All Training Classes
Risk Management Framework (RMF) v2 Implementation for DoD/IC 5-Day Course
327 Solutions has deep expertise in cybersecurity, risk management, cloud, and compliance. We were one of the first vendors in the market helping transition the...read more
Federal Risk Management Framework (RMF) 2.0 Implementation and CAP Review
327 Solutions has deep expertise in cybersecurity, risk management, cloud, and compliance. We were one of the first vendors in the market helping transition the...read more
eMASS Version 5.5: Direct User Training
eMASS (Enterprise Mission Assurance Support Service) is a government-owned web-based application that supports cybersecurity program management. Our courseware will provide students with eMASS skills specific...read more
N+ – Network+ (N10-007)
Our CompTIA Network+ N10-008 courseware covers the concepts and skills needed to plan, install, maintain, and troubleshoot modern networks in a vendor-neutral format. This includes...read more
S+ – Security Plus (SYO-601)
CompTIA Security+ Certification SY0-601 provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host...read more
PenTest+ (PTO-001)
This course provides the knowledge needed to plan and perform penetration tests and other security engagements, using a vendor-neutral format. This includes planning engagements, performing...read more
CySA+ – CompTIA Cybersecurity Analyst
Welcome to CompTIA Cybersecurity Analyst+ CS0-002. This course provides the basic knowledge needed to analyze, monitor, and protect cybersecurity resources in a vendor-neutral format. It...read more
CASP+ – CompTIA Advanced Security Practitonier (CAS-003)
CompTIA Advanced Security Practitioner (CASP) CAS-003 course provides the knowledge needed to implement security solutions within an enterprise policy framework, using a vendor-neutral format. This...read more
Cloud+ Certified (CVO-002)
CompTIA Cloud+ CV0-002 provides the basic knowledge and skills needed to analyze, select, monitor, and protect cloud resources in a vendor-neutral format; this includes vulnerability...read more