CYBERSECURITY 1st RESPONDER: THREAT DETECTION AND RESPONSE

This 5 day course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the  organization, this … Continue reading

Writing and Managing Effective Requirements

In this 3 day course students will learn a clear understanding of all the facets of the business analysis role, including a thorough walkthrough of the various domain/knowledge areas that comprise the business analysis profession. Target Audience This course is … Continue reading

Managing and Communicating Requirements for Projects

In this 2 day course students will learn to develop a plan that includes determining the requirements activities a Business Analyst will perform on a particular project and how you will control and manage changes to the deliverables. Target Audience … Continue reading

Federal Risk Management Framework (RMF) Implementation 3.1: DoD/IC Edition

Students in this 3 day course will learn the DoD Risk Management and Risk Management Framework governance structure for resolving Cybersecurity conflicts throughout the acquisition and sustainment of the systems lifecycle. Course Outline Chapter 1: Introduction Key concepts including assurance, … Continue reading

Project Communication & Stakeholder Management

This 3 day course is primarily designed for project managers and supervisors who want to improve their project communication management skills. The course is particularly helpful for new project managers, and for project managers working in multi-stakeholder project environments. Individuals … Continue reading

Project Ethics and Risk Management

Students in this 3 day course will learn ethical considerations and Cybersecurity support roles, responsibilities and strategies that include Risk and Risk Management Framework  governance structure for resolving Cybersecurity conflicts throughout the acquisition and sustainment of the systems lifecycle. Course … Continue reading