Python can be used for nearly anything in cybersecurity. Python is used heavily in malware, host discovery, the sending and decoding of packets, accessing servers, port scanning and network scanning.
Duration: 24 hours
RMF emphasizes integrating cybersecurity activities into existing processes including program protection planning, networks analysis, developmental and operational test and evaluation, financial management and cost estimating, and sustainment and disposal.
Duration: 8 hours
The System Security Plan (SSP) provides an overview of a security package that describes all the security controls in use on the information system and their implementation. Students will receive step-by-step guidance on how to create such plan.
Duration: 8 hours
The Plan of Actions & Milestones (POA&M) is a key document in the security authorization package and for continuous monitoring activities. Students will receive step-by-step guidance on how to create such plan.
Duration: 8 hours
The NIST is a key resource for technological advancement and security at many of the country’s most innovative organizations. As such, compliance with NIST standards and guidelines has become a top priority in many high-tech industries today. Understanding how to comply with NIST guidelines and recommendations will help federal agencies and employees are compliant with other regulations, such as HIPAA, FISMA, or SOX.
Duration: 8 hours
A disaster can be classified as a sudden event, including an accident or natural disaster, that creates wide scoping, detrimental damage. In information management, DRPs are considered a critical subset of an entity’s larger business continuity plan (BCP), which seeks to prepare for, prevent, and recover from potential threats affecting an organization. DRPs provide instructions to follow when responding to various disasters, including both cyber and environment-related events.
Duration: 16 hours