DOD 8570/8140 Training

Directive 8570 Training at Star V Learning Centers

Star V Learning Centers can help you achieve Directive 8570 certification requirements. We provide a complete and thorough training solution to help prepare you to pass Directive 8570 certification exams.

Our Directive 8570 solutions include:

  • Baseline certification training for those who perform Information Assurance functions
  • Continuous education to maintain certifications and further develop skills
  • Certification training for specific operating systems

The table below shows required baseline certifications. The bold denotes certification training available from Star V Learning Centers

IAT Level IIAT Level IIIAT Level III
A+CCNA SecurityCASP+
CCNA SecurityCySA+CCNP Security
CNDGICSPCISA
Network+GSECCISSP (or Associate)
SSCPSecurity+GCED
CNDGCIH
SSCPCCSP
IAM Level IIAM Level IIIAM Level III
CAPCAPCISM
CNDCASP+CISSP (or Associate)
Cloud+CISMGSLC
GSLCCISSP (or Associate)CCISO
Security+GSLC
HCISPPCCISO
HCISPP
IASAE IIASAE IIIASAE III
CASP+CASP+CISSP - ISSAP
CISSP (or Associate)CISSP (or Associate)CISSP - ISSEP
CSSLPCSSLPCCSP
CSSP AnalystCSSP Infrastructure SupportCSSP Incident ResponderCSSP AuditorCSSP Manager
CEHCEHCEHCEHCISM
CFRCySA+CFRCySA+CISSP-ISSMP
CCNA Cyber OpsGICSPCCNA Cyber OpsCISACCISO
CCNA SecuritySSCPCHFIGSNA
CySA+CHFICySA+CFR
GCIACFRGCFAPenTest+
GCIHCloud+GCIH
GICSPCNDSCYBER
Cloud+PenTest+
SCYBER
PenTest+

Directive 8140 Training at Star V Learning Centers

As the transition from Directive 8570 to Directive 8140 begins, our dedicated government team is here to guide you along the way. The DoD 8140 model is based on the National Institute of Standard and Technology (NIST) National Initiative for Cybersecurity Education (NICE) standard. This model will define categories as well as job titles more clearly.

Star V Learning Centers have the training expertise and capability to thoroughly train Department of Defense (DoD) personnel and contractors to comply with the very specific certification requirements of Directive 8140. The new framework allows for many different classes, certifications and formalized training to now qualify an individual as “certified” in that task.

Department of Defense Directive 8140
Security Provision
  • Information Assurance Compliance
  • Software Assurance and Security Engineering
  • Systems Development
  • Systems Requirements Planning
  • Systems Security Architecture
  • Technology Research and Development
  • Test and Evaluation

Specialty areas concerned with conceptualizing, designing, and building secure IT systems, with responsibility for some aspect of the systems’ development. Courses could include, CompTIA A+, Network+ and Security+, CISSP, and others.

Operate and Maintain
  • Customer Service and Technical Support
  • Data Administration
  • Knowledge Management
  • Network Services
  • System Administration
  • Systems Security Analysis

Specialty areas responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security. Courses could include, CISA, Cisco IIINS, Cisco SENSS, CSX Practitioner and others.

Oversight and Development
  • Education and Training
  • Information Systems Security Operations
  • Legal Advice and Advocacy
  • Security Program Managemet (CISO)
  • Strategic Planning and Policy Development

Specialty areas providing leadership, management, direction, and/or development and advocacy so that all individuals and the organization may effectively conduct cybersecurity work. Courses could include, CyberSAFE, CISA, CISM, CISSP, CSX Practitioner, and others

Protect and Defend
  • Computer Network Defense Analysis
  • Computer Network Defense Infrastructure Support
  • Incident Response
  • Vulnerability Assessment and Management

Specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks. Courses could include, CyberSAFE, Cisco IIINS, Cisco SENSS, Cisco SITCS1 and others

Analyze
  • All Source Intelligence
  • Exploitation Analysis
  • Targets
  • Threat Analysis

Specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. Courses could include, CEH, CSX Specialist, CyberSec First Responder, PAN, ECSA, and others.

Collect and Operate
  • Collect Operations
  • Cyber Operations
  • Cyber Operations Planning

Specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. Courses could include, CSX Practitioner, CSX Specialist, CISSP and others.

Investigate
  • Digital Forensics
  • Investigation

Specialty areas responsible for the investigation of cyber events and/or crimes of IT systems, networks, and digital evidence. Courses could include, CISA, CISM, CHFI, CSX Practitioner, and others