TechNet Cyber 2025 (05/06/2025) |
Date |
Time 1 hour unless noted |
Continuing Education Sessions
Approvals for CompTIA CEUs, GIAC CPEs, and/or CertNexus CECs are for 1 unit per full hour of session content.
Help meet the session time requirement by asking questions.
Please check with your supervisor to confirm which sessions meet your training requirements.
|
ID# |
Acquisition Training |
CertNexus | GIAC | CompTIA |
CFR | CAIP | CEET | CDSP | A+ | CloudNetX | Data+ | DataSys+ | DataX | Network+ | Security+ | Linux+ | Cloud+ | PenTest+ | CySA+ | SecurityX |
05/06 |
08:15 AM |
Beyond Metrics - Applying Analytics for User Experience and Decisive Advantage |
4581 |
|
 | | |  |  | | | | | | | | | | | | |
05/06 |
08:15 AM |
DoD CIO Defense Industrial Base Cybersecurity |
4880 |
|
 | | | |  |  | | |  | |  |  | |  | | | |
05/06 |
08:15 AM |
Navigating Exponential Change: Transforming Technology Organizations for the Future |
4781 |
|
 |  | |  |  | | | | | | | | | | | | |
05/06 |
08:15 AM |
Smart Hybrid Cloud Journey |
4580 |
|
| | | |  | | | | | | | | | | | | |
05/06 |
10:45 AM |
DoD Zero Trust Success Stories |
4840 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
05/06 |
11:00 AM |
Adversary Threat Intelligence Drive Cyber Operations: The Critical Role of Operationalizing Threat Intelligence and Active Hunting in Defending Against Nation-State Adversaries |
4620 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
05/06 |
11:00 AM |
DISA's Large Business Prime Contracts: How They Select Small Business Subcontractors |
4582 |
 |
| | | |  | | | | | | | | | | | | |
05/06 |
11:00 AM |
How to Succeed From Both Sides of the Table: Accelerating Commercial Adoption of Technology through the CSO |
4720 |
 |
 | | | |  | | | | | | | | | | | | |
05/06 |
02:30 PM |
Keeping Pace with the Adversary and the Warfighter: Data-Centric Operations |
4521 |
|
 |  |  |  |  |  | | |  | |  |  |  |  | | | |
05/06 |
02:45 PM |
DoD CIO Cybersecurity Maturity Model Certification (CMMC) Update |
4621 |
 |
 | | | |  | | | | | | | | | | | | |
05/06 |
04:00 PM |
Combined Joint All-Domain Command and Control Interoperability Challenges |
4583 |
|
| | | |  |  | | | | |  | | | | | | |
05/06 |
04:00 PM |
Cyber Threats to Critical Infrastructure and the Impact to Military Readiness and Power Projection |
4861 |
|
 | | | |  |  | | |  | |  |  | |  | | | |
05/06 |
04:00 PM |
DoD Cyber Workforce Update |
4800 |
|
 |  |  |  |  | | | | | | | | | | | | |
05/06 |
04:00 PM |
Joint Operational Edge from Strategy to Reality |
4741 |
|
| | |  |  | | | | | | | | | | | | |
05/06 |
04:00 PM |
Navigating and Implementing DoD Cyber Workforce Qualifications (8140) |
4900 |
|
 |  |  |  |  |  | | |  | |  |  | |  | | | |
05/06 |
04:00 PM |
Securing the Foundation: The Role of Quality Data in Driving Reliable AI Outcomes |
4722 |
|
|  | |  |  |  | | |  | |  |  |  |  | | | |
05/07 |
08:15 AM |
Continuous Modernization Conquering DoD Tech Debt and Leaving Legacy Services Behind Through Industry Partnerships |
4760 |
 |
 |  |  |  | | | | | | | | | | | | | |
05/07 |
08:15 AM |
DoD CIO Software Modernization State of DevSecOps Report |
4801 |
|
| | | |  | | | | | | | | | | | | |
05/07 |
08:15 AM |
Evolving the Data, Analytics, and Automation Environment for Defensive Cyber Operations |
4585 |
|
 | | |  |  | | | | | | | | | | | | |
05/07 |
08:15 AM |
Preparing for Quantum Threats: Securing our Nation's Defense Through Post-Quantum Cryptography |
4500 |
|
| | | |  |  | | |  | |  |  |  |  | | | |
05/07 |
08:15 AM |
Target Acquired: Securing Critical Infrastructure in the Age of Data-Driven Warfare |
4744 |
|
| | |  |  |  | | |  | |  |  |  |  | | | |
05/07 |
10:45 AM |
DODNet - Enabling Zero Trust for the Common Use Network |
4584 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
05/07 |
10:45 AM |
DoD CIO Cloud FinOps Strategy |
4803 |
 |
| | | |  | | | | | | | | | | | | |
05/07 |
10:45 AM |
Secure by Design: Maximizing Business Value and Cyber Resilience |
4780 |
|
 |  | |  |  | | | | | | | | | | | | |
05/07 |
01:30 PM |
Analyzing Today's Attack Surface: How AI and Post-Quantum Cryptography (PQC) Are Changing Workflows in Hybrid Environments |
4680 |
|
 |  | | |  |  | | |  | |  |  |  |  | | | |
05/07 |
02:30 PM |
Cyber Readiness 2025 and Beyond: Innovating, Integrating, and Empowering the Warfighter |
4660 |
|
 | | | |  | | | | | | | | | | | | |
05/07 |
02:45 PM |
Building Blocks for CMMC Maturity and Opportunities to Help Protect the USA Supply Chain |
4640 |
|
 | | | |  | | | | | | | | | | | | |
05/07 |
02:45 PM |
DoD CIO Software Modernization FY25-26 Implementation Plan |
4802 |
|
| | | |  | | | | | | | | | | | | |
05/07 |
02:45 PM |
Senior Enlisted Perspective: Voice of the Warfighter |
4587 |
|
| | | |  | | | | | | | | | | | | |
05/07 |
04:00 PM |
High-Performance Computing |
4740 |
 |
|  | |  |  |  | | | | | | | |  | | | |
05/07 |
04:00 PM |
Integrated Defense in a Dynamic Cyber Environment |
4589 |
|
 | | | |  |  | | |  | |  |  |  |  | | | |
05/07 |
04:00 PM |
Secure by Design Next Steps |
4721 |
 |
 | | | |  | | | | | | | | | | | | |
05/08 |
08:15 AM |
DISA DevSecOps |
4590 |
 |
 | | | |  |  | | |  | |  |  |  |  | | | |
05/08 |
08:15 AM |
ICAM - Focus on Adoption |
4591 |
|
| | | |  |  | | |  | |  |  |  |  | | | |
05/08 |
08:15 AM |
What is the Value of Infrastructure and Cybersecurity Exercise Development for All Levels of Government? |
4961 |
|
 | | | |  |  | | |  | |  |  | |  | | | |
05/08 |
10:45 AM |
Distributed Hybrid Multi Cloud |
4592 |
|
| | | |  | | | | | | | | | | | | |
05/08 |
10:45 AM |
DoD CIO Enterprise Software Initiatives (ESI) |
4522 |
|
 | | | | | | | | | | | | | | | | |
05/08 |
10:45 AM |
Modernization of DOD Endpoint Security Strategy and Evolution of Continuous Monitoring and Risk Scoring |
4593 |
|
| | | |  |  | | |  | |  |  |  |  | | | |
05/08 |
10:45 AM |
Securing the Warfighter's Advantage: Cryptographic Resilience in a High-Threat Environment |
4804 |
|
 |  |  |  |  |  | | |  | |  |  |  |  | | | |
05/17 |
04:00 PM |
TEST 16May |
5040 |
|
| | | | | | | | | | | | | | | | |