Directive 8570 Training
New Horizons can help you achieve Directive 8570 certification requirements. We provide a complete and thorough training solution to help prepare you to pass Directive 8570 certification exams.
Our Directive 8570 solutions include:
Baseline certification training for those who perform Information Assurance functions
Continuous education to maintain certifications and further develop skills
Certification training for specific operating systems
The table below shows required baseline certifications. The bold denotes certification training available from New Horizons.
Department of Defense Directive 8570.1-M Baseline Certifications
IAT Level I | IAT Level II | IAT Level III |
---|---|---|
A+ CE | GSEC | CISA |
Network+ CE | Security+ CE | CISSP (or Associate) |
SSCP | GICSP | GCIH |
CCNA Security | SSCP | CASP+ |
CCNA Security | GCED | |
CySA+ | CCNP Security | |
IAM Level I | IAM Level II | IAM Level III |
CAP | ||
CAP | GSLC | GSLC |
GSLC | CISM | CISM |
Security+ CE | CASP+ | CISSP (or Associate) |
CISSP(or Associate) | ||
IASAE I | IASAE II | IASAE III |
CISSP (or Associate) | CISSP (or Associate) | |
CASP+ | CASP+ | CISSP - ISSEP |
CSSLP | CSSLP | CISSP - ISSAP |
CSSP Analyst | CSSP Infrastructure Support |
---|---|
CEH | CEH |
CFR | CySA+ |
CySA+ | GICSP |
GCIA | SSCP |
GCIH | |
GICSP | |
SCYBER |
CSSP Incident Reporter | CSSP Auditor |
---|---|
CEH | CEH |
CFR | CySA+ |
CySA+ | CISA |
GCFA | GSNA |
GCIH | |
SCYBER |
CSSP Manager |
---|
CISM |
CISSP-ISSMP |
New Horizons 8570.1 Information Assurance Certification Training | New Horizons Operating Systems and Technical Environment Certification Training |
---|---|
A+ | |
Security+ | |
Network+ | Cisco |
CCNA Security | Microsoft |
CASP+ | Novell / Linux |
CEH | |
CISSP |
Directive 8140 Training
New Horizons has the training expertise and capability to thoroughly train Department of Defense (DoD) personnel and contractors to comply with the very specific certification requirements of Directive 8140. The new framework allows for many different classes, certifications and formalized training to now qualify an individual as "certified" in that task.
Security Provision
- Information Assurance Compliance
- Software Assurance and Security Engineering
- Systems Development
- Systems Requirements Planning
- Systems Security Architecture
- Technology Research and Development
- Test and Evaluation
Specialty areas concerned with conceptualizing, designing, and building secure IT systems, with responsibility for some aspect of the systems' development. Courses could include, CompTIA A+, Network+ and Security+, CISSP, and others.
Operate and Maintain
- Customer Service and Technical Support
- Data Administration
- Knowledge Management
- Network Services
- System Administration
- Systems Security Analysis
Specialty areas responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security. Courses could include, CISA, Cisco IIINS, Cisco SENSS, CSX Practitioner and others.
Oversight and Development
- Education and Training
- Information Systems Security Operations
- Legal Advice and Advocacy
- Security Program Managemet (CISO)
- Strategic Planning and Policy Development
Specialty areas providing leadership, management, direction, and/or development and advocacy so that all individuals and the organization may effectively conduct cybersecurity work. Courses could include, CyberSAFE, CISA, CISM, CISSP, CSX Practitioner, and others
Protect and Defend
- Computer Network Defense Analysis
- Computer Network Defense Infrastructure Support
- Incident Response
- Vulnerability Assessment and Management
Specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks. Courses could include, CyberSAFE, Cisco IIINS, Cisco SENSS, Cisco SITCS1 and others
Analyze
- All Source Intelligence
- Exploitation Analysis
- Targets
- Threat Analysis
Specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. Courses could include, CEH, CSX Specialist, CyberSec First Responder, PAN, ECSA, and others.
Collect and Operate
- Collect Operations
- Cyber Operations
- Cyber Operations Planning
Specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. Courses could include, CSX Practitioner, CSX Specialist, CISSP and others.
Investigate
- Digital Forensics
- Investigation
Specialty areas responsible for the investigation of cyber events and/or crimes of IT systems, networks, and digital evidence. Courses could include, CISA, CISM, CHFI, CSX Practitioner, and others