DoD 8140/8570 Compliance Training
The Department of Defense (DoD) released the Cyberspace Workforce Management directive, DoD Directive (DoDD) 8140.01, on August 11, 2015. This directive is for personnel who support DoD intelligence, security and law enforcement missions in cyberspace.
8140.01 reissues and renumbers DoDD 8570.01 to update and expand established policies and assigned responsibilities for managing the DoD cyberspace workforce. The goal of this directive is to unify the overall cyberspace workforce and establish specific workforce elements (cyberspace effects, cybersecurity and cyberspace information technology) to align, manage and standardize cyberspace work roles, baseline qualifications and training requirements.
No specific training requirements for DoDD 8140.01 have been released at this time. 8570.01-M is the Information Assurance (IA) Workforce Improvement Program manual, and it is still in effect. The DoD Approved Baseline Certifications table provides a list of DoD-approved certifications aligned to each category and level of the IA workforce. Personnel performing IA functions must obtain one of the certifications required for their position’s category or specialty and level.
We can help you obtain and maintain certifications outlined in 8570.01-M.
DoDD 8140 (DoDD 8570) Requires:
- All personnel performing IAT and IAM functions must be certified.
- All personnel performing CND-SP and IASAE roles must be certified.
- All IA jobs will be categorized as ‘Technical’ or ‘Management’ Level I, II, or III, and to be qualified for those jobs, you must be certified.
Who is Affected by DoDD 8140/8570?
Any full or part-time military service member, contractor, or local nationals with privileged access to a DoD information system performing information assurance (security) functions — regardless of job or occupational series.
- Office of the Secretary of Defense
- Military Departments
- Chairman of the Joint Chiefs of Staff
- Combatant Commands
- Office of the Inspector General of the DoD
- Defense Agencies
- DoD Field Activities
- All other organizational entities in the DoD
Baseline Certifications
Our certification training prepares you for baseline certifications as identified in the DoD-Approved Baseline Certifications Table AP3.T2. Packed with resources to help you prepare for your certification exam, our learning solutions can be tailored to fit your unique needs and include resources such as:
- Study guides and digests
- Pre- and post-assessment questions
- Test vouchers
- Assessments
- Certification preparation
- Program management
- Post training and testing
- Tracking and reporting
Approved Courses
Technical (IAT Level I, II, & III Training Courses)
- Certified Ethical Hacker Training (CEH) v10
- CompTIA A+ Certification Training
- CompTIA Network+ Certification Training (N10-008)
- CompTIA Security+ Certification Training (SY0-601)
- Certified Authorization Professional Training (CAP)
- CompTIA Advanced Security Practitioner Training (CASP+)
- Computer Hacking Forensics Investigator Training (CHFI)
- Fundamentals of Information Security Training
- System Security Certified Practitioner Training (SSCP)
- Implementing Cisco Edge Network Security Solutions Training (SENSS)
- Implementing Cisco Secure Mobility Solutions Training (SIMOS)
- Implementing Cisco Secure Access Solutions Training (SISAS)
- Implementing Cisco Threat Control Solutions Training (SITCS)
- Certified Information Systems Auditor Training (CISA)
- Certified Information Security Manager Training (CISM)
- Certified Information Systems Security Professional Training (CISSP)
- Information System Security Engineering Professional Training (ISSEP)
- Information System Security Architecture Professional Training (ISSAP)
- Information System Security Management Professional Training (ISSMP)
- Securing Cisco Networks with Threat Detection and Analysis Training v1.2 (SCYBER)
Management (IAM Level I, II & III Training Courses)
- CompTIA Security+ Certification Training (SY0-601)
- Certified Authorization Professional Training (CAP)
- CompTIA Advanced Security Practitioner Training (CASP+)
- Computer Hacking Forensics Investigator Training (CHFI)
- Certified Information Security Manager Training (CISM)
- Certified Information Systems Security Professional Training (CISSP)
- Certified Chief Information Security Officer Training (CCISO)
IASAE (Level I, II, & II Training Courses)
- CompTIA Advanced Security Practitioner Training (CASP+)
- Certified Information Systems Security Professional Training (CISSP)
- Certified Secure Software Lifecycle Professional Training (CSSLP)
- Information System Security Engineering Professional Training (ISSEP)
- Information System Security Architecture Professional Training (ISSAP)
CSSP: (Analyst, Infrastructure Support, Incident Responder, Auditor, & Manager Training Courses)
- Certified Ethical Hacker Training (CEH) v10
- Securing Cisco Networks with Threat Detection and Analysis Training v1.2 (SCYBER)
- Certified Information Systems Auditor Training (CISA)
- Certified Information Security Manager Training (CISM)
- Information System Security Management Professional Training (ISSMP)
The above table provides a list of DoD approved IA baseline certifications aligned to each category and level of the IA Workforce. Personnel performing IA functions must obtain one of the certifications required for their position, category/specialty and level to fulfill the IA baseline certification requirement. Most IA levels within a category or specialty have more than one approved certification and a certification may apply to more than one level.
An individual needs to obtain only one of the “approved certifications”; for his or her IA category or specialty and level to meet the minimum requirement. For example, an individual in an IAT Level II position could obtain any one of the four certifications listed in the IAT Level II cell.
Higher level IAT and IAM certifications satisfy lower level requirements. Certifications listed in Level II or III cells can be used to qualify for Level I. However, Level I certifications cannot be used for Level II or III unless the certification is also listed in the Level II or III cell. For example:
The A+ or Network+ certification qualify only for Technical Level I and cannot be used for Technical Level II positions. The System Security Certified Practitioner (SSCP) certification qualifies for both Technical Level I and Technical Level II. If the individual holding this certification moved from an IAT Level I to an IAT Level II position, he or she would not have to take a new certification.
Higher level CSSP and IASAE certifications do not satisfy lower level requirements
Why is ENO Wireless the Best source for Information Security Training?
ENO Wireless is the leading organization in computer security training. We provides intensive, immersion training designed to help you and your staff master the practical steps necessary for defending systems and networks against the most dangerous threats — the ones being actively exploited. The courses are full of important and immediately useful techniques that students can put to work as soon as they return to their offices through courses that are updated multiple times throughout the year. Our courses were developed through a consensus process involving hundreds of administrators, security managers, and information security professionals. Our courses address both security fundamentals and the in-depth technical aspects of the most crucial areas of information security.
Purchasing Options
- Contract Payment Options and Vehicles
- ENO Wireless accepts Government Purchase Cards, Credit Cards, Purchase Orders and Checks.
For organizational purchases, please send us a message at sales@enowireless.com or complete and submit this form
what we offer
1WIRELESS TECHNOLOGIES TRAINING
The wireless communications industry is constantly evolving, making it a necessity for employees in the field to have access to the very latest information.
TELECOMMUNICATIONS TRAINING
Getting the Right Knowledge to the Right People at the Right Time. Anywhere. With Onsite Training, courses can be scheduled on a date that is..
WIRELESS TECHNOLOGIES CONSULTING
ENOWIRELESS draws on the knowledge and expertise of our instructors and consultants, whose skills span a wider range of capability than any..
CYBERSECURITY TRAINING COURSES
When you consider just a few of the consequences of a security breach – your proprietary information completely accessible, hefty fines for security lapses..