GAI cyber






TRAINING


GAI Cyber offers a variety of training courses for certifications and cybersecurity topics. Classes are taught through online delivery format, as well as in person – at one of our training locations or on client site. Looking for a different course or a custom class? We will tailor course content to meet specific needs. Contact us for details about training course availability and scheduling.

Beginner

Intermidiate

Expert

BREAKING INTO CYBER SECURITY

What is cyber

What are some jobs in cyber

Career Path

How to get your first job

Salary expectations

Free Resources

Not Ready
Ready

Cyber Security & IT 101

Course Outline:

For those new to IT, an overview of key concepts

OSI Model, Basic Computer/Networking components

Servers, databases, applications

Routers/switches/firewalls/IDS/IPS

virtualization, Cloud computing

Ports, protocols, services

Confidentiality, Integrity, Availability

Encryption and Hashing

Risk/Threats/Vulnerabilities

Vulnerability scanning

Penetration testing

Security Khowledge Self Assessment Quiz

READINESS CHECK

Vulnerability Scanning:
Nessus & NMap

Course Outline:

Crafting NMap/Zenmap Command Line Syntax

Selecting Pertinent Nmap Triggers

Running an NMap Scan

Creating a Nessus Scan Policy

Customizing Nessus Scan Parameters

Running Nessus vulnerability & compliance scans

Troubleshooting Common Scan Issues

Interpreting and Analyzing Scan Results

Exporting Scan Results & Generating Reports

CRISC Prep
Course

Course Outline:

Online/classroom instruction

Full Coverage of CRISC exam outline

Real world examples

Hands-on Exercises

Expert Test Taking strategies

Practice questions

Splunk
Fundamenals
-Future State-

Course Outline:

Coming Soon

Security +
Prep Course

Course Outline:

Online/classroom instruction

Full Coverage of Security+ exam outline

Real world example

Hands-on Exercises

Expert Test Taking strategies

Practice questions

Resume
Writing
& Inerview
Prepration
Workshop

Course Outline:

What is a Resume

How Recruiting Works

Resume Best Practices

How to Write a Resume

Interviewing

Money

Mock Job Searches

Resume Workshop

Interview Workshop

CISSP Prep
Course

Course Outline:

Online/classroom instruction

Full Coverage of CISSP exam outline

Real world examples

Hands-on Exercises

Expert Test Taking strategies

Practice questions and exam

Cybersecuirty
ISSO
Training
- NIST 800-37/800-53

Course Outline:

The Federal (A&A) process

6 Steps of the Risk Management Framework (RMF)

Overview of required NIST RMF Documents

How to implement the RMF

NIST Control Families

Control Selection and Baselines

Interpreting Controls Objectives

Implementing Control Requirements

How to write security controls

Cybersecurity
Assessor
Training -
NIST 800-53a

Course Outline:

NIST Controls from the Auditor perspective

Interpreting Control Requirements

Assessing Controls

Preparing for an Assessment

Generating Assessment Reports

Defending Assesment Findings

AWS
Fundamentals
-Future States-

Course Outline:

Coming Soon

FedRAMP Consulting
Course

Course Outline:

FedRAMP vs. NIST requirements

Required Artifacts

ATO types

FedRAMP PMO

Customer Responsibility Matrix

Control writing

3PAO auditing