Cybersecurity Procedures Overview: DoDI 8500.01 Training

Cybersecurity Procedures Overview: DoDI 8500.01 Training

Introduction:

Cybersecurity Procedures Overview: DoDI 8500.01 Training Powered by ENO

Cybersecurity Procedures Overview: DoDI 8500.01 Training gives you a classified approach and step by step procedure to secure your information system based on DoD standard instructions. DoDI 8500.01 is a cybersecurity program to protect and defend DoD information and Information Technology (DoD IT) from prospective cybersecurity threats.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience/Target Group

IT professionals in the DoD organizations
Airforce and Military Personnel in charge of cybersecurity
DoD employees and contractors or service providers
All DoD personnel in charge of information assurance
Authorizing official representatives, chief information officers, senior information assurance officers, information system owners or certifying authorities
Employees of federal agencies and the intelligence community
Assessors, assessment team members, auditors, inspectors or program managers of information technology area
Any individual looking for information assurance implementation for a company based on recent DoD and NIST policies
Information system owners, information owners, business owners, and information system security managers

Cybersecurity Procedures Overview: DoDI 8500.01 TrainingRelated Courses:

Duration: 2 days

Introduction to Department of Defense Cybersecurity Program Overview

Department of Defense Directive 8000.01 (DoDD 8000.01)
Department of Defense Directive 8500.01e and 8500.2
S Department of Defense Policies
DoD Directive 8100.1 (DoDD 8100.1)
Department of Defense Instruction 8520.01 (DoDI 8510.01)
National Security Agency (NSA) IA Mitigation Guidance
National Institute of Standards and Technology (NIST) Computer Security Division
NIST Publication Series
Federal Information Processing Standards (FIPS)
FIPS Publication 199
FIPS Publication 200
Special Publications (SP) 800 Series
SP 800-37, Applying Risk Management Framework to Federal Information Systems
SP 800-53, Security and Privacy Control for Federal Inforamtion Systems and Organizations
SP 800-60, Mapping Types of Information and Information Systems to Security Categories
Risk Management Framework (RMF)

Cybersecurity Steps for DoD

Risk Management
Operational Resilience
Integration and Interoperability
Cyberspace Defense
Performance Test
DoD Information Security
Identity Assurance
DoD Information Technology
Cybersecurity Workforce
DoD Risk Executive Function

Cybersecurity Risk Management

Adopting NIST’s RMF
NIST SP 800-37
Authorization to Operate (ATO)
Committee on National Security Systems Instructions (CNSSI) 1253
Transition of DoD IS and PIT system to CNSSI 1253
Transition of DoD to NIST SP 800-53
Integrated Organization-Wide Risk Management
Tiered Approach to Risk Management
Organization
Mission/Business
Information Systems
RMF Life Cycle
DoD Risk Executive Function
DT&E and OT&E Integration
Codifying the Reciprocity
Enterprise-wide IT Governance
Continuous monitoring
Risk Assessment
Security Control

Operational Resilience

Trustworthy Information Resources
Information Resource Degradation/Loss
Prevailing Adverse Events
Ike Skelton National Defense Authorization Act
Supporting Acquisition Program Protection
Identifying Critical Program Information
Mission Planning based on DoDD 3020.26
Restoring Information resources
Preserving Trust for Security of DoD During Transmission
Communications Security (COMSEC) based on DoDI 8523.01
Transmission Security (TRANSEC)

Cybersecurity Test and Evaluation

DODI 5000.02
Cybersecurity T&E Phases
Understanding Cybersecurity Requirements
Characterizing the Cyber Attack Surface
Cooperative Vulnerability Identification Adversarial Cybersecurity DT&E
Cooperative Vulnerability and Penetration Assessment
Adversarial Assessment
Cybersecurity T&E Resources
Cyber Ranges

Integration and Interoperability

Net-Centric Model Operation
Integration of System Life Cycle
Interoperability of Cybersecurity Products
Semantic, Technical and Policy Interoperability
Standard-Based Approach , NIST SP 800-126 for Security Control Automation Protocol (SCAP)
DoD Architecture Principles
Repositories

Cyberspace Defense

DoD IT Protection referred to DoD Manual O-8530.01
Cyberspace Defense Based on DoDI 8410.02
Continuous monitoring Capability Based on NIST SP 800-137
Penetration and Exploitation Testing
Cyber Defense Personnel Referred to DoDI 8520.03
Digital and Multimedia Forensics for DoD IT, DoDD 5505.13
DoDI 5240.26 for International Terrorism and CI Insider Threat
Insider Threats Policies
DoD Network Administration Cybersecurity Protection

Performance Test

Organization Mechanisms for Cybersecurity
Maintaining Accountability of Information
Consistent Cybersecurity Implementation Monitoring and Verification
DoDD 7045.14 for Decision Process Facilitation
Strategic Cybersecurity Metrics Definition by DoD CIO

DoD Information Security

DoDI 5200.01 for Classified Information
Information Sharing Policies Defined by DoDD 8320.02
Defense Cybersecurity Program
Protection of Classified Information
Public Release Information Clearance, DoDD 5320.09 and DoDI 8582.01
Spillage of Classified Information
Automated Sharing and Protection of DoD Information
Compliance of DoD IT with DoDI 5400.16 and DoD 8580.02R
Privacy Impact Assessment (PIA) for DoD IS
Cryptography of DoD Information
Public Media Information Security by DoD 5205.02 and DoDI 8550.01

DoD Identity Assurance

DoD Approved Identity Credentials
Recording the Identification Entities
Identity Assurance Procedures
Identity Management Strategic Plan for DoD
Identity Assurance Implementation Guidance
Identity Reliant functions for Information and Infrastructure
Identity Assurance Policies

DoD Information Technology

Information Systems
Enclaves
Automated Information System Applications
DoD Component CIO
DoD Is Registration
Stand-Alone Systems
Notice Consent Banners
PIT
IT Services
IT Products
IT Considerations
NIST 800-88 for Electronic Media Disposal

DoD Cybersecurity Wrokforce

Qualified Cybersecurity Workforce
Identified Cybersecurity Positions
Cybersecurity Awareness Orientations
Cybersecurity Function
Position Designation Criteria

Hands On, Workshops and Group Activities

Labs
Workshops
Group Activities

Sample Workshops and Labs for Cybersecurity Procedures Overview, DoDI 8500.01 Training

Using NIST standards for cybersecurity implementation
Cybersecurity Test and Evaluation based on DODI 5000.02
Risk management Case Study based on NIST SP 800-37
DoDI 5200.01 for Classified Information Case Study
Identity Assurance Case Study

Understand the life cycle of cybersecurity and different types of threats and vulnerabilities in DoD Information System
Learn about different Department of Defense (DoD) Directives and Instructions (DoDD and DoDI)
Explain NIST Special Publication (NIST SP) series of publications used for DoD cybersecurity implementation
Apply Risk Management Framework (RMF) based on NIST SP 800-37 to DoD information system
Understand different steps to cybersecurity for DoD
Employ risk management for DoD
Characterize the cyber-attack surface
Describe Security control Automation Protocol (SCAP)
Apply Cyberspace defense techniques based on DoDI 8410.02 to DoD information systems
Organize mechanism for cybersecurity of DoD information
Secure the classified information and understand information sharing policies
Identify DoD approved identity credentials
Learn about different layers of DoD Information Technology (DoD IT) such as CIO and PIT

Course Content:

Introduction to Department of Defense Cybersecurity Program Overview

Department of Defense Directive 8000.01 (DoDD 8000.01)
Department of Defense Directive 8500.01e and 8500.2
S Department of Defense Policies
DoD Directive 8100.1 (DoDD 8100.1)
Department of Defense Instruction 8520.01 (DoDI 8510.01)
National Security Agency (NSA) IA Mitigation Guidance
National Institute of Standards and Technology (NIST) Computer Security Division
NIST Publication Series
Federal Information Processing Standards (FIPS)
FIPS Publication 199
FIPS Publication 200
Special Publications (SP) 800 Series
SP 800-37, Applying Risk Management Framework to Federal Information Systems
SP 800-53, Security and Privacy Control for Federal Inforamtion Systems and Organizations
SP 800-60, Mapping Types of Information and Information Systems to Security Categories
Risk Management Framework (RMF)

Cybersecurity Steps for DoD

Risk Management
Operational Resilience
Integration and Interoperability
Cyberspace Defense
Performance Test
DoD Information Security
Identity Assurance
DoD Information Technology
Cybersecurity Workforce
DoD Risk Executive Function

Cybersecurity Risk Management

Adopting NIST’s RMF
NIST SP 800-37
Authorization to Operate (ATO)
Committee on National Security Systems Instructions (CNSSI) 1253
Transition of DoD IS and PIT system to CNSSI 1253
Transition of DoD to NIST SP 800-53
Integrated Organization-Wide Risk Management
Tiered Approach to Risk Management
Organization
Mission/Business
Information Systems
RMF Life Cycle
DoD Risk Executive Function
DT&E and OT&E Integration
Codifying the Reciprocity
Enterprise-wide IT Governance
Continuous monitoring
Risk Assessment
Security Control

Operational Resilience

Trustworthy Information Resources
Information Resource Degradation/Loss
Prevailing Adverse Events
Ike Skelton National Defense Authorization Act
Supporting Acquisition Program Protection
Identifying Critical Program Information
Mission Planning based on DoDD 3020.26
Restoring Information resources
Preserving Trust for Security of DoD During Transmission
Communications Security (COMSEC) based on DoDI 8523.01
Transmission Security (TRANSEC)

Cybersecurity Test and Evaluation

DODI 5000.02
Cybersecurity T&E Phases
Understanding Cybersecurity Requirements
Characterizing the Cyber Attack Surface
Cooperative Vulnerability Identification Adversarial Cybersecurity DT&E
Cooperative Vulnerability and Penetration Assessment
Adversarial Assessment
Cybersecurity T&E Resources
Cyber Ranges

Integration and Interoperability

Net-Centric Model Operation
Integration of System Life Cycle
Interoperability of Cybersecurity Products
Semantic, Technical and Policy Interoperability
Standard-Based Approach , NIST SP 800-126 for Security Control Automation Protocol (SCAP)
DoD Architecture Principles
Repositories

Cyberspace Defense

DoD IT Protection referred to DoD Manual O-8530.01
Cyberspace Defense Based on DoDI 8410.02
Continuous monitoring Capability Based on NIST SP 800-137
Penetration and Exploitation Testing
Cyber Defense Personnel Referred to DoDI 8520.03
Digital and Multimedia Forensics for DoD IT, DoDD 5505.13
DoDI 5240.26 for International Terrorism and CI Insider Threat
Insider Threats Policies
DoD Network Administration Cybersecurity Protection

Performance Test

Organization Mechanisms for Cybersecurity
Maintaining Accountability of Information
Consistent Cybersecurity Implementation Monitoring and Verification
DoDD 7045.14 for Decision Process Facilitation
Strategic Cybersecurity Metrics Definition by DoD CIO

DoD Information Security

DoDI 5200.01 for Classified Information
Information Sharing Policies Defined by DoDD 8320.02
Defense Cybersecurity Program
Protection of Classified Information
Public Release Information Clearance, DoDD 5320.09 and DoDI 8582.01
Spillage of Classified Information
Automated Sharing and Protection of DoD Information
Compliance of DoD IT with DoDI 5400.16 and DoD 8580.02R
Privacy Impact Assessment (PIA) for DoD IS
Cryptography of DoD Information
Public Media Information Security by DoD 5205.02 and DoDI 8550.01

DoD Identity Assurance

DoD Approved Identity Credentials
Recording the Identification Entities
Identity Assurance Procedures
Identity Management Strategic Plan for DoD
Identity Assurance Implementation Guidance
Identity Reliant functions for Information and Infrastructure
Identity Assurance Policies

DoD Information Technology

Information Systems
Enclaves
Automated Information System Applications
DoD Component CIO
DoD Is Registration
Stand-Alone Systems
Notice Consent Banners
PIT
IT Services
IT Products
IT Considerations
NIST 800-88 for Electronic Media Disposal

DoD Cybersecurity Wrokforce

Qualified Cybersecurity Workforce
Identified Cybersecurity Positions
Cybersecurity Awareness Orientations
Cybersecurity Function
Position Designation Criteria

Hands On, Workshops and Group Activities

Labs
Workshops
Group Activities

Sample Workshops and Labs for Cybersecurity Procedures Overview, DoDI 8500.01 Training

Using NIST standards for cybersecurity implementation
Cybersecurity Test and Evaluation based on DODI 5000.02
Risk management Case Study based on NIST SP 800-37
DoDI 5200.01 for Classified Information Case Study
Identity Assurance Case Study

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment