Project Management Principles
This 4-hour course provides participants with a strong project management foundation that is based on information found within the Project management Institute’s (PMI) Body of
This 4-hour course provides participants with a strong project management foundation that is based on information found within the Project management Institute’s (PMI) Body of
In this 2-hour course, provides foundational knowledge on cloud security, giving you the knowledge and skills necessary to support the implementation and management of an
This 4-month program is a “3-in-1” cybersecurity course designed to give those who are new to the industry a strong foundation and provide a comprehensive
In this 2-hour course, participants will learn about the vulnerability management lifecycle that is crucial to network and system security.
In this 4-hour course, the steps associated with security assessments are reviewed, equipping participants with the knowledge to test and evaluate the implementation of information
In this 4-hour course, students will learn how to develop important security documents such as System Security Plans, Security Assessment Reports (SAR), Privacy Assessment Reports
Captiva Solutions LLC
8201 Corporate Dr Ste 635
Greater Landover, MD 20785
TF: 888.850.9280
Tel: 202.770.2120
Fax: 202.770.2121
Captiva Solutions is your trusted partner for all your IT and cybersecurity concerns. Using cutting-edge technology, adaptive systems, dedicated resources, and the highest levels of skills and expertise, we offer comprehensive IT solutions at competitive rates.
COPYRIGHT © 2023 CAPTIVA SOLUTIONS
Level 1
An organization must demonstrate basic cyber hygiene practices, such as ensuring employees change passwords regularly to protect Federal Contract Information (FCI). FCI is “information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government.”
Level 2
An organization must have an institutionalized management plan to implement good cyber hygiene practices to safeguard CUI, including all the NIST 800-171 r2 security requirements and processes
Level 3 – Expert.
An organization must have standardized and optimized processes in place and additional enhanced practices that detect and respond to changing tactics, techniques and procedures (TTPs) of advanced persistent threats (APTs).
An APT is an adversary that possesses sophisticated levels of cyber expertise and significant resources to conduct attacks from multiple vectors. Capabilities include having resources to monitor, scan, and process data forensics.