DoD 8140/8570 Compliance Training Courses

DoD 8140/8570 Compliance Training Courses

DoD 8140/8570 Compliance Training Courses

DoD 8140/8570 Compliance Training

The Department of Defense (DoD) released the Cyberspace Workforce Management directive, DoD Directive (DoDD) 8140.01, on August 11, 2015. This directive is for personnel who support DoD intelligence, security and law enforcement missions in cyberspace.

8140.01 reissues and renumbers DoDD 8570.01 to update and expand established policies and assigned responsibilities for managing the DoD cyberspace workforce. The goal of this directive is to unify the overall cyberspace workforce and establish specific workforce elements (cyberspace effects, cybersecurity and cyberspace information technology) to align, manage and standardize cyberspace work roles, baseline qualifications and training requirements.

No specific training requirements for DoDD 8140.01 have been released at this time. 8570.01-M is the Information Assurance (IA) Workforce Improvement Program manual, and it is still in effect. The DoD Approved Baseline Certifications table provides a list of DoD-approved certifications aligned to each category and level of the IA workforce. Personnel performing IA functions must obtain one of the certifications required for their position’s category or specialty and level.

We can help you obtain and maintain certifications outlined in 8570.01-M.

DoDD 8140 (DoDD 8570) Requires:

  • All personnel performing IAT and IAM functions must be certified.
  • All personnel performing CND-SP and IASAE roles must be certified.
  • All IA jobs will be categorized as ‘Technical’ or ‘Management’ Level I, II, or III, and to be qualified for those jobs, you must be certified.

Who is Affected by DoDD 8140/8570?

Any full or part-time military service member, contractor, or local nationals with privileged access to a DoD information system performing information assurance (security) functions — regardless of job or occupational series.

  • Office of the Secretary of Defense
  • Military Departments
  • Chairman of the Joint Chiefs of Staff
  • Combatant Commands
  • Office of the Inspector General of the DoD
  • Defense Agencies
  • DoD Field Activities
  • All other organizational entities in the DoD

Baseline Certifications

Our certification training prepares you for baseline certifications as identified in the DoD-Approved Baseline Certifications Table AP3.T2. Packed with resources to help you prepare for your certification exam, our learning solutions can be tailored to fit your unique needs and include resources such as:

  • Study guides and digests
  • Pre- and post-assessment questions
  • Test vouchers
  • Assessments
  • Certification preparation
  • Program management
  • Post training and testing
  • Tracking and reporting

Approved Courses

Technical (IAT Level I, II, & III Training Courses)

Management (IAM Level I, II & III Training Courses)

IASAE (Level I, II, & II Training Courses)

CSSP: (Analyst, Infrastructure Support, Incident Responder, Auditor, & Manager Training Courses)

The above table provides a list of DoD approved IA baseline certifications aligned to each category and level of the IA Workforce. Personnel performing IA functions must obtain one of the certifications required for their position, category/specialty and level to fulfill the IA baseline certification requirement. Most IA levels within a category or specialty have more than one approved certification and a certification may apply to more than one level.

An individual needs to obtain only one of the “approved certifications”; for his or her IA category or specialty and level to meet the minimum requirement. For example, an individual in an IAT Level II position could obtain any one of the four certifications listed in the IAT Level II cell.

Higher level IAT and IAM certifications satisfy lower level requirements. Certifications listed in Level II or III cells can be used to qualify for Level I. However, Level I certifications cannot be used for Level II or III unless the certification is also listed in the Level II or III cell. For example:

The A+ or Network+ certification qualify only for Technical Level I and cannot be used for Technical Level II positions. The System Security Certified Practitioner (SSCP) certification qualifies for both Technical Level I and Technical Level II. If the individual holding this certification moved from an IAT Level I to an IAT Level II position, he or she would not have to take a new certification.

Higher level CSSP and IASAE certifications do not satisfy lower level requirements

Why is ENO Wireless the Best source for Information Security Training?

ENO Wireless is the leading organization in computer security training. We provides intensive, immersion training designed to help you and your staff master the practical steps necessary for defending systems and networks against the most dangerous threats — the ones being actively exploited. The courses are full of important and immediately useful techniques that students can put to work as soon as they return to their offices through courses that are updated multiple times throughout the year. Our courses were developed through a consensus process involving hundreds of administrators, security managers, and information security professionals. Our courses address both security fundamentals and the in-depth technical aspects of the most crucial areas of information security.

Purchasing Options

  • Contract Payment Options and Vehicles
  • ENO Wireless accepts Government Purchase Cards, Credit Cards, Purchase Orders and Checks.

For organizational purchases, please send us a message at Space, Satellite and Aerospace Trainingsales@enowireless.com or complete and submit this form

what we offer

1

WIRELESS TECHNOLOGIES TRAINING

The wireless communications industry is constantly evolving, making it a necessity for employees in the field to have access to the very latest information. Bt_more

2

TELECOMMUNICATIONS TRAINING

Getting the Right Knowledge to the Right People at the Right Time. Anywhere. With Onsite Training, courses can be scheduled on a date that is.. Bt_more

3

WIRELESS TECHNOLOGIES CONSULTING

ENOWIRELESS draws on the knowledge and expertise of our instructors and consultants, whose skills span a wider range of capability than any.. Bt_more

4

CYBERSECURITY TRAINING COURSES

When you consider just a few of the consequences of a security breach – your proprietary information completely accessible, hefty fines for security lapses.. Bt_more

5

TRAINING DELIVERY OPTIONS

Choose from our convenient delivery formats to get the training you and your team need—where, when and how you want it. Whether it’s in a classroom or online, public or private.. Bt_more

Our clients

ibm_logo
airLogo_DLlg
HHS-logo
AF
AF
verizon-wireless
DISA
DISA
lockheed
mckesson_logo
raytheon_logo
logo_saic

0