All Training Classes

Risk Management Framework (RMF) v2 Implementation for DoD/IC 5-Day Course
327 Solutions has deep expertise in cybersecurity, risk management, cloud, and compliance. We were one of the first vendors in the market helping transition the...read more

Federal Risk Management Framework (RMF) 2.0 Implementation and CAP Review
327 Solutions has deep expertise in cybersecurity, risk management, cloud, and compliance. We were one of the first vendors in the market helping transition the...read more

eMASS Version 5.5: Direct User Training
eMASS (Enterprise Mission Assurance Support Service) is a government-owned web-based application that supports cybersecurity program management. Our courseware will provide students with eMASS skills specific...read more

N+ – Network+ (N10-007)
Our CompTIA Network+ N10-008 courseware covers the concepts and skills needed to plan, install, maintain, and troubleshoot modern networks in a vendor-neutral format. This includes...read more

S+ – Security Plus (SYO-601)
CompTIA Security+ Certification SY0-601 provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host...read more

PenTest+ (PTO-001)
This course provides the knowledge needed to plan and perform penetration tests and other security engagements, using a vendor-neutral format. This includes planning engagements, performing...read more

CySA+ – CompTIA Cybersecurity Analyst
Welcome to CompTIA Cybersecurity Analyst+ CS0-002. This course provides the basic knowledge needed to analyze, monitor, and protect cybersecurity resources in a vendor-neutral format. It...read more

CASP+ – CompTIA Advanced Security Practitonier (CAS-003)
CompTIA Advanced Security Practitioner (CASP) CAS-003 course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This...read more

Cloud+ Certified (CVO-002)
CompTIA Cloud+ CV0-002 provides the basic knowledge and skills needed to analyze, select, monitor, and protect cloud resources in a vendor-neutral format; this includes vulnerability...read more