FAC-P/PM-IT Training: Security, Accessibility and Quality (FPM 512)

Course U212

  • Duration: 4 days
  • Labs: Yes
  • Language: English
  • 23 PMI PDUs
  • Level: Intermediate

This FAC-P/PM-IT FPM 512 course is right for anyone tasked with selecting, implementing and evaluating information system security controls. Mature frameworks and generally accepted practices aid in producing a strong, comprehensive security posture. This FAC-P/PM-IT course is helpful for federal agencies seeking FISMA compliance, but is beneficial anyone seeking a comprehensive Risk Management Framework.

Learning Tree’s FAC-P/PM-IT training has been fully verified by the Federal Acquisition Institute (FAI).

  • All Federal employees (non-DoD) who work in a Program/Project Management role are required to be FAC-P/PM certified. Private industry/contractors are eligible to attend FAC-P/PM training, but are not eligible to become certified.
  • FAC-P/PM certification is awarded at the agency level, and requirements vary by agency. Check with your Acquisition Career Manager (ACM) for information on certification requirements.

Train your whole team by bringing this course to your facility

  • In-Person

  • Online

FAC-P/PM-IT Training: Security, Accessibility and Quality (FPM 512) Course Benefits

  • Learn how to use the admin tasks and tools of the Power BI admin portal and the Office 365 admin center.
  • Automate the admin tools by using administrative APIs and PowerShell cmdlets.
  • Learn how to share Power BI assets within your organization safely.
  • Navigate the Power BI audit log to identify and resolve errors within the Power BI platform.
  • Apply your knowledge in demo learning labs.
  • Follow a curriculum based on Microsoft's Official Courseware.
  • Continue learning and face new challenges with after-course one-on-one instructor coaching.

FPM 512 Course Outline

  • Applying defense in depth: tools, techniques, and people
  • Comprehending FISMA and OMB oversight
  • Assimilating Risk Management Framework Security Life Cycle

Multi-tiered risk management

  • Organization: Strategic risk management
  • Mission/Business: Tactical approach to risk
  • Information Systems

Defining roles and responsibilities

  • Distinguishing hierarchy and critical roles of risk management
  • Defining responsibilities assigned to specific roles
  • Separating roles and areas of responsibility

Phases of risk management

  • Categorizing information systems
  • Selecting security controls
  • Implementing security controls
  • Assessing security controls
  • Authorizing information systems
  • Monitoring security controls

Introducing information assurance

  • Assuring security throughout the data life cycle
  • Integrating information assurance into software development
  • Building in “secure by design.”
  • Implementing information assurance best practices
  • Ensuring component security

Penetration testing and vulnerability assessments

  • Validating security functions and configuration
  • Finding weaknesses within systems before the attacker does

Keeping current with information assurance

  • Full disclosure vs. responsible disclosure
  • Exploring vulnerability databases

Modularization (the OSI 7 Layer Model)

  • Networking principles powering the Internet
  • Modeling a packet

Confidentiality, integrity, and availability across the network

  • Encrypting for confidentiality
  • Sniffing the network and protocol analysis
  • Modifying data via man-in-the-middle attacks

Networking services and security

  • Poisoning the DNS cache
  • Incorporating core services, including DHCP, ICMP, and ARP
  • Hardening the TCP/IP stack

Authenticating users

  • Managing factors of authentication (something you know, have, or are)
  • Attacking passwords
  • Comprehending PKI and public critical authentication systems
  • Evaluating the suitability of biometrics
  • Integrating multi-factor authentication

Authenticating hosts

  • Incorporating ARP, DHCP, DNS, and protocol insecurities
  • Performing and detecting MAC and IP address spoofing
  • Achieving strong host authentication
  • Analyzing Kerberos and IPSec

Encrypting and exercising integrity functions

  • Capitalizing on asymmetric or Public Key cryptography
  • Applying symmetric cryptography
  • Exercising message digest functions for integrity

Certificates and Certification Authorities

  • Clarifying PKI and certificate fields
  • Publishing certificate revocation and certificate security

Digital signatures

  • Digitally signing for strong authentication
  • Proving authentication, integrity, and non-repudiation
  • Promoting open data policies
  • Removing barriers to enhance accessibility for people
  • Enabling IT accessibility

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

Security, Accessibility and Quality Course FAQs

This course provides the knowledge and hands-on experience needed to master the concepts covered in and provides some of the necessary prerequisites for earning FAC-P/PM IT certification.

Yes! Learning Tree provides Private Team Training that can save time and travel costs by training your entire team at once, at a convenient location of your choice. We handle all the details including instructor travel, tailored content, comprehensive course materials, shipping and equipment setup and teardown.

Chat With Us