cybersecurity concepts. The course will consist of lectures and hands-on labs for a multi-faceted learning experience. This course will provide a good initial foundation for participants wanting to work in a corporate or government security role and ultimately pursue an […]
Cybersecurity Operations for ISSOs
This course presents a real-world view of Enterprise Cybersecurity Operations. Topics covered include Network Traffic Analysis, Threat Detection, Penetration Testing, Incident Response, High Availability & Disaster Recovery, and Data Analytics for Cyber. Students will see demonstrations and get some hands-on exposure to each of these topics.
Cybersecurity Risk Management and Compliance for ISSOs
This course focuses the student on a broad range of topics relative to risk-based planning and implementation for enterprise cybersecurity, looking at both internal and external threats. External threats will consider a variety of threat actors including nation states, terrorists, hactivists and criminals. Internal threats will focus on insider threat, exploring what insider threat means […]
Decision and Risk Analysis
This course provides an overview of decision and risk analysis techniques. It focuses on how to make rational decisions in the presence of uncertainty and conflicting objectives. Concepts will be illustrated through case studies and practiced by students through exercises.
Digital Engineering
This course covers the essentials of Digital Engineering, which is an advancement and evolution of proven Systems Engineering methods and frameworks. Digital Engineering is the use and development of computer models that represent all aspects of a complex product or system. The modeling process creates digital data and digital linkages that can be leveraged to […]
Digital Engineering Modeling
Digital Engineering is the use and development of computer models that represent all aspects of a complex product or system. The modeling process creates digital data and digital linkages that can be leveraged to integrate product/ system design, development, delivery, and full lifecycle support. This course teaches the essentials of Digital Engineering Modeling. The focus […]
Enterprise Architecture Practitioner’s Guide (Extended)
This course lays the foundation of the core EA concepts, using TOGAF as the common vocabulary for enterprise architecture. The course then focuses on practical skills to perform the foundational activities of EA: Developing a vision; establishing an architecture baseline; developing a target business architecture, target data architecture, target application architecture, and target technology architecture. […]
Gathering and Documenting Requirements with Use-Cases
Learn best practices for gathering and documenting user requirements based on the use-case approach. Over the course of a case-study project, trainees gain experience facilitating requirements-gathering workshops and creating textual use-case documentation with supporting diagrams. The course covers what the Business Analyst needs to know to plan and execute each requirements gathering session as the […]
INCOSE Systems Engineering Professional (SEP) Exam Preparation
The International Council on Systems Engineering (INCOSE) Systems Engineering Professional (SEP) certification is a highly sought after for those engineers seeking recognition for their education, experience, and knowledge in the highly competitive field of Systems Engineering. Whether you are going for a Certified Systems Engineering Professional (CSEP) or an Associate Systems Engineering Professional (ASEP), you […]
Information Systems Security for ISSOs
This course takes an operational approach to implementing and managing effective cybersecurity in highly networked enterprises. Topics include an evaluation of government and commercial security management models; security program development; risk assessment and mitigation; threat and vulnerability analysis and risk remediation; cybersecurity operations; incident handling; business continuity planning and disaster recovery; security policy formulation and […]
ISSO Certification Training Program
With the complexity and rate of change in modern information technologies and systems and the ever-increasing number of Cyber threats and attacks, the Information System Security Officer (ISSO) serves a critical role within Federal Government agencies. The ISSO must work with the Business, IT, and Security functions of the agency to ensure that Federal information […]
Leadership, Management and Communication Skills for ISSOs
Strong Information Security requires the following from an organization: additional processes and documentation; more attention to detail; coordination of teams and individuals; increased scrutiny for everyone. People and organizations are inherently resistant to all of the aforementioned. The ISSO plays a key role in ensuring that system security is achieved despite this resistance. This course […]