Cyber Security for Military Affiliates

Cyber Security for Military Affiliates

Phase2 Advantage supports the military affiliate community, and actively encourages its members to pursue careers in cyber security. Our support of this community — Active Duty, Guard, Reserve, Retired or Veteran — is genuine. Our company does not take this position because it is trendy, fashionable, or a great public relations opportunity for marketing and sales. We hold firmly to the belief that when it comes to supporting our brothers and sisters in uniform, it is an absolute obligation.

All cyber certification courses offered by Phase2 Advantage provide a high level of value for students. However, there are specific courses are particularly relevant to the Military Affiliate Community, as they support training requirements for the DOD 8570 (Baseline Certifications for Information Assurance). If you are Active Duty, Guard, Reserve, Retired or a Military Veteran from any branch of service, we invite you to explore cyber security as a career choice.  With over 300,000 job vacancies waiting to be filled by qualified applicants in the US alone, the opportunities for a great future are virtually endless.

What is DoD Directive 8140 (DoD 8570)?

DoD Directive 8140

Department of Defense Directive 8570 has been replaced by the DoD as Department of Defense Directive 8140. DoD 8570 is now a part of a larger initiative that falls under the guidelines of DoD 8140. DoD 8140 provides guidance and procedures for the training, certification, and management of all government employees who conduct Information Assurance functions in assigned duty positions. These individuals are required to carry an approved certification for their particular job classification. GIAC certifications are among those required for Technical, Management, CSSP, and IASAE classifications.

Phase2 Advantage Courses Mapping to DoD 8140 (DoD 8170)

For additional information regarding the mapping to specific GIAC courses and categories, please visit our DoD 8140 and NICE Framework pages in this website.

Certified Cyber Incident Response Manager

Certified Cyber Incident Response Manager

As organizations continue to rely on expanding infrastructure in an increasingly hostile threat landscape, the escalation of incidents involving malicious actors poses critical risks to information systems and networks. The ability to identify threats, respond to incidents, restore systems, and enhance security postures is vital to the survival of the operation.

The Certified Cyber Incident Response Manager certification course brings Incident Response core competencies to advanced levels by presenting students with 16 detailed learning objectives. Students will be provided with the knowledge and the practical skills needed to investigate and respond to network and system incidents. With a specific focus on the identification and remediation of incidents involving host and network devices, students will cover topics such as Threat Intelligence Collection, Investigative Techniques, Creating Playbooks, and Malware Triage. Practical lab exercises utilize Wireshark, a packet capturing tool used in real-world investigations.

Certified Cyber Security Operations Manager

Certified Cyber Security Operations Manager

Organizations face ongoing threats to their information technology infrastructure on a daily basis. These security struggles need to be approached with modern techniques, a holistic view of security, and a diverse body of knowledge. With the proper tools and training, managers in the Information Security and Cyber Security fields will be much more capable of finding success within their roles.

The Certified Cyber Security Operations Manager certification course brings Cyber Security core competencies to advanced levels with new concepts and traditional best practices. Using 16 detailed learning objects, students will be provided with the knowledge and context needed to successfully manage the security of their technical environments. Focusing on the Information Security concerns of today, students will cover topics such as Cloud Security, Threat Intelligence Collection and Analysis, Technology-Enabled Physical Security Systems, Incident Response, Asset Management, and Cyber Security Frameworks and the Security Stack.

Certified Darknet Intelligence Collection Manager

Certified Darknet Intelligence Collection Manager

As sensitive personal and financial data continue to be targeted in sophisticated compromises, the emergence of Darknet markets has provided malicious actors with a safe haven for conducting illegal transactions. The ability to locate stolen data, maintain anonymity, collect evidence, and identify malicious actors is crucial to Threat Intelligence programs.

The Certified Darknet Intelligence Collection Manager certification course brings Intelligence Collection core competencies to advanced levels by presenting students with 16 detailed learning objectives. Students will be provided with the knowledge and the practical skills needed to navigate and investigate the Darknet’s markets, communities, and forums. With a specific focus on intelligence collection and the use of crypto-currencies, students will cover topics such as Tor Websites and Hidden Services, Darknet Markets and Services, Digital Money and E-Wallets, and Fundamentals of Blockchain Technology. Practical lab exercises cover a variety of topics relevant to Darknet investigations.

Certified Disaster Response & Recovery Manager

Certified Disaster Response & Recovery Manager

Business Continuity and Disaster Response and Recovery is the process of preparing processes, policies, and procedures that follow in the event of a significant and unplanned operational disruption. The Certified Disaster Response and Recovery Manager training course prepares students for industry certification in Business Continuity planning and Disaster Recovery missions.

As businesses face a wide range of daily risks – including cyber-attacks, human error, technical failures, and natural disasters – it is vital they create practical plans to sustain their security posture, financial health, and industry and brand reputation to maintain long-term success. Students will cover topics such as: BCP Design and Development Strategies, Selection of Risk Management Frameworks, Qualitative and Quantitative Analysis Strategies, Creating Asset Inventories and Resource Profiles, Recovery Site Management and Workflows, Reviewing Cloud Computing Service Agreements, Cloud Data Security Strategies, and the Impact of Legal Requirements on Cloud Storage Solutions.

Certified Network Forensic Analysis Manager

Certified Network Forensic Analysis Manager

The Certified Network Forensic Analysis Manager certification course was originally developed for the U.S. government, and has now been made available to city, county, and state law enforcement agencies.  Civilian personnel outside the law enforcement community are also authorized to attend on a case-by-case basis.

This comprehensive course brings incident response and network forensic core competencies to advanced levels by presenting students with 12 detailed learning objectives. Students will be provided with both experiential knowledge and practical skills that simulate real-world scenarios, investigations, and recovery of evidentiary data in systems and networks.  With a specific focus on the centralizing and investigating of logging systems and network devices, students will cover topics such as: Incident Response Management; Live Data Collection; Analysis Methodology; Malware Triage; and, practical lab exercises utilizing the Wireshark packet capturing tool for network investigations.

Ask About Our Training Discounts

Phase2 Advantage offers discounts to non-profit organizations, federal agencies, law enforcement personnel, and the military affiliate community. We also offer group discounts. Email training@phase2advantage.com to see if your organization qualifies for one or more of our discount programs.

Phase2 Advantage Military Cyber Security Training

View the Phase2 listing on
NICCS.US-CERT.GOV