SlideShare a Scribd company logo
1 of 4
Download to read offline
DOD 8570 - Information Assurance Training — COMPTIA —
Deadlines — Mandates - Requirements
DOD 8570 Certifications Overview: US Department of Defense Directive
8570 aims to certify all military IT professionals working in Information
Assurance jobs within a prescribed timetable. The spirit of Directive 8570 is to
establish a common baseline understanding of IT security issues, protocols and
procedures across the Government and military. The actual training
requirements are spelled out in the DOD 8570 manual, an official document
that comes in at roughly 100 pages. DOD 8570 certification levels are designed
to fit the level and type of job activity such as workforce level, degree of data
security and supervision of other workers.
Background: In the past decade the DOD has taken concrete steps to protect
the information resources of our military and Government. Specific high profile
hacking cases and a general public awareness of increasing reliance upon a
vulnerable IT infrastructure have illuminated the necessity for our critical
national defense organizations to protect and safeguard their computing systems
against threats both internal and external.
Scope and Progress: Certification requirements are closely matched to job
levels and activities as they are identified, tracked and catalogued within their
respective organizations. DOD 8570 requirements extend to military personnel,
contractors and civilians employed in DOD IA roles. Four broad military IA
workforce categories govern the structure of DOD 8570 certification
requirements. These are Information Assurance Technician (IAT), Information
Assurance Manager (IAM), Information Assurance System Architect and
Engineer (IASAE) and Computer Network Defense (CND). Workforce
manpower certification statistics have been and continue to be mapped and
monitored for completeness and overall unit training progress. Progress toward
100% certification is not publicly available, but anecdotal reports suggest that
the military remains behind schedule in certifying all personnel according to the
original timetables laid out in the DOD 8570 manual.
Timetable: New hires into Department of Defense Information Assurance
positions must be DOD 8570 certified within six months unless granted a
temporary waiver. Uncertified workers must be supervised by certified
personnel. All combat forces must be certified before deployment, unless
granted a temporary waiver that suspends the regular certification timetable;
upon return from combat deployment, the six-month requirement applies. The
original 2005 DOD 8570 Manual specified a phase-in timetable that may have
been more aggressive than realistic. Nevertheless, by the end of calendar year
2010, all workers performing Information Assurance Technical (IAT) and
Information Assurance Management (IAM) functions must comply with
certification requirements.
Critical areas: All IT workers either in the classified SIPRNET (Secret Internet
Protocol Router Network) or unclassified NIPRNET (Non-classified Internet
Protocol Router Network) networks must comply with the directive.
Additionally, IA workers in areas that safeguard the privacy of personnel
records, such as medical or demographic data, must comply with certification
requirements.
Training overview: Certifications begin at the basic level, increase through
tiers of responsibility, and all include a continuing education requirement that
amounts to 20 – 40 hours per year, or 120 hours every three years. In addition to
formal training and continuing education requirements, there are requirements
for on-the-job hands-on experiential training. Certification levels span three
tiers (Levels I, II and III) for both Information Assurance Technical (IAT) and
Information Assurance Management (IAM) functions. Additionally, training
should cover these topics as outlined in the Manual:
• Laws, policies and procedures affecting the user community
• The latest external threats to network security, such as scripts, hackers,
crackers and foreign agents
• Up-to-date internal threats such as incompetent, malicious or disgruntled
authorized workers, crackers and hackers
• Shared risk, risk of aggregating unclassified information, risk of remote
access data transmission
• Knowledge of how the latest malicious code examples such as Viruses,
Trojan Horses, Worms, Logic Bombs can infiltrate a system, the damage
they can cause, and how to contain and repair their damage
• Denial of service attacks
• Embedded hardware and software vulnerabilities
• Encryption principles and applications
• Restricting access through passwords and data hierarchies
• Policy and procedure differences between classified and non-classified
networks
• Data archival policies and procedures
• Operating-system specific training will be required of technical personnel
Training components - IAT Level I: The COMPTIAA Plus certification and
COMPTIA Network Plus certification form part of the first level of 8570
technical certification. Additionally, the Systems Security Certified Practitioner
(SSCP) is required on the IAT side.
Training components - IAT Level II: The COMPTIA Security Plus
certification is one of four DOD 8570 formal education requirements for IAT
Level II. Additionally, the GIAC (Global Information Assurance Certification)
Security Essentials Certification (GSEC), the Security Certified Network
Professional (SCNP) and SSCP certifications form the IAT Level II curriculum.
Training components - IAT Level III: The Certified Information Systems
Security Professional (CISSP certification) certification is part of the four core
formal study requirements. The Certified Information Systems Auditor (CISA
certification), GIAC Security Expert (GSE) and Security Certified Network
Architect (SCNA) certifications complete the formal educational requirements
for IAT Level III.
Training components - IAM Level I: Certifications in GIAC Information
Security Fundamentals (GISF) certification, GIAC Security Leadership
Certification (GSLC), CompTIA Security+ and Certification and Accreditation
Professional (CAP) constitute the four formal requirements for the IAM Level I
accreditation.
Training components - IAM Level II: Certifications in GIAC Security
Leadership Certification (GSLC), Certified Information Systems Security
Professional (CISSP), Certified Information Security Manager (CISM) and
Certification and Accreditation Professional (CAP) constitute the four formal
requirements for the IAM Level II accreditation.
Training components - IAM Level III: The Certified Information Systems
Security Professional (CISSP), Certified Information Security Manager (CISM)
and GIAC Security Leadership Certification (GSLC) accreditations constitute
the three formal requirements for the IAM Level III certification.
Training components – IASAE and CND: The certification requirements for
these workforce categories draw from the same body of off-the-shelf IT security
courses, plus a specialized battery of certifications including Information
Systems Security Engineering Professional (ISSEP), Information Systems
Security Architecture Professional (ISSAP), Certified Ethical Hacker (CEH).
GIAC Certified Incident Handler (GCIH), Certified Computer Security Incident
Handler (CSIH), GIAC Systems and Network Auditor (GSNA) and Certified
Information Systems Security Professional - Information Systems Security
Management Professional (CISSP-ISSMP).
Training providers: The aggressive deadline that the DOD has set for IAM
and IAT personnel certifications will be met by ANSI-certified third party
Information Assurance training providers such as Knowledge Center Inc., a
proven vendor of quality classroom and online IT certification programs.
Northern Virginia and Washington DC area based KCI has earned a stellar
reputation in the IT training sector by successfully certifying in tens of
thousands of IT professionals. Their client list covers not only all major US
government agencies but also a large percentage of Fortune 500 companies
spanning all major industry sectors.
Training methodology: The baseline for DOD training and certification is
Computer Based Training (CBT) and web-based instruction. The DAA may
waive or modify training requirement as it adapts to changing environmental
conditions and resource constraints.
Urgency: Again, the deadline for DOD 8570 Information Assurance
certification across the entire armed forces has been set as December 31, 2010.
Because all personnel must be certified in their respective units by this date,
schools across the country are seeing unprecedented demand for class seats.
Quick certification programs are being offered to accommodate the urgency and
satisfy demand, but space is limited by available resources.

More Related Content

Recently uploaded

Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyOrtega Alikwe
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书saphesg8
 
Graduate Trainee Officer Job in Bank Al Habib 2024.docx
Graduate Trainee Officer Job in Bank Al Habib 2024.docxGraduate Trainee Officer Job in Bank Al Habib 2024.docx
Graduate Trainee Officer Job in Bank Al Habib 2024.docxJobs Finder Hub
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证nhjeo1gg
 
Back on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveBack on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveMarharyta Nedzelska
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证diploma001
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...nitagrag2
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...RegineManuel2
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一A SSS
 
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfMost Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfTheKnowledgeReview2
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 
美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作ss846v0c
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一Fs
 
Navigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and HiringNavigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and Hiringkaran651042
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of JobRemote DBA Services
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfjtzach
 

Recently uploaded (20)

Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary Photography
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书
 
Students with Oppositional Defiant Disorder
Students with Oppositional Defiant DisorderStudents with Oppositional Defiant Disorder
Students with Oppositional Defiant Disorder
 
Graduate Trainee Officer Job in Bank Al Habib 2024.docx
Graduate Trainee Officer Job in Bank Al Habib 2024.docxGraduate Trainee Officer Job in Bank Al Habib 2024.docx
Graduate Trainee Officer Job in Bank Al Habib 2024.docx
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
 
Back on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveBack on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental Leave
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
 
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfMost Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
 
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 
美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
 
Navigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and HiringNavigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and Hiring
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Job
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdf
 

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

DOD 8570-Information Assurance Training-COMPTIA-Deadlines-Mandates-Requirements

  • 1. DOD 8570 - Information Assurance Training — COMPTIA — Deadlines — Mandates - Requirements DOD 8570 Certifications Overview: US Department of Defense Directive 8570 aims to certify all military IT professionals working in Information Assurance jobs within a prescribed timetable. The spirit of Directive 8570 is to establish a common baseline understanding of IT security issues, protocols and procedures across the Government and military. The actual training requirements are spelled out in the DOD 8570 manual, an official document that comes in at roughly 100 pages. DOD 8570 certification levels are designed to fit the level and type of job activity such as workforce level, degree of data security and supervision of other workers. Background: In the past decade the DOD has taken concrete steps to protect the information resources of our military and Government. Specific high profile hacking cases and a general public awareness of increasing reliance upon a vulnerable IT infrastructure have illuminated the necessity for our critical national defense organizations to protect and safeguard their computing systems against threats both internal and external. Scope and Progress: Certification requirements are closely matched to job levels and activities as they are identified, tracked and catalogued within their respective organizations. DOD 8570 requirements extend to military personnel, contractors and civilians employed in DOD IA roles. Four broad military IA workforce categories govern the structure of DOD 8570 certification requirements. These are Information Assurance Technician (IAT), Information Assurance Manager (IAM), Information Assurance System Architect and Engineer (IASAE) and Computer Network Defense (CND). Workforce manpower certification statistics have been and continue to be mapped and monitored for completeness and overall unit training progress. Progress toward 100% certification is not publicly available, but anecdotal reports suggest that the military remains behind schedule in certifying all personnel according to the original timetables laid out in the DOD 8570 manual. Timetable: New hires into Department of Defense Information Assurance positions must be DOD 8570 certified within six months unless granted a temporary waiver. Uncertified workers must be supervised by certified personnel. All combat forces must be certified before deployment, unless granted a temporary waiver that suspends the regular certification timetable; upon return from combat deployment, the six-month requirement applies. The original 2005 DOD 8570 Manual specified a phase-in timetable that may have been more aggressive than realistic. Nevertheless, by the end of calendar year
  • 2. 2010, all workers performing Information Assurance Technical (IAT) and Information Assurance Management (IAM) functions must comply with certification requirements. Critical areas: All IT workers either in the classified SIPRNET (Secret Internet Protocol Router Network) or unclassified NIPRNET (Non-classified Internet Protocol Router Network) networks must comply with the directive. Additionally, IA workers in areas that safeguard the privacy of personnel records, such as medical or demographic data, must comply with certification requirements. Training overview: Certifications begin at the basic level, increase through tiers of responsibility, and all include a continuing education requirement that amounts to 20 – 40 hours per year, or 120 hours every three years. In addition to formal training and continuing education requirements, there are requirements for on-the-job hands-on experiential training. Certification levels span three tiers (Levels I, II and III) for both Information Assurance Technical (IAT) and Information Assurance Management (IAM) functions. Additionally, training should cover these topics as outlined in the Manual: • Laws, policies and procedures affecting the user community • The latest external threats to network security, such as scripts, hackers, crackers and foreign agents • Up-to-date internal threats such as incompetent, malicious or disgruntled authorized workers, crackers and hackers • Shared risk, risk of aggregating unclassified information, risk of remote access data transmission • Knowledge of how the latest malicious code examples such as Viruses, Trojan Horses, Worms, Logic Bombs can infiltrate a system, the damage they can cause, and how to contain and repair their damage • Denial of service attacks • Embedded hardware and software vulnerabilities • Encryption principles and applications • Restricting access through passwords and data hierarchies • Policy and procedure differences between classified and non-classified networks • Data archival policies and procedures • Operating-system specific training will be required of technical personnel Training components - IAT Level I: The COMPTIAA Plus certification and
  • 3. COMPTIA Network Plus certification form part of the first level of 8570 technical certification. Additionally, the Systems Security Certified Practitioner (SSCP) is required on the IAT side. Training components - IAT Level II: The COMPTIA Security Plus certification is one of four DOD 8570 formal education requirements for IAT Level II. Additionally, the GIAC (Global Information Assurance Certification) Security Essentials Certification (GSEC), the Security Certified Network Professional (SCNP) and SSCP certifications form the IAT Level II curriculum. Training components - IAT Level III: The Certified Information Systems Security Professional (CISSP certification) certification is part of the four core formal study requirements. The Certified Information Systems Auditor (CISA certification), GIAC Security Expert (GSE) and Security Certified Network Architect (SCNA) certifications complete the formal educational requirements for IAT Level III. Training components - IAM Level I: Certifications in GIAC Information Security Fundamentals (GISF) certification, GIAC Security Leadership Certification (GSLC), CompTIA Security+ and Certification and Accreditation Professional (CAP) constitute the four formal requirements for the IAM Level I accreditation. Training components - IAM Level II: Certifications in GIAC Security Leadership Certification (GSLC), Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) and Certification and Accreditation Professional (CAP) constitute the four formal requirements for the IAM Level II accreditation. Training components - IAM Level III: The Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) and GIAC Security Leadership Certification (GSLC) accreditations constitute the three formal requirements for the IAM Level III certification. Training components – IASAE and CND: The certification requirements for these workforce categories draw from the same body of off-the-shelf IT security courses, plus a specialized battery of certifications including Information Systems Security Engineering Professional (ISSEP), Information Systems Security Architecture Professional (ISSAP), Certified Ethical Hacker (CEH). GIAC Certified Incident Handler (GCIH), Certified Computer Security Incident Handler (CSIH), GIAC Systems and Network Auditor (GSNA) and Certified Information Systems Security Professional - Information Systems Security
  • 4. Management Professional (CISSP-ISSMP). Training providers: The aggressive deadline that the DOD has set for IAM and IAT personnel certifications will be met by ANSI-certified third party Information Assurance training providers such as Knowledge Center Inc., a proven vendor of quality classroom and online IT certification programs. Northern Virginia and Washington DC area based KCI has earned a stellar reputation in the IT training sector by successfully certifying in tens of thousands of IT professionals. Their client list covers not only all major US government agencies but also a large percentage of Fortune 500 companies spanning all major industry sectors. Training methodology: The baseline for DOD training and certification is Computer Based Training (CBT) and web-based instruction. The DAA may waive or modify training requirement as it adapts to changing environmental conditions and resource constraints. Urgency: Again, the deadline for DOD 8570 Information Assurance certification across the entire armed forces has been set as December 31, 2010. Because all personnel must be certified in their respective units by this date, schools across the country are seeing unprecedented demand for class seats. Quick certification programs are being offered to accommodate the urgency and satisfy demand, but space is limited by available resources.