GAI cyber






TRAINING


GAI Cyber offers a variety of training courses for certifications and cybersecurity topics. Classes are taught through online delivery format, as well as in person – at one of our training sites or at your headquarters. Looking for a different course or a custom class? We will tailor course content to meet specific needs.


Scanning Tools


NMAP

Comprehensive course on leveraging Nmap as a port scanning and service detection tool

Course Outline:

  • Crafting Nmap Command Line Syntax
  • Selecting Pertinent Nmap Triggers
  • Running a Scan
  • Exporting Scan Results
  • Troubleshooting Common Issues
  • Interpreting and Analyzing Scan Results
  • Utilizing Zenmap



  • Nessus

    Comprehensive course on leveraging Tenable Nessus Vulnerability Scanner

    Course Outline:

  • Creating a Nessus Scan Policy
  • Customizing Scan parameters
  • Running a Nessus Scan
  • Running Compliance Checks
  • Running a Database Scan
  • Troubleshooting Common Issues
  • Interpreting and Analyzing Scan Results



  • HP WebInspect

    Comprehensive course on utilizing HP WebInspect Web Application Scanner

    Course Outline:

  • Customizing Scan Parameters
  • Leveraging the WebInspect Proxy
  • Utilizing Authentication Mechanisms
  • Recording Login Macros
  • Launching a Scan
  • Exporting Scan Results
  • Troubleshooting Common Issues
  • Interpreting and Analyzing Scan Results



  • Certifications


    CompTIA Security+

    Everything you need to know to pass the SYO-401 Exam. Get DoD 8570 IAT Level ll Certified!

    Learn the fundamentals of Cybersecurity. Includes: Simulation Exercises, Study Guide and Expert Test Taking Strategies



    CompTIA Network+

    Everything you need to know to pass the N10-006 Exam. Get DoD 8570 IAT/IAM Level l Certified!

    Learn the fundamentals of networking. Includes: Simulation Exercises, Study Guide and Expert Test Taking Strategies
    National Institute of Standards and Technology (NIST) Publications


    NIST 800-53: Security and Privacy Controls for Federal Information Systems and Organizations

    Course Outline:

  • Changes between NIST 800-53 Revision 4 and Revision 5
  • NIST Control Families
  • Control Selection and Baselines
  • Interpreting Controls and their Objectives
  • Implementing Control Requirements



  • NIST 800-53a: Assessing Security and Privacy Controls in Federal Information Systems and Organizations

    Course Outline:

  • NIST Controls from the Auditor perspective
  • Interpreting Control Requirements
  • Assessing Controls
  • Preparing for an Audit



  • NIST 800-37: Guide for Applying the Risk Management Framework to Federal Information Systems

    Course Outline:

  • The Federal Authorization and Accreditation (A&A) process
  • 6 Steps of the Risk Management Framework (RMF)
  • Overview of the NIST Documents associated with the RMF
  • Implementing the RMF for your Clients or Organization