Defense training academy to offer new courses

CSC, which is developing the classes for GSA, will also implement an online training system to provide collaboration and info sharing across DOD

CSC will design, develop and teach courses for the General Service Administration in areas that include computer forensics and network intrusion under a new contract awarded by GSA.

GSA’s Federal Systems Integration and Management Center awarded the contract to provide cyber training in support of the Defense Cyber Investigations Training Academy in Linthicum, Md., company officials said today.

The task order was awarded under the GSA Millennia contract. It has a one-year base period and four one-year options that could be worth up to $85 million, the officials said.  

CSC will continue to develop and teach more than 20 courses in areas such as security, law enforcement, counterintelligence, computer forensics, incident response and network intrusion, the officials said.

CSC will also implement an online training system to provide collaboration and information sharing across the DOD. This new functionality is designed to provide students with hands-on forensic training through a Web browser.

Training at the academy aims to increase the nation's supply of forensic investigators who are needed for cyber warfare and to respond to intrusions, said Aaron Fuller, president of CSC's North American Public Sector Enforcement, Security and Intelligence Group.

The Comprehensive National Cybersecurity Initiative was developed to improve how the federal government protects sensitive information on agency networks.

Since the academy's inception in 1998, CSC has designed and taught all of the academy's courses, according to the company. The academy's mission is expanding under the President's Comprehensive National Cyber Initiative program, CSC officials said.

CSC, of Falls Church, Va., ranks No. 9 on Washington Technology’s 2009 Top 100 list of the largest federal government prime contractors.

About the Author

Doug Beizer is a staff writer for Federal Computer Week.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Your Name:(optional)
Your Email:(optional)
Your Location:(optional)
Comment:
Please type the letters/numbers you see above