Training fully verified by the Federal Acquisition Institute (FAI)
- Bring this or any training to your organization
Full-scale program development
- Delivered when, where, and how you want it
- Blended learning models
- Tailored content
- Expert team coaching
FAC-P/PM-IT Training: Security, Accessibility and Quality (FPM 512)
- Duration: 4 days
- Labs: Yes
- Language: English
23 PMI PDUs
- Level: Intermediate
This FAC-P/PM-IT FPM 512 course is right for anyone tasked with selecting, implementing and evaluating information system security controls. Mature frameworks and generally accepted practices aid in producing a strong, comprehensive security posture. This FAC-P/PM-IT course is helpful for federal agencies seeking FISMA compliance, but is beneficial anyone seeking a comprehensive Risk Management Framework.
Learning Tree’s FAC-P/PM-IT training has been fully verified by the Federal Acquisition Institute (FAI).
- All Federal employees (non-DoD) who work in a Program/Project Management role are required to be FAC-P/PM certified. Private industry/contractors are eligible to attend FAC-P/PM training, but are not eligible to become certified.
- FAC-P/PM certification is awarded at the agency level, and requirements vary by agency. Check with your Acquisition Career Manager (ACM) for information on certification requirements.
Train your whole team by bringing this course to your facility
FAC-P/PM-IT Training: Security, Accessibility and Quality (FPM 512) Course Benefits
- Learn how to use the admin tasks and tools of the Power BI admin portal and the Office 365 admin center.
- Automate the admin tools by using administrative APIs and PowerShell cmdlets.
- Learn how to share Power BI assets within your organization safely.
- Navigate the Power BI audit log to identify and resolve errors within the Power BI platform.
- Apply your knowledge in demo learning labs.
- Follow a curriculum based on Microsoft's Official Courseware.
- Continue learning and face new challenges with after-course one-on-one instructor coaching.
FPM 512 Course Outline
- Applying defense in depth: tools, techniques, and people
- Comprehending FISMA and OMB oversight
- Assimilating Risk Management Framework Security Life Cycle
Multi-tiered risk management
- Organization: Strategic risk management
- Mission/Business: Tactical approach to risk
- Information Systems
Defining roles and responsibilities
- Distinguishing hierarchy and critical roles of risk management
- Defining responsibilities assigned to specific roles
- Separating roles and areas of responsibility
Phases of risk management
- Categorizing information systems
- Selecting security controls
- Implementing security controls
- Assessing security controls
- Authorizing information systems
- Monitoring security controls
Introducing information assurance
- Assuring security throughout the data life cycle
- Integrating information assurance into software development
- Building in “secure by design.”
- Implementing information assurance best practices
- Ensuring component security
Penetration testing and vulnerability assessments
- Validating security functions and configuration
- Finding weaknesses within systems before the attacker does
Keeping current with information assurance
- Full disclosure vs. responsible disclosure
- Exploring vulnerability databases
Modularization (the OSI 7 Layer Model)
- Networking principles powering the Internet
- Modeling a packet
Confidentiality, integrity, and availability across the network
- Encrypting for confidentiality
- Sniffing the network and protocol analysis
- Modifying data via man-in-the-middle attacks
Networking services and security
- Poisoning the DNS cache
- Incorporating core services, including DHCP, ICMP, and ARP
- Hardening the TCP/IP stack
- Managing factors of authentication (something you know, have, or are)
- Attacking passwords
- Comprehending PKI and public critical authentication systems
- Evaluating the suitability of biometrics
- Integrating multi-factor authentication
- Incorporating ARP, DHCP, DNS, and protocol insecurities
- Performing and detecting MAC and IP address spoofing
- Achieving strong host authentication
- Analyzing Kerberos and IPSec
Encrypting and exercising integrity functions
- Capitalizing on asymmetric or Public Key cryptography
- Applying symmetric cryptography
- Exercising message digest functions for integrity
Certificates and Certification Authorities
- Clarifying PKI and certificate fields
- Publishing certificate revocation and certificate security
- Digitally signing for strong authentication
- Proving authentication, integrity, and non-repudiation
- Promoting open data policies
- Removing barriers to enhance accessibility for people
- Enabling IT accessibility
Need Help Finding The Right Training Solution?
Our training advisors are here for you.
Security, Accessibility and Quality Course FAQs
This course provides the knowledge and hands-on experience needed to master the concepts covered in and provides some of the necessary prerequisites for earning FAC-P/PM IT certification.
Yes! Learning Tree provides Private Team Training that can save time and travel costs by training your entire team at once, at a convenient location of your choice. We handle all the details including instructor travel, tailored content, comprehensive course materials, shipping and equipment setup and teardown.