Information Assurance Officer (IAO) Course (CNSS-4014E)
Information Assurance Associates (IA2)
// May 31 - June 1 |
Black Hat + GTEC 2011 Training Session //May 31 - June 1
Overview:
Information Assurance Associates (IA2) is formally accredited by the Committee on National Security Systems (CNSS), which operates under the National Security Agency (NSA), to provide comprehensive certification training for Information Assurance Officers (IAOs). This course curriculum was specifically designed for IAOs that exercise system level security control over Department of Defense (DOD), Intelligence Community (IC) or federal interest critical information infrastructures.
This IAO course provides two days of comprehensive, non-technical, entry level professional training necessary to achieve the fundamental knowledge, skills, and abilities necessary to facilitate and integrate requisite system level security policies, processes, practices, procedures and protocols within DoD, IC and federally controlled information systems and networks.
This training focuses on planning, identifying, implementing, enforcing and maintaining data center security as well as integrating technical and non-technical solutions for securing critical information infrastructures and establishing standards necessary to help protect the confidentiality, maintain the integrity and ensure the availability of sensitive data and critical organizational computing resources.
Specific focus and special emphasis is directed on identifying, implementing and integrating management and administrative solutions for securing critical federal interest information infrastructures and establishing standards necessary to help protect the confidentiality, maintain the integrity and ensure the availability of sensitive and classified data as well as critical organizational computing resources. This course provides comprehensive training for IAO's in establishing organizational Information System Security policies, developing internal processes; outlining critical procedures and implementing specially tailored protocols that facilitate the protection of sensitive, classified and national intelligence information infrastructures.
- Implementation and Enforcement of Information System Security Policies and Practices
- Data Encryption (Cryptology)
- Physical, System and Data Access Control
- Malicious Logic/MALWARE - Prevention, Detection, Reaction, Recovery and Reporting
- Configuration Management, Contingency Planning and Disaster Recovery
- Threat and Vulnerability Assessment; Risk Response and Recovery Actions
- Information System and Network Security Certification and Accreditation (C&A)
Student Requirements, experience/expertise:
Students should have a fundamental understanding as well as practical knowledge and experience in enforcing Information Assurance requirements, applying information system security methodologies and facilitating certification and accreditation activities.
What you get
- Student Training Manual
- Exercise Work-Booklet
- Student Course CD – One Per Student
- Certification - CNSS-4014E Information Assurance Officer (IAO) Graduation Certificate vice
What to bring:
Students should have a fundamental understanding as well as practical knowledge and experience in enforcing Information Assurance requirements, applying information system security methodologies and facilitating certification and accreditation activities.
Trainers:
Norman Beebe has over 25 years of managing information security within federal interest computer systems and networks that store, process, transmit or display sensitive, classified or national intelligence information. Mr. Beebe’s technical certifications include: Certified Information System Security Professional (CISSP), International Information Systems Security Certification Consortium (ISC2); Certified Information Security Manager (CISM), Information Systems Audit and Control Association; National Security Agency (NSA) Information System Security Assessment and Evaluation Methodologies (IAM/IEM); and he is endorsed as a "Fully Qualified" Certification Agent. He has extensive experience in defining and designing risk analysis methodologies within federal information infrastructures and served as an NSA Adjunct Faculty member and as an NSA Accreditation Action Officer (AAOs). Mr. Beebe is a recipient of the prestigious Copernicus Award for excellence and special achievement in Command, Control, Communication, Computer and Intelligence (C4I) and winner of the National Information Assurance Leadership Award for Security Education, Training and Awareness.
Gregory Welch has extensive experience in training, curriculum development, and Information Assurance (IA). Coming from a background of cryptology and signals analysis, he has used this capability to design, develop, and map multiple training courses to the Committee of National Security Systems (CNSS) requirements. He has developed and delivered numerous presentations at seminars and conferences; most recently as a guest presenter at the National Security Institute (NSI) during the Impact 2008 conference. He has provided Certification and Accreditation (C&A) efforts and training to DoD and Federal agencies including: FBI, NSA, DHS, Coast Guard, NGA, DOI, DOJ, and all branches of the armed forces. Mr. Welch is a Certified Information System Security Professional (CISSP), and a "Fully Qualified Certification Agent". He is certified in National Security Agency (NSA) Information System Security Assessment and Evaluation Methodologies (IAM/IEM) and has received the "Advanced Signals Analyst" designation.
Jeff Moulton In September 2008, Mr. Moulton joined Georgia Tech Research Institute (GTRI) as Lead, Information Operations. GTRI is a leading university-affiliated applied research and development center. In this key area, Mr. Moulton provides strategic direction and leadership and is responsible for focusing research, business development, building technical teams, and coordinating information operations across the university and institute. Mr. Moulton has in-depth experience within the intelligence communities assessing and defining corporate-level and globally deployable network security solutions. His technical certifications include: Certified Information Systems Security Professional (CISSP), International Information Systems Security Certification Consortium (ISC2), Project Management Professional (PMP), Project Management Institute, National Security Agency (NSA) Information Assurance Manager (IAM), National Security Agency (NSA) INFOSEC Evaluation Methodology (IEM), Open Source Professional Security Analyst (OPSA), and Malware Forensics Investigator (MFI), Wetstone. Before joining GTRI, Mr. Moulton served as the Information Assurance Assistant Program Manager at the Naval Surface Warfare Center. In this role he established an Information Assurance (IA) Division for the Deployable Joint Command and Control (DJC2) Joint Program Office. He provided leadership and direction for all information assurance facets of the $566M Joint Program of Record and managed the many facets of a major DoD acquisition program. He recruited and built the first joint integrated IA team across government and military service branches, with members from DIA, NSA, SPAWAR, NETWARCOM, OSD NII, JITC, USJFCOM, USPACOM, USEUCOM, USSOUTHCOM, and other Department of Defense (DoD) IA stakeholders. Mr. Moulton authored the DJC2 IA Strategy, Technology Readiness Assessments, Analysis of Alternatives, and other DoD acquisition documents required by public law. Mr. Moulton continues to represent the DJC2 Joint Program Office as the IA subject matter expert with DoD intelligence agencies (NSA, CIA, and DIA). In addition, Mr. Moulton serves on the Department of the Navy Network Warfare Command (NETWARCOM) IA Working Group.
Best Price: |
Early Pricing: |
Standard On-site: |
$2200 |
$2400 |
$2600 |