The Risk Management Framework for Federal Security Controls Assessors (RMF for Federal SCA) 4-Day Course concentrates on how to validate NIST SP 800-53 Rev 4 Security Controls and meet the requirements for the Assessment and Authorization of the IT system. This course features an in-depth explanation of each security control, including testing methodology, control validation, and evidence collection techniques. This course teaches the independent tester or validator how to test the process for any of the Federal IA controls, using manual and automated tests, to ensure all controls are tested properly. The security controls assessors course covers NIST SP 800-53A Rev. 4, NIST SP 800-115, NIST SP 800-37, NIST SP 800-39 and the development of the Security Assessment Report (SAR), and Plan of Action and Milestones (POA&M).
DISCLAIMER: This course is geared for students who already have an understanding of the RMF for Federal Systems process. Lunarline SCS recommends the 3-day In-Depth or 4-day Intensity course be taken as a prerequisite as this course focuses on the security controls and how they are to be assessed. This course does not focus on the RMF process at an in-depth level.
When: Tuesday April 16, 2019 to Friday April 19, 2019
Time: 8:30a to 4:00p EST
Where: Online via Adobe Connect
Cost: Free for W2CW students and candidates**
**You must apply to the W2CW program prior to registering for this class.
*Active Duty Military are those on retirement orders, transitioning out of the military within 6 months or being medically transitioned.
W2CW™ features the Lunarline SCS Launchpad which is their Workforce Development and Learning Management System, Courseware, and Hands-On Cyber Range to bring real world training to all candidates.
Students have access to the programs online community that provides mentoring, peer support, and additional resources to address the body, mind, spirit, and family.
We incorporate a diverse instructional method including distribution via mobile technology, virtual environments, and gaming.
To apply to the W2CW™ program you must be a Veteran or Active Duty Military*. (*Active Duty Military are those on retirement orders, those transitioning out of the military within 6 months or being medically transitioned.)
Please complete the Application Form with your resume and service verification letter.
You can email firstname.lastname@example.org with any questions.
The program is ran 100% by volunteers so responses may not be immediate. We ask for your patience.
Thank you for your interest in the W2CW program!
Lunarline is fully committed to supporting our returning Veterans and Wounded Warriors. Our mission is to bridge the gap for our returning veterans and wounded warriors between military service and a career as a cyber-warrior. We will transition their skills from one battlefield to another and provide a foundation for continued service to country and support to themselves and their families with dignity and integrity.
Lunarline is a leading provider of cybersecurity solutions and certified security training to all US Federal Government (Civilian, DoD, and IC), as well as to customers in selected commercial markets. As a Service-Disabled Veteran-Owned Small Business (SDVOSB), its executives and employees have had first-hand experience in transitioning from warriors to cyber warriors. The not-for-profit W2CW™ program is a division of Lunarline’s School of Cybersecurity (SCS). All of the programs instructors and mentors have extensive cybersecurity experience and many are veterans.
As Service-Disabled Veterans, we here at Lunarline are fully committed to this project, having gone through this particular transition ourselves. We know personally how important it is to use the very same values instilled in us through our experience with the Armed Services in our careers after returning home. Those values of honor, integrity, commitment, teamwork, and excellence are all used every day working in cybersecurity.
– Waylon Krush, Co-Founder, President, and CEO of Lunarline, Inc.
Training is of no cost to qualified veterans.
Basic IT skills and cyber security experience are not needed for this training program course, but general computer skills are needed to access and complete the training. Minimum requirements include: use of computer technology; basic familiarity with computer hardware, software and operating systems. Optional: specific IT training; IT certifications, such as A+; direct experience with computer technology at the system level; computer security experience.
Once available, simply fill out the application form on the Admissions page and send it to email@example.com.
W2CW™ staff selects students for the program based on their application date, computer skills, keen interest in information security, military experience and geographic proximity to interested employers.
A Warrior is a Veteran of military service.
Warrior to Cyber Warrior™ is a unique training/ career placement program because it matches each student with a prospective information security employer when training begins. The prospective employer signs a W2CW™ Letter of Commitment, which is basically a Memo of Understanding agreeing to hire the W2CW™ student as an intern with the promise of a job upon graduation if the internship is mutually satisfactory.
W2CW™ staff reach out to corporations and agencies at the local, state and federal level to ascertain their Information Security needs. In many cases, prospective employers have a need for additional personnel in this area. W2CW™ staff then work with the Chief of Information Security/Cyber Security, HR and Veterans hiring within the entity to secure a written Letter of Commitment to hire a warrior student.
Information flows two ways. An information packet (for example, Hiring America’s Best produced by Give an Hour and National Organization on Disability) about employing Wounded Warriors and Veteran is given to each prospective employers. In return, employers fill out a questionnaire about their competencies as potential employers.
W2CW™ would like to give special recognition and thanks to the following organizations for their support.