recommended reading

FBI cyber posse goes back to school

oorka/Shutterstock.com

The FBI is sending its cyber squad back to school to earn special certifications, according to a contract notice stating the SANS Institute will teach the 38-course curriculum.

The new syllabus, called the Cyber Career Path Program, was prompted by “a greater need within the FBI for cyber investigators with accredited training,” stated a justification for the sole source award. “An unaccredited certification cannot provide rational assurances that all material and tests are up to the highest standard.”

For an undisclosed amount of money, SANS instructors will teach seminars that cover subjects including security essentials boot camp style, hacker techniques, exploits and incident handling, cloud security fundamentals, network penetration testing and ethical hacking, metasploit Kung Fu for enterprise pen testing, Windows memory forensics in-depth, technical communications and presentation skills for security professionals, and NetWars tournament play, an online, multilevel game where agents will test their offensive and defensive skills against each other.

SANS was the only education center supplying licenses accredited by the American National Standards Institute that expressed interest in the program during a two week application period and a similar competition held last year, FBI officials said.

In the past, the bureau found that unaccredited courses failed to challenge feds, which discouraged reading and diminished retention, officials added. And when the bureau tried delivering courses through multiple vendors, the arrangement disrupted the continuity of coursework.

“Although cyber training is a commonly offered product, only the SANS Institute is capable of providing all required courses with an ANSI accredited certification,” the justification stated.

The Pentagon, likewise in need of cutting-edge lessons, also is designing a uniform path of study, but one that likely will be offered through multiple approved institutions, Cyber Command officials said in June.

(Image via oorka/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.