TechNet Augusta 2025 (08/18/2025) |
Date |
Time 1 hour unless noted |
Continuing Education Sessions
Approvals for CompTIA CEUs, GIAC CPEs, and/or CertNexus CECs are for 1 unit per full hour of session content.
Help meet the session time requirement by asking questions.
Please check with your supervisor to confirm which sessions meet your training requirements.
|
ID# |
Acquisition Training |
CertNexus | GIAC | CompTIA |
CFR | CAIP | CEET | CDSP | A+ | CloudNetX | Data+ | DataSys+ | DataX | Network+ | Security+ | Linux+ | Cloud+ | PenTest+ | CySA+ | SecurityX |
08/18 |
08:00 AM |
Artificial Intelligence's Influence on Cybersecurity: Fighting Today's Problems with Tomorrow's Technologies |
4742 |
|
 |  | |  |  | | | | | | | | | | | | |
08/18 |
08:30 AM |
Unlocking Mission-Critical Insights: Leveraging Splunk for Data Integration, Analysis, and Predictive Intelligence |
5400 |
|
| | |  |  | | |  |  | | | | | | | | |
08/18 |
09:30 AM |
One Mission, Many Guardians: Unifying Federal, Local, Industry and Military for Homeland Security |
5181 |
|
 |  | | |  |  | | |  | |  |  |  |  | | | |
08/18 |
11:00 AM |
Zero Trust: The Key to Non-Kinetic Dominance in Multi-Domain Operations |
4600 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/18 |
01:00 PM |
AI Governance Ethical Development |
4460 |
|
 |  | |  |  |  | | |  | |  |  |  |  | | | |
08/18 |
01:00 PM |
Attacking and Defending Mission Critical ICS Assets |
5100 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/18 |
02:30 PM |
AI Co-Pilots |
4661 |
|
 |  | |  |  | | | | | | | | | | | | |
08/18 |
02:30 PM |
Building Blocks for CMMC Maturity and Opportunities to Help Protect the Defense Industrial Base (DIB) Supply Chain |
4480 |
 |
 | | | |  |  | | |  | |  |  |  |  | | | |
08/18 |
04:00 PM |
Securing Our Sentinels: Protecting Military AI Models from Data Poisoning, Evasion, and Extraction |
5062 |
|
 |  |  |  |  |  | | |  | |  |  |  |  | | | |
08/18 |
04:00 PM |
What is the Value of Infrastructure and Cybersecurity Exercise Development for All Levels of Government and What are We Really Testing? |
5183 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/19 |
09:30 AM |
Fortifying DoD Operational Technology: Securing the Cyber Battlefield Against Nation-State Threats |
4805 |
|
 | | | |  |  | | |  | |  |  | |  | | | |
08/19 |
09:30 AM |
The Electromagnetic Fight: Transformation in Contact |
5361 |
|
| | | | | | | | | | | | | | | | |
08/19 |
09:45 AM |
TIAD Information Advantage/Information Dominance in Multidomain Operations |
5140 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/19 |
10:45 AM |
Changing the Game -- The Role of Zero Trust in Modernizing OT Cybersecurity |
4594 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/19 |
10:45 AM |
The Future Force: Transforming Training Across Signal, Cyber, and EW |
5240 |
|
 | | | |  | | | | | | | | | | | | |
08/19 |
10:45 AM |
The Future of Collaborative Experimentation: A Guide to Concept-Focused Warfighting Experimentation |
5481 |
 |
 | | | |  | | | | | | | | | | | | |
08/19 |
10:45 AM |
The Use of AI-Powered Drones in Ukraine's Secret Operations |
5520 |
|
|  |  |  |  |  | | | | |  | | | | | | |
08/19 |
10:45 AM |
Utilizing Existing Enterprise Systems to Combat Fraud, Waste and Abuse |
5022 |
|
 |  |  |  |  | | | | | | | | | | | | |
08/19 |
11:00 AM |
Modernization Roadmap: Tactical Radios |
5301 |
 |
 | | | |  |  | | |  | |  |  |  |  | | | |
08/19 |
12:00 PM |
Medical Device Security Assessments |
5521 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/19 |
01:00 PM |
Modernization Roadmap: Electromagnetic Warfare |
5303 |
 |
| | | | | | | | | | | | | | | | |
08/19 |
01:15 PM |
Joint PEO Panel |
5482 |
 |
| | | | | | | | | | | | | | | | |
08/19 |
02:15 PM |
Modernization Roadmap: Networks and Services |
5304 |
 |
 | | | |  |  | | |  | |  |  |  |  | | | |
08/19 |
02:30 PM |
Cyber Resilience as a Deterrence |
5300 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/19 |
02:30 PM |
Dark Entry: How Adversaries Slip Past Army Cyber Defenses |
5320 |
|
 |  | | |  |  | | |  | |  |  |  |  | | | |
08/19 |
02:30 PM |
Growing the Next Generation of Cyber Talent |
5280 |
|
 |  | |  |  | | | | | | | | | | | | |
08/19 |
02:30 PM |
Innovation in the Network and Transport Layers Required to Support NGC2 |
5461 |
|
 |  |  |  |  |  | | | | |  | | | | | | |
08/19 |
02:30 PM |
The Role of Quality Data in Driving Reliable AI Outcomes |
4443 |
|
 |  | |  |  |  | | |  | |  |  |  |  | | | |
08/19 |
03:45 PM |
The Final Frontier in Cybersecurity: Understanding the Role and Importance of Securing Hardware Designs |
5522 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/20 |
08:00 AM |
Addressing Data Vulnerabilities: Surveillance Capitalism as an Amplifier for Information Warfare |
5565 |
|
 | | |  |  |  | | |  | |  |  |  |  | | | |
08/20 |
08:00 AM |
Forging the Future: NSA Commercial Solutions for Classified and the Quantum Cyber Warfighter |
5220 |
|
 |  | |  |  |  | | |  | |  |  |  |  | | | |
08/20 |
08:00 AM |
Zero Trust in Action: Identity Management and CMMC as Pillars of National Security |
5222 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/20 |
10:15 AM |
Empowering Innovation: Small Business Contributions to IT, Cybersecurity and AI in Defense |
5440 |
 |
 |  |  |  |  |  | | |  | |  |  |  |  | | | |
08/20 |
10:15 AM |
Equipping the Force at the Speed of Transformation |
5480 |
 |
| | | | | | | | | | | | | | | | |
08/20 |
10:15 AM |
Low Code Enabled Data Centric Operations |
5580 |
|
| | | | | | | | | | | | | | | | |
08/20 |
10:15 AM |
ROTC Panel: Risk Management -- Fundamental for Cybersecurity |
4380 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/20 |
11:30 AM |
Borderland -- An Operational Technology Experiment |
5182 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/20 |
11:30 AM |
The Finite Resource: Navigating Complexity in the Electromagnetic Spectrum |
5500 |
|
| | | |  | | | | | | | | | | | | |
08/20 |
12:45 PM |
Reprogramming for Resilience: Urgency of Rapid EW Reprogramming |
5180 |
|
|  | |  |  |  | | |  | |  |  |  |  | | | |
08/20 |
01:00 PM |
The Global State of Operational Technology and Cybersecurity |
5200 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/20 |
01:15 PM |
Implementation of DoD 8140: Deploying an Agile, Capable, and Ready Cyber Workforce |
5260 |
|
 |  |  |  |  |  | | |  | |  |  |  |  | | | |
08/20 |
02:00 PM |
The Cybersecurity Viability Trifecta: Visibility, Observability, and Properly-Trained AI |
5360 |
|
 |  |  |  |  |  | | |  | |  |  |  |  | | | |
08/20 |
02:15 PM |
Small Business Contracting with the Federal Government/DoD in 2025: Trends and Outlook |
5441 |
 |
 |  |  |  | | | | | | | | | | | | | |
08/20 |
02:30 PM |
Why Should the Defense Industrial Base (DIB) Have All the Fun? |
5305 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/20 |
02:45 PM |
Ubiquitous Sensing |
5302 |
|
 |  | | |  |  | | |  | |  |  |  |  | | | |
08/20 |
04:00 PM |
Navigating and Implementing DoD Cyber Workforce Qualifications (8140) |
5381 |
|
 |  |  |  |  | | | | | | | | | | | | |
08/21 |
09:15 AM |
Army's Implementation of Zero Trust in Weapon Systems: Challenges and Industry Engagement |
5566 |
 |
| | | |  | | | | | | | | | | | | |
08/21 |
10:30 AM |
Forging the Future Force: Empowering NCOs as the Vanguard of Next-Gen C2 & Signal Readiness |
5641 |
|
| | | | | | | | | | | | | | | | |