Professional Certification Training

Professional Certification Training

In addition to Risk Management Framework (RMF) training, BAI now offers training for industry-standard certifications in the following areas:

●     CISM – Certified Information Security Manager

●     CEH – Certified Ethical Hacker

●     CISSP – Certified Information System Security Professional

These classes are presented by our strategic partner, Integration Technologies Cyber Training (ITCT), a division of RPI Group, Inc.


CISM – Certified Information Security Manager Training

Course Overview

Demonstrate your information security management expertise. The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages designs, and oversees and assesses an enterprise’s information security. This course focuses on advanced risk management and specific compliance and security management operations.

What is Covered

●     In-depth coverage of the four domains required to pass the CISM exam:

  • Information Security Governance
  • Information Risk Management and Compliance
  • Information Security Program Development and Management
  • Information Security Incident Management

●     Essential Test Taking Tips and Strategies for Success!

US Department of Defense Approved

CISM certification is included in the approved list of certifications that meet the DoD Directive 8570.1 requirements.

Who Should Attend

●     Experienced information security managers and those who have information security management responsibilities, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.

●     CISM is designed for:

  • Information Security Managers
  • Upcoming Information Security Managers
  • Information Systems & Information Technology Consultants

Click here to request additional information on the CISM training program.


CEH – Certified Ethical Hacker Training

Become an Ethical Hacker!

An Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is a trusted individual usually employed with the organization or authorized by an organization to undertake an authorized attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.

US Department of Defense Approved

Certified Ethical Hacker certification is included in the approved list of certifications that meet the DoD Directive 8570.1 requirements.

What You Will Learn

●     Introduction to Ethical Hacking ●     Session Hijacking
●     Footprinting and Reconnaissance ●     Hacking Webservers
●     Scanning Networks ●     Hacking Web Applications
●     Enumeration ●     SQL Injection
●     System Hacking ●     Hacking Wireless Networks
●     Trojans and Backdoors ●     Evading IDS, Firewalls, and Honeypots
●     Viruses and Worms ●     Buffer Overflow
●     Sniffers ●     Cryptography
●     Social Engineering ●     Penetration Testing
●     Denial of Service

Who Should Attend

Ethical hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Course Comments

"The class was outstanding! I was thoroughly prepared for the exam and passed with no problem!"

Click here to request additional information on the CEH training program.


CISSP – Certified Information System Security Professional Training

Prepare yourself for one of the most prestigious security certifications with superior prep materials and test-taking tips from the experts.

Our experts provide you with real-world experience and cover all the material you need to prepare for the (ISC)2 CISSP exam with proven test taking tips and strategies.

US Department of Defense Approved

CISSP certification is included in the approved list of certifications that meet the DoD Directive 8570.1 requirements.

What You Will Learn

Focused coverage of the ten domains required to pass the CISSP exam:

  1. Security Operations
  2. Access Control
  3. Cryptography
  4. Security Architecture and Design
  5. Telecommunications and Network Security
  6. Disaster Recovery and Business Continuity Planning
  7. Legal, Regulations, Compliance, and Investigations
  8. Software Development Security
  9. Information Security Governance and Risk Management
  10. Physical (Environmental) Security

What is Covered

Introduction

  • Course Overview
  • CISSP Candidate Requirements
  • CISSP Exam Review

Disaster Recovery and Business Continuity Planning

  • Disaster Recovery Planning
  • Business Impact Analysis
  • Business Continuity Planning
  • Backup and Off-Site Facilities
  • Testing Contingency Plans

Security Operations

  • Operation Security Principles, Techniques, and Mechanisms
  • Principles and Practices of Good Security
  • Resource Protection Mechanisms and Techniques
  • Attacks and Prevention Methods

Legal, Regulations, Compliance, and Investigations

  • Laws and Ethics
  • Computer Crime
  • Incident Response and Forensics

Access Control

  • Authentication
  • Authorization
  • Accountability
  • Threats to Access Control

Software Development Security

  • Database Security
  • System Development
  • Software Development Methods
  • Threats and Vulnerabilities

Cryptography

  • History of Cryptography
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashing and Digital Signatures
  • Public Key Infrastructure
  • Cryptographic Attacks

Information Security Governance and Risk Management

  • Security Management
  • Risk Analysis
  • Classification Controls

Security Architecture and Design

  • Computer Architecture
  • Rings of Protection
  • Security Models
  • System Evaluation

Physical (Environmental) Security

  • Threats to Physical Security
  • Administrative Controls
  • Environmental and Safety Controls
  • Physical and Technical Controls

Telecommunications and Network Security

  • The OSI Model
  • The TCP/IP Model
  • WAN Protocols
  • Routing
  • Wireless Systems
  • Fault Tolerance

Test Review and Preparation

  • Test Review
  • Test Registration
  • Test Preparation
  • Certification Maintenance

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Who Should Attend

IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers, and other security professionals whose positions require CISSP certification.

Course Comments

"The class was excellent! The ITCT instructor has great knowledge of the subject and an awesome communication to skill to make it easy to learn and prepare."

Click here to request additional information on the CISSP training program.

 

Signup to receive our Newsletter  or view archived newsletters

BAI Information Security Introduces Risk Management Framework (RMF) for DoD IT Training Program

March 31, 2014 - BAI Information Security today announced the latest update to its cybersecurity risk management training portfolio. The Risk Management Framework for DoD IT training program covers the newly-unveiled DoD risk management methodology and the process of transition from the legacy DIACAP process.