Military Solutions

Military Solutions from New Horizons NH Computer Learning

Directive 8570 Training at NH Computer Learning

In August of 2004 the US Department of Defense (DoD) signed Directive 8570, which requires every part-time or full-time military member or defense contractor with privileged access to a DoD information system to carry an approved certification for their particular job classification.

This measure ensures that those performing information assurance (security) measures have the necessary skills and knowledge to protect important information.

New hires must obtain appropriate baseline certifications within six months of being assigned to information assurance functions. NH Computer Learning can help you achieve Directive 8570 certification requirements. We provide a complete and thorough training solution to help prepare you to pass Directive 8570 certification exams.

Our Directive 8570 solutions include:

  • Baseline certification training for those who perform Information Assurance functions
  • Continuous education to maintain certifications and further develop skills
  • Certification training for specific operating systems

Department of Defense Directive 8570.1-M Baseline Certifications

IAT Level I IAT Level II IAT Level III
A+ CE GSEC CISA
Network+ CE Security+ CE CISSP (or Associate)
SSCP SCNP GCIH
CCNA Security SSCP CASP
CCNA Security GCED
IAM Level I IAM Level II IAM Level III
CAP
CAP GSLC GSLC
GSLC CISM CISM
Security+ CE CASP CISSP (or Associate)
CISSP (or Associate)
IASAE I IASAE II IASAE III
CISSP (or Associate) CISSP (or Associate)
CASP CASP CISSP - ISSEP
CSSLP CSSLP CISSP - ISSAP


 
CNDSP
Analyst
CNDSP
Infrastructure Support
CNDSP
Incident Reporter
CNDSP
Auditor
CNDSP
Manager
GCIH
GCIA SSCP CSIH CISA CISSP-ISSMP
CEH CEH CEH GSNA CISM
GCIH GCED CEH


 
New Horizons 8570.1 Information Assurance
Certification Training
New Horizons Operating Systems and Technical
Environment Certification Training
A+
Security+
Network+ Cisco
CCNA Security Microsoft
CASP Novell / Linux
CEH
CISSP

Directive 8140 Training at NH Computer Learning

As the transition from Directive 8570 to Directive 8140 begins, NH Computer Learning's dedicated government team is here to guide you along the way. The DoD 8140 model is based on the National Institute of Standard and Technology (NIST) National Initiative for Cybersecurity Education (NICE) standard. This model will define categories as well as job titiles more clearly.

NH Computer Learning has the training expertise and capability to thoroughly train Department of Defense (DoD) personnel and contractors to comply with the very specific certification requirements of Directive 8140. The new framework allows for many different classes, certifications and formalized training to now qualify an individual as "certified" in that task.

Department of Defense Directive 8140

  • Information Assurance Compliance
  • Software Assurance and Security Engineering
  • Systems Development
  • Systems Requirements Planning
  • Systems Security Architecture
  • Technology Research and Development
  • Test and Evaluation

Specialty areas concerned with conceptualizing, designing, and building secure IT systems, with responsibility for some aspect of the systems' development. Courses could include, CompTIA A+, Network+ and Security+, CISSP, and others.

  • Customer Service and Technical Support
  • Data Administration
  • Knowledge Management
  • Network Services
  • System Administration
  • Systems Security Analysis

Specialty areas responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security. Courses could include, CISA, Cisco IIINS, Cisco SENSS, CSX Practitioner and others.

  • Education and Training
  • Information Systems Security Operations
  • Legal Advice and Advocacy
  • Security Program Managemet (CISO)
  • Strategic Planning and Policy Development

Specialty areas providing leadership, management, direction, and/or development and advocacy so that all individuals and the organization may effectively conduct cybersecurity work. Courses could include, CyberSAFE, CISA, CISM, CISSP, CSX Practitioner, and others

  • Computer Network Defense Analysis
  • Computer Network Defense Infrastructure Support
  • Incident Response
  • Vulnerability Assessment and Management

Specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks. Courses could include, CyberSAFE, Cisco IIINS, Cisco SENSS, Cisco SITCS1 and others

  • All Source Intelligence
  • Exploitation Analysis
  • Targets
  • Threat Analysis

Specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. Courses could include, CEH, CSX Specialist, CyberSec First Responder, PAN, ECSA, and others.

  • Collect Operations
  • Cyber Operations
  • Cyber Operations Planning

Specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. Courses could include, CSX Practitioner, CSX Specialist, CISSP and others.

  • Digital Forensics
  • Investigation

Specialty areas responsible for the investigation of cyber events and/or crimes of IT systems, networks, and digital evidence. Courses could include, CISA, CISM, CHFI, CSX Practitioner, and others