Skip to main content

ACT-IAC: Where government and industry leaders collaborate.

You are here

IT Management, Security and Performance Assurance

Tuesday, April 9, 2019 - 8:30AM to
Thursday, April 11, 2019 - 4:30PM EDT
Venue Address: 
ACT-IAC
3040 Williams Drive STE 500
Fairfax , VA 22031
Tuesday, April 9, 2019 - 8:30AM to
Thursday, April 11, 2019 - 4:30PM EDT
2019-04-09 08:30:00 2019-04-11 16:30:00 America/New_York IT Management, Security and Performance Assurance See more details at: https://www.actiac.org/fpm-512-it-management-security-and-performance-assurance ACT-IAC, 3040 Williams Drive, Fairfax, VA
Venue Address: 
ACT-IAC
3040 Williams Drive STE 500
Fairfax , VA 22031

Event Details

Overview

COURSE DESCRIPTION

Prerequisites: Due to the broad scale of the competency areas, this course should be taken as a supplemental course after having received FAC‐P/PM or other equivalent certification.

FPM 512: IT Management, Security, and Performance Assurance engages students in exercises and discussions that focus on a variety of technical management and operational components that service providers are tasked to provide. Material is structured to present considerations IT project managers must include in acquiring best value operations and management of IT systems. Specific technical competencies to be addressed include: Configuration Management, Information Assurance, Information Management, Information System Security Certification, Information Systems and Network Security, Information Technology Performance Assessment, Information Technology Project Management, and Operations Support.

Exercises focused on case studies are employed to allow the students to practice the skills that they are developing throughout the course. An assessment tool is provided to assist the students in tracking and determining their achievement of attaining the new performance outcomes defined by the Federal Acquisition Institute (FAI) for FAC‐P/PM‐IT certification. Finally, students make presentations describing the actions they intend to take when they return to work to implement the lessons they learned during the class. These personalized Action Plans are graded, and help students to transfer their new knowledge to their jobs, empowering them to make immediate impacts upon returning from class.

When combined with the FPM 513 course, each of the 15 technical IT competencies developed by FAI as required for certification of project managers of Information Technology projects are addressed. These 15 technical IT competencies are in addition to 18 IT “Core‐Plus” FAC‐P/PM‐IT competencies defined by FAI and covered in FAC Academy’s FPM‐IT‐410 course. FAC‐P/PM‐IT competencies covered by this course include:

 

Configuration Management

Information Systems / Network Security

Information Assurance

Information Technology Performance Assessment

Information Management

Information Technology Program Management

Information Systems Security Certification

Operations Support

 

Method of Training: Classroom

Length of Training: 3 Days (24 hours) | 24 CLPs | 24 PMI® PDUs

FAC‐P/PM‐IT Terminal Learning Objectives Addressed By This Course                          
CONFIGURATION MANAGEMENT
  • ITCP‐2.1: Use and employ configuration items and configuration management tools in Information technology systems
  • ITCP‐2.2: Recognize the functions and tools used for configuration control and status accounting
  • ITCP‐2.3: Evaluate a proposal to modify a component of an information system
  • ITCP‐2.4: Given a scenario, demonstrate clear understanding of the roles and responsibilities of the configuration management team
INFORMATION ASSURANCE
  • ITCP‐5.1: Comprehend basic Information Assurance (IA) concepts, practices, and procedures; apply methods and procedures to protect information systems and data
  • ITCP‐5.2: Identify minimum security requirements for federal Information and Information Systems
  • ITCP‐5.3: Identify the functions, data and tenets of information systems availability, authentication, confidentiality, and integrity
  • ITCP‐5.4 Use established standards to categorize information and information systems in order to determine the appropriate level of security commensurate with risk
  • ITCP‐5.5: Identify and assess information system vulnerabilities using the risk management framework
INFORMATION MANAGEMENT
  • ITCP‐6.1 : Demonstrate foundational knowledge of information management
  • ITCP‐6.2: Examine laws and agency policies to determine requirements for collection, storage and dissemination of information
  • ITCP‐6.3: Demonstrate foundational understanding of data model concepts
  • ITCP‐6.4: Demonstrate foundational understanding of data model design
  • ITCP‐6.5: Use an IMS to create appropriate products
  • ITCP‐6.6: Identify best practices associated with effective information delivery and business intelligence

 

INFORMATION SYSTEMS SECURITY CERTIFICATION
  • ITCP‐8.1 Demonstrate understanding of security concepts and relationships as it applies to the Risk Management Framework (RMF) and SP 800‐53 A Rev. 1
  • ITCP‐8.2 Distinguish the evaluation techniques used to achieve assurance that security measures are sufficient as specified by NIST, SP 800‐53 A Rev. 1
  • ITCP‐8.3 Comprehend the methodology for assessing the Security Controls in Federal Information Systems in order to build effective security assessment plans as specified in NIST, SP 800‐53 A Rev. 1
  • ITCP‐8.4 Comprehend the Risk Management Framework (RMF) steps of developing, documenting, reporting, and improving security assessment planning and execution

 

  • ITCP‐8.5 Demonstrate understanding of security concepts and relationships as it applies to the Risk Management Framework (RMF) and SP 800‐53 A Rev. 1
  • ITCP‐8.6 Distinguish the evaluation techniques used to achieve assurance that security measures are sufficient as specified by NIST, SP 800‐53 A Rev. 1
  • ITCP‐8.7 Comprehend the methodology for assessing the Security Controls in Federal Information Systems in order to build effective security assessment plans as specified in NIST, SP 800‐53 A Rev. 1
  • ITCP‐8.8 Comprehend the Risk Management Framework (RMF) steps of developing, documenting, reporting, and improving security assessment planning and execution
INFORMATION SYSTEMS / NETWORK SECURITY
  • ITCP‐9.1 Demonstrate awareness of various background aspects of cyber security
  • ITCP‐9.2 Explain policy and procedures used by federal agencies to determine which security controls are needed to protect their information systems and organizations
  • TCP‐9.3 In a scenario, select appropriate methods and procedures to ensure confidentiality, integrity, and availability of an information system
  • ITCP‐9.4 In a scenario, demonstrate knowledge of basic principles of cyber security
  • ITCP 9.5 Identify sources of information for staying current in the field of cybersecurity
INFORMATION TECHNOLOGY PERFORMANCE ASSESSMENT
  • ITCP‐11.1 Given an information technology scenario, apply the objectives of performance assessment
  • ITCP‐11.2 Propose criteria for evaluating the effectiveness and efficiency of a newly deployed information system
  • ITCP‐11.3 Propose criteria for evaluating the effectiveness and efficiency of an operational information system
  • ITCP‐11.4 Describe how federal agencies are held accountable to the Office of Management and Budget (OMB) and the public for the performance of their IT investments
INFORMATION TECHNOLOGY PROGRAM MANAGEMENT
  • ITCP‐12.1 Apply a variety of financial methods to IT Program Management
  • ITCP‐12.2 Based on the information needs of an acquisition scenario, assess a program’s ability to achieve the objectives of an IT system acquisition
  • ITCP‐12.3 Respond to user concerns about performance and delivery of a complex information technology system
  • ITCP‐12.4 Respond to senior management concerns about cost and performance of a complex information technology system
  • ITCP‐12.5 Given current IT/Cybersecurity threats, explain how risks can be mitigated to ensure mission success
  • ITCP‐12.6 Given an IT acquisition scenario, advocate current and emerging IT acquisition strategies and best practices to ensure success
  • ITCP‐12.7 Given an IT acquisition scenario, evaluate solicitation and post award administration documentation for their ability to be executed
  • ITCP‐12.8 Given an IT acquisition scenario, critique systems engineering methodologies and processes to determine if systems development and program management decisions are executable
  • ITCP‐12.9 Given IT acquisition scenarios, evaluate the verification and validation (V&V) and the testing and evaluation (T&E) processes that ensure the system meets mission requirements
  • ITCP‐12.10 Given the current technological environment, assess recommendations for the insertion of new information technology, considering program risk, cost, and schedule to avoid system obsolescence
OPERATIONS SUPPORT
  • ITCP‐14.1 Establish governance and standards for service development and maintenance processes of the enterprise environment
  • ITCP‐14.2 Establish tools and methods for apportioning and delivering new or improved software
  • ITCP‐14.3 Assess policy needs and apply policies to govern IT activities

 

As in all FAC Academy classes, the students follow the FAC Academy’s unique ALTA™ adult learning methodology. ALTA allows students to:

Assess their current level of proficiency through the use of assessment tools

Learn from our world‐class faculty and adult learning materials

Try concepts and tools via integrated exercises, cases, and other hands‐on learning tools Apply their classroom knowledge to their actual work environment through the creation of personalized Action Plans, so that they improve their performance upon their return to work.