Location: Waypoints
-
NAVSEA Cyber IT/CSWF: Qualifications and Training
—
by
This course was developed primarily for Human Resources – Workforce Development personnel. This training may also benefit contracts personnel including, but not limited to Contracting Officer’s Representatives (COR); Technical Advisors and Technical Points of Contact (TPOC); and Task Order Managers (TOM); Supervisors of Cyber IT/Cybersecurity Workforce employees; and Cyber IT/Cybersecurity Workforce Program Managers. Training topics…
-
Cyberspace Information Technology/Cybersecurity Workforce: Staffing and Classification
—
by
This course was developed primarily for Staffing and Classification personnel and Employee and Labor Relations personnel. This training may also benefit Supervisors of Cyber IT/CSWF employees; Cyber IT/CSWF employees; and Cyber IT/CSWF Program Managers. This course discusses hiring Cyber IT/CSWF employees, qualifications, continuing education requirements, bargaining unit employees, and workforce challenges.
-
Defense Industrial Base Cyber Fundamentals
—
by
This training is designed to give you the essential information you need to know with regard to the cybersecurity protections on your defense industrial base contractor partners’ corporate networks. This training is specifically designed for busy program managers to give you the bare essentials you need to understand the requirements and to navigate appropriately.
-
DON Transition to Cyberspace Information Technology/Cybersecurity Workforce
—
by
This course was developed primarily for Human Resources (Staffing & Classification and Employee & Labor Relations) personnel; Workforce Development personnel; and Contracting personnel. This training will also benefit Cyber IT/CSWF Program Managers; Information Systems Security Managers; Supervisors of Cyber IT/CSWF employees; and other Command Management positions. This course provides a brief background of the Information…
-
Model Based Systems Engineering (MBSE) Principles and Concepts
—
by
The MBSE Principles and Concepts training is intended to give trainees a deeper understanding of basic Model Based Systems Engineering (MBSE) principles and concepts. The training will cover the nine types of diagrams used in MBSE, elements commonly found on each diagram, structural and behavioral features of blocks, how to effectively convey relationships between model elements, model hierarchy, and basic…
-
Model Based Systems Engineering: An Executive Introduction
—
by
This training is intended to give trainees an overview of basic MBSE principles and concepts. The training will cover the differences between MBSE and Document Based Systems Engineering, the advantages of using MBSE, what is required to perform MBSE effectively (tools, language, methods), the difference between a System Model and a System Diagram, and relationships…
-
NAVSEA NATO Security Briefing
—
by
At the end of this course, you should have a basic understanding of NATO information security procedures and access requirements. You should be able to identify personnel and facility security requirements, when access to NATO information is required. And lastly, you should have an understanding of NATO visits and foreign disclosure implications when making disclosure…
-
NAVSEA Continuity of Operations (COOP) Overview CLP’s
—
by
This training is required for individuals who perform COOP activities. At the end of this course, you should be able to define Continuity of Operations – its purpose and objectives; define the key elements and pillars in the Continuity Program Management Cycle; identify the four phases of the Continuity Implementation Process; and define the elements…
-
NAVSEA Cybersecurity 101
—
by
You are currently an integral part of NAVSEA’s Defense-in-Depth strategy. By enhancing your understanding of Cybersecurity – starting with a review of the foundational concepts of computers – you will be a more capable defender of your own personal information and keep Government data and systems secure.
-
NAVSEA Cybersecurity 201
—
by
Cybersecurity 201 will provide you with a technical foundation aimed to help as you move on to more specific training and experience to achieve the Commander’s three goals. When you are in a design review, for example, and a discussion on Cybersecurity refers to using a “hash” as a security tool, will you understand what…