FAC-P/PM-IT Training: Security, Accessibility and Quality (FPM 512)

Course U212

  • Duration: 4 days
  • Labs: Yes
  • Language: English
  • 23 PMI PDUs
  • Level: Intermediate
Get This Course $2,990
  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching
#U212

This FAC-P/PM-IT FPM 212 course is right for anyone tasked with selecting, implementing and evaluating information system security controls. Mature frameworks and generally accepted practices aid in producing a strong, comprehensive security posture. This FAC-P/PM-IT course is helpful for federal agencies seeking FISMA compliance, but is beneficial anyone seeking a comprehensive Risk Management Framework.

Learning Tree’s FAC-P/PM-IT training has been fully verified by the Federal Acquisition Institute (FAI).

  • All Federal employees (non DoD) who work in a Program/Project Management role are required to be FAC-P/PM certified. Private industry/contractors are eligible to attend FAC-P/PM training, but are not eligible to become certified.
  • FAC-P/PM certification is awarded at the agency level and requirements vary by agency. Check with your Acquisition Career Manager (ACM) for information on certification requirements.

FAC-P/PM-IT Training: Security, Accessibility and Quality (FPM 512) Delivery Methods

  • Training fully verified by the Federal Acquisition Institute (FAI)
  • Train your whole team by bringing this course to your facility

FAC-P/PM-IT Training: Security, Accessibility and Quality (FPM 512) Course Benefits

  • Protect information systems by ensuring availability, authentication, confidentiality and integrity
  • Evaluate system features and requirements, and recommend changes to improve information security
  • Develop information security plans to prevent information systems vulnerabilities
  • Apply system performance measures and other methods to assess the effectiveness of IT systems
  • Assist individuals with disabilities to use computer equipment and software

FPM 212 Course Outline

  • Applying defense in depth: tools, techniques and people
  • Comprehending FISMA and OMB oversight
  • Assimilating Risk Management Framework Security Life Cycle

Multi-tiered risk management

  • Organization: Strategic risk management
  • Mission/Business: Tactical approach to risk
  • Information Systems

Defining roles and responsibilities

  • Distinguishing hierarchy and key roles of risk management
  • Defining responsibilities assigned to specific roles
  • Separating roles and areas of responsibility

Phases of risk management

  • Categorizing information systems
  • Selecting security controls
  • Implementing security controls
  • Assessing security controls
  • Authorizing information systems
  • Monitoring security controls

Introducing information assurance

  • Assuring security throughout the data life cycle
  • Integrating information assurance into software development
  • Building in “secure by design”
  • Implementing information assurance best practices
  • Ensuring component security

Penetration testing and vulnerability assessments

  • Validating security functions and configuration
  • Finding weaknesses within systems before the attacker does

Keeping current with information assurance

  • Full disclosure vs. responsible disclosure
  • Exploring vulnerability databases

Modularization (the OSI 7 Layer Model)

  • Networking principles powering the Internet
  • Modeling a packet

Confidentiality, integrity and availability across the network

  • Encrypting for confidentiality
  • Sniffing the network and protocol analysis
  • Modifying data via man-in-the-middle attacks

Networking services and security

  • Poisoning the DNS cache
  • Incorporating core services including DHCP, ICMP and ARP
  • Hardening the TCP/IP stack

Authenticating users

  • Managing factors of authentication (something you know, have, or are)
  • Attacking passwords
  • Comprehending PKI and public key authentication systems
  • Evaluating the suitability of biometrics
  • Integrating multi-factor authentication

Authenticating hosts

  • Incorporating ARP, DHCP, DNS and protocol insecurities
  • Performing and detecting MAC and IP address spoofing
  • Achieving strong host authentication
  • Analyzing Kerberos and IPSec

Encrypting and exercising integrity functions

  • Caplitalizing on asymmetric or Public Key cryptography
  • Applying symmetric cryptography
  • Exercising message digest functions for integrity

Certificates and Certification Authorities

  • Clarifying PKI and certificate fields
  • Publishing certificate revocation and certificate security

Digital signatures

  • Digitally signing for strong authentication
  • Proving authentication, integrity and non-repudiation
  • Promoting open data policies
  • Removing barriers to enhance accessibility for people
  • Enabling IT accessibility

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

Course FAQs

This course provides the knowledge and hands-on experience needed to master the concepts covered in and provides some of the necessary prerequisites for earning FAC-P/PM IT certification.

Yes! Learning Tree provides Private Team Training that can save time and travel costs by training your entire team at once, at a convenient location of your choice. We handle all the details including instructor travel, tailored content, comprehensive course materials, shipping and equipment setup and teardown.

Chat With Us