GAI cyber






TRAINING


GAI Cyber offers a variety of training courses for certifications and cybersecurity topics. Classes are taught through online delivery format, as well as in person – at one of our training locations or on client site. Looking for a different course or a custom class? We will tailor course content to meet specific needs. Contact us for details about training course availability and scheduling.


Scanning Tools
nmap
Course Outline:
NMAP
Course Outline:
  • Crafting Nmap Command Line Syntax
  • Selecting Pertinent Nmap Triggers
  • Running a Scan
  • Exporting Scan Results
  • Troubleshooting Common Issues
  • Interpreting and Analyzing Scan Results
  • Utilizing Zenmap
  • nmap
    Course Outline:
    Nessus
    Course Outline:
  • Creating a Nessus Scan Policy
  • Customizing Scan parameters
  • Running a Nessus Scan
  • Running Compliance Checks
  • Running a Database Scan
  • Troubleshooting Common Issues
  • Interpreting and Analyzing Scan Results
  • nmap
    Course Outline:
    HP WebInspect
    Course Outline:
  • Customizing Scan Parameters
  • Leveraging the WebInspect Proxy
  • Utilizing Authentication Mechanisms
  • Recording Login Macros
  • Launching a Scan
  • Exporting Scan Results
  • Troubleshooting Common Issues
  • Interpreting and Analyzing Scan Results


  • Prep Courses
    nmap
    Cybersecurity Certification Preparation Courses
    Prep Courses Currently offered:
  • CompTIA Security+
  • Certified Accreditation Professional (CAP)
  • CSA Certificate of Cloud Security Knowledge (CCSK)
  • ISC2 Certified Cloud Security Professional (CCSP)
  • ISC2 Certified Information Security Professional (CISSP)


  • NIST Publications
    training_nist80053
    NIST 800-53
    Course Outline:
  • NIST Control Families
  • Control Selection and Baselines
  • Interpreting Controls Objectives
  • Implementing Control Requirements
  • training_nist80053
    NIST 800-53a
    Course Outline:
  • NIST Controls from the Auditor perspective
  • Interpreting Control Requirements
  • Assessing Controls
  • Preparing for an Assessment
  • Generating Assessment Reports
  • Defending Assesment Findings
  • training_nist80053
    NIST 800-37
    Course Outline:
  • The Federal Authorization and Accreditation (A&A) process
  • 6 Steps of the Risk Management Framework (RMF)
  • Overview of required NIST RMF Documents
  • How to implement the RMF
  • training_nist80053
    NIST 800-171
    Course Outline:
  • Compliance Requirements
  • CDI vs. CUI vs. CTI
  • CUI Scoping
  • Boundary Identification
  • Required Actions & Artifacts
  • How to Comply






  • Scanning Tools




    NMAP
    Comprehensive course on leveraging Nmap for host discovery, port scanning and service detection.

    Course Outline:
    • Crafting Nmap Command Line Syntax
    • Selecting Pertinent Nmap Triggers
    • Running a Scan
    • Exporting Scan Results
    • Troubleshooting Common Issues
    • Interpreting and Analyzing Scan Results
    • Utilizing Zenmap


    Nessus
    Comprehensive course on leveraging Tenable Nessus Vulnerability Scanner.

    Course Outline:
    • Creating a Nessus Scan Policy
    • Customizing Scan parameters
    • Running a Nessus Scan
    • Running Compliance Checks
    • Running a Database Scan
    • Troubleshooting Common Issues
    • Interpreting and Analyzing Scan Results


    HP WebInspect
    Comprehensive course on utilizing HP WebInspect Web Application Scanner.

    Course Outline:
    • Customizing Scan Parameters
    • Leveraging the WebInspect Proxy
    • Utilizing Authentication Mechanisms
    • Recording Login Macros
    • Launching a Scan
    • Exporting Scan Results
    • Troubleshooting Common Issues
    • Interpreting and Analyzing Scan Results
    images_training1
    images_training2



    Cybersecurity Certification Preparation Courses




    All courses include:
    • Online/Classroom-based instruction with an expert cyber trainer
    • Exam Simulation Exercises
    • Study Guides
    • Expert Test Taking Strategies

    Prep Courses Currently offered:
    • CompTIA Security+
    • Certified Accreditation Professional (CAP)
    • CSA Certificate of Cloud Security Knowledge (CCSK)
    • ISC2 Certified Cloud Security Professional (CCSP)
    • ISC2 Certified Information Security Professional (CISSP)




    National Institute of Standards and Technology (NIST) Publications




    NIST 800-53: Security and Privacy Controls for Federal Information Systems and Organizations

    Course Outline:
    • NIST Control Families
    • Control Selection and Baselines
    • Social Engineering exercises
    • Interpreting Controls and their Objectives
    • Implementing Control Requirements



    NIST 800-53a: Assessing Security and Privacy Controls in Federal Information Systems and Organizations

    Course Outline:
    • NIST Controls from the Auditor perspective
    • Interpreting Control Requirements
    • Assessing Controls
    • Preparing for an Audit



    NIST 800-37: Guide for Applying the Risk Management Framework to Federal Information Systems

    Course Outline:
    • The Federal Authorization and Accreditation (A&A) process
    • 6 Steps of the Risk Management Framework (RMF)
    • Overview of the NIST Documents associated with the RMF
    • Implementing the RMF for your Clients or Organization



    NIST 800-171: Protecting Unclassified Information in Nonfederal Information Systems and Organizations


    Course Outline:
    • Compliance Requirements as a non-federal entity
    • CDI vs. CUI vs. CTI
    • CUI Scoping
    • Boundary Identification
    • Required Actions & Artifacts
    images_training3