Skip Ribbon Commands
Skip to main content

Government Solutions
 
Overview
Government agencies continue to face the challenge of improving staff productivity and efficiency, achieving optimized performance of their enterprises, meeting legislative requirements, and battling the ever-present threat of security breaches –while trying to accomplish all of these objectives with reduced budgets.  The GSAtrain team understands this demanding environment and how critical it is to not only develop laser-focused solutions that support targeted initiatives, but to deliver them on time and at a competitive price point. 
 
GSAtrain Consultants and Subject Matter Experts (SMEs) take the time to meet with key stakeholders to gain a comprehensive understanding of not only the immediate/short-term requirements, but the history of the organization and long-term objectives.  We approach every training engagement as if it’s a custom opportunity, as each team and individual student has a different baseline of knowledge and skill set, as well as learning styles.  Our objective is to have all students reach the same level at the conclusion of each training session, and prepare them for the challenges they’ll face in their workplace.
 
Whether you’re interested in obtaining a certification under the 8570.1 Directive (soon to be DoD 8140), implementing the National Cybersecurity Workplace Framework within your organization, or deploying a specific technology initiative, GSAtrain has the experience and expertise to ensure its success.
 
 
Department of Defense Directive 8570.1
GSAtrain maintains a comprehensive portfolio of the most current information technology, information assurance and cybersecurity courses that supports the DoD 8570.1 directive.
 
GSAtrain offers training that supports the certifications highlighted below.
 
Department of Defense Directive 8570.1     Baseline Certifications
IAT Level I
IAT Level II
IAT Level III
A+ CE
GSEC
CISA
Network+ CE
Security+ CE
CISSP (or Associate)
SSCP
SCNP
GCIH
CCNA Security
SSCP
CASP
 
CCNA Security
GCED
IAM Level I
IAM Level II
IAM Level III
 
CAP
 
CAP
GSLC
GSLC
GSLC
CISSP (or Associate)
 
CISSP (or Associate)
 
IASAE I
IASAE II
IASAE III
CISSP (or Associate)
CISSP (or Associate)
CISSP – ISSEP
CISSP – ISSAP
CSSLP
CSSLP
 
CNDSP Analyst
CNDSP Infrastructure Support
CNDSP Incident Reporter
GCIA
 
GCIH
SSCP
CSIH
GCIH
 
 
GCED
CNDSP Auditor
CNDSP Manager
CISSP-ISSMP
GSNA
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Quite a bit was learned from the implementation of the 8570 directive, which will now be incorporated in the move to 8140.  While still evolving, the new DoD 8140 Directive is based on National Institute of Standard and Technology (NIST) National Initiative for Cybersecurity Education (NICE) standard.
 
National Initiative for Cybersecurity Education(NICE)
The National Initiative for Cybersecurity Education (NICE) has developed the National Cybersecurity Workforce Framework to provide a common understanding of and lexicon for cybersecurity work. Defining the cybersecurity population consistently, using standardized terms is an essential step in ensuring that our country is able to educate, recruit, train, develop, and retain a highly-qualified workforce.
 
The intention of the Framework is to describe cybersecurity work regardless of organizational structures, job titles, or other potentially idiosyncratic conventions. For example, under this structure an individual may perform tasks in more than one specialty area, or all of an individual’s work may fall within a single specialty area. Similarly, large agencies may have many individuals devoted to a single specialty area while smaller agencies may need individuals to cross multiple specialty areas. Within any given organization, the way these groupings are organized into positions, career fields, or work roles depends on a number of factors including organizational characteristics (e.g., geographic location), constraints (e.g., limited personnel), and mission. Thus, due to the variety of jobs, occupations, cultures, structures within any given agency or organization, there may not always be a “one-to-one” crosswalk of jobs or career fields to individual specialty areas.
 
The following table provides information on the seven (7) categories of the National Cybersecurity Workforce Framework.
FRAMEWORK CATEGORY
OVERVIEW
SPECIALTY AREAS
SECURELY PROVISION
Specialty areas responsible for conceptualizing, designing, and building secure information technology (IT) systems, i.e., responsible for some aspect of systems development.
Information Assurance (IA) Compliance, Software Assurance and Security Engineering, Systems Security Architecture, Technology Research and Development, Systems Requirements Planning, Test and Evaluation, Systems Development
OPERATE AND MAINTAIN
Specialty areas responsible for providing support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security.
Data Administration, Knowledge Management, Customer Service and Technical Support, Network Services, Systems Administration, Systems Security Analysis
PROTECT AND DEFEND
Specialty areas responsible for identification, analysis, and mitigation of threats to internal information technology (IT) systems or networks.
Computer Network Defense (CND) Analysis, Incident Response, Computer Network Defense (CND) Infrastructure Support, Vulnerability Assessment and Management
INVESTIGATE
Specialty areas responsible for investigation of cyber events and/or crimes of information technology (IT) systems, networks, and digital evidence.
Digital Forensics, Investigation
COLLECT AND OPERATE
Specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.
Collection Operations, Cyber Operations Planning, Cyber Operations
ANALYZE
Specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.
Threat Analysis, Exploitation Analysis, All Source Intelligence, Targets
OVERSIGHT AND DEVELOPMENT
Specialty areas providing leadership, management, direction, and/or development and advocacy so that individuals and organizations may effectively conduct cybersecurity work.
Legal Advice and Advocacy, Strategic Planning and Policy Development, Education and Training, Information Systems Security Operations (Information Systems Security Officer [ISSO]), Security Program Management (Chief Information Security Officer [CISO])
 
 
GSAtrain is well positioned to support the DoD 8140 Directive when officially launched, and will continue to work with NIST, NICCS, US-CERT, DHS and the DoD to support the National Initiative for Cybersecurity Education (NICE).