TechNet Augusta 2025 (08/18/2025) |
Date |
Time 1 hour unless noted |
Continuing Education Sessions
Approvals for CompTIA CEUs, GIAC CPEs, and/or CertNexus CECs are for 1 unit per full hour of session content.
Help meet the session time requirement by asking questions.
Please check with your supervisor to confirm which sessions meet your training requirements.
|
ID# |
Acquisition Training |
CertNexus | GIAC | CompTIA |
CFR | CAIP | CEET | CDSP | A+ | CloudNetX | Data+ | DataSys+ | DataX | Network+ | Security+ | Linux+ | Cloud+ | PenTest+ | CySA+ | SecurityX |
08/18 |
08:00 AM |
Artificial Intelligence's Influence on Cybersecurity: Fighting Today's Problems with Tomorrow's Technologies |
4742 |
|
 |  | |  |  | | | | | | | | | | | | |
08/18 |
09:30 AM |
One Mission, Many Guardians: Unifying Federal, Local, Industry and Military for Homeland Security |
5181 |
|
 |  | | |  | | | | | | | | | | | | |
08/18 |
11:00 AM |
Zero Trust: The Key to Non-Kinetic Dominance in Multi-Domain Operations |
4600 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/18 |
01:00 PM |
AI Governance Ethical Development |
4460 |
|
 |  | |  |  |  | | |  | |  |  |  |  | | | |
08/18 |
01:00 PM |
Attacking and Defending Mission Critical ICS Assets |
5100 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/18 |
02:30 PM |
AI Co-Pilots |
4661 |
|
 |  | |  |  | | | | | | | | | | | | |
08/18 |
02:30 PM |
Building Blocks for CMMC Maturity and Opportunities to Help Protect the Defense Industrial Base (DIB) Supply Chain |
4480 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/18 |
04:00 PM |
Securing Our Sentinels: Protecting Military AI Models from Data Poisoning, Evasion, and Extraction |
5062 |
|
 |  |  |  |  |  | | |  | |  |  |  |  | | | |
08/18 |
04:00 PM |
What is the Value of Infrastructure and Cybersecurity Exercise Development for All Levels of Government and What are We Really Testing? |
5183 |
|
 | | | |  | | | | | | | | | | | | |
08/19 |
09:45 AM |
TIAD Information Advantage/Information Dimension in Multidomain Operations |
5140 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/19 |
10:00 AM |
Fortifying DoD Operational Technology: Securing the Cyber Battlefield Against Nation-State Threats |
4805 |
|
 | | | |  |  | | |  | |  |  | |  | | | |
08/19 |
10:45 AM |
Changing the Game -- The Role of Zero Trust in Modernizing OT Cybersecurity |
4594 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/19 |
10:45 AM |
The Future Force: Transforming Training Across Signal, Cyber, and EW |
5240 |
|
 | | | |  | | | | | | | | | | | | |
08/19 |
10:45 AM |
Utilizing Existing Enterprise Systems to Combat Fraud, Waste and Abuse |
5022 |
|
 |  |  |  |  | | | | | | | | | | | | |
08/19 |
02:30 PM |
The Role of Quality Data in Driving Reliable AI Outcomes |
4443 |
|
 |  | |  |  |  | | |  | |  |  |  |  | | | |
08/19 |
05:00 PM |
Zero Trust in Action: Identity Management and CMMC as Pillars of National Security |
5222 |
|
 | | | |  | | | | | | | | | | | | |
08/20 |
08:00 AM |
Forging the Future: NSA Commercial Solutions for Classified and the Quantum Cyber Warfighter |
5220 |
|
 |  | |  |  | | | | | | | | | | | | |
08/20 |
10:15 AM |
ROTC Panel: Risk Management -- Fundamental for Cybersecurity |
4380 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
08/20 |
11:30 AM |
Borderland -- An Operational Technology Experiment |
5182 |
|
 | | | |  | | | | | | | | | | | | |
08/20 |
01:00 PM |
Reprogramming for Resilience: Urgency of Rapid EW Reprogramming |
5180 |
|
|  | |  |  |  | | |  | |  |  |  |  | | | |
08/20 |
01:00 PM |
The Global State of Operational Technology and Cybersecurity |
5200 |
|
 | | | |  | | | | | | | | | | | | |
08/20 |
02:30 PM |
The Tyranny of Distance: Non-Kinetic Operations in the Indo-Pacific |
5101 |
|
| | | | | | | | | | | | | | | | |