what is a acas course

by Ophelia Anderson 8 min read

The four-day, instructor-led training is open to all Department of Defense (DOD) military, civilian, and contract support personnel responsible for the implementation, management, maintenance, and supervision of ACAS - an automated, enterprise-wide vulnerability scanning software solution used to detect and assess ...Jun 27, 2017

What is ACAS training?

Acas provides training courses on employment relations and the latest good practice for employers, HR professionals, managers and employees. Our training courses are run remotely or face to face, led by workplace experts.

What does ACAS stand for?

The Assured Compliance Assessment Solution (ACAS) is a suite of COTS applications that each meet a variety of security objectives and was developed by Tenable. The new DISA program awarded Tenable the DoD contract in 2012 and the deployment of ACAS throughout the enterprise has been occurring...

What can ACAS offer you?

Free elearning modules for employers and employees on a wide range of employment issues. Stay up to date on employment topics, share best practice and network with others. Free online sessions run by Acas experts with the chance to ask questions. Our experts can work with you to find solutions to your specific workplace challenges.

What is included in the ACAS Security Center certification course?

The course will provide ACAS Security Center users with the skills and knowledge necessary to discover and report relevant security information using ACAS products. Upon completion of the class, which consists of lectures, group activities, lab exercises, and hands-on training, students must complete an end-of-course certification exam.

Find a training course

Find and book Acas training courses to attend in person or remotely using Zoom.

Conferences

Stay up to date on employment topics, share best practice and network with others.

Webinars

Free online sessions run by Acas experts with the chance to ask questions.

What components of ACAS are used to monitor load?

The two components of ACAS you’ll have to monitor for load are Nessus and PVS. Nessus is considered the active scanner while PVS is passive.

What is a security center?

Security Center (SC) is the central management console for the configuration of Nessus & PVS. SC can collect scan data from all PVS and Nessus instances to provide custom dashboard and reports. One of the neat features of SC is the ability to roll-up SC instances for reporting purposes. This allows the DoD to deploy SC at various levels with all of them reporting to one or more main SC instances. As you can imagine, this reporting capability can be very beneficial as leadership now has the ability to view policy, vulnerability compliance, and total IT assets across the enterprise. Assessing the security posture of the DoD’s infrastructure is now easier than ever.

What is ACAS security?

ACAS is just one of many security programs DoD has put in place to protect sensitive information.

What is passive vulnerability scan?

The main purpose of Passive Vulnerability Scanner (PVS) is to monitor network traffic at the packet level. While Nessus monitors device vulnerabilities, PVS monitors the network traffic traversing your network for vulnerabilities. Please note that PVS is not an IDS and does not replace one in your network. PVS provides the ability to discover new hosts added to a network, find out which ports are passing traffic across the network, identify when applications are compromised, and monitor mobile devices connected to your network.

What is an ACAS?

Written by Jeremy Galliani on May 29, 2015. The Assured Compliance Assessment Solution (ACAS) is a suite of COTS applications that each meet a variety of security objectives and was developed by Tenable.

Is Nessus a scanner?

This is one of the main advantages of Nessus over DoD’s previous scanner, Retina. In the DoD world, the compliance with STIGS is just as important as the compliance with software vulnerabilities. The library of Nessus plugins (audit files) is massive and is updated almost daily to account for the latest threat vectors.

Is PVS an IDS?

Please note that PVS is not an IDS and does not replace one in your network. PVS provides the ability to discover new hosts added to a network, find out which ports are passing traffic across the network, identify when applications are compromised, and monitor mobile devices connected to your network.

What is Tenable SC?

Tenable.sc is the centralized management solution that consolidates data obtained by Nessus products to facilitate the evaluation of overall risk. In addition to consolidating results, fully utilizing Tenable.sc’s ability to analyze data with customized dashboards and reports can provide compliance summaries to various levels of leadership.

What is ACAS 20-0020?

The ACAS solution delivers comprehensive network and application vulnerability scanning and configuration assessment. TASKORD 20-0020 mandates the use of Tenable.sc (formally SecurityCenter), Nessus Vulnerability Scanner, Nessus Agents, and Nessus Network Monitor.

What is the ACAS?

The Assured Compliance Assessment Solution (ACAS) is the mandated enterprise vulnerability scanning capability for networks and components that are owned or operated by the Department of Defense (DoD).

Does ACAS comply with DoD requirements?

Simply understanding and implementing the ACAS suite of tools does not equate to compliance with related DoD and USCYBERCOM requirements.

Is TASKORD 20-0020 compliant?

Implementing a program that is not fully compliant with TASKORD 20-0020 requirements will result in a substantial impact to your overall CCRI grade. Let us help you maximize your score.

How many ACAS exams are there?

There are two levels of certification through the CAS: Associate of the Casualty Actuarial Society (ACAS) and Fellow of the Casualty Actuarial Society (FCAS). Students at UT can make progress towards earning their ACAS, the first level of certification. There are 3 preliminary exams in the ACAS curriculum, which all count towards the ASA certification with the SOA, and 4 associate exams, for a total of 7 exams to earn an ACAS designation.

What is the exam 5?

Exam 5 – Basic Techniques for Ratemaking and Estimating Claim Liabilities

What is M 362K?

This exam covers calculus-based probability, with many problems set as word problems involving risk. M 362K typically covers 80% of the content for this exam. Multiple sections of this course are offered each fall, spring and summer. In addition to the class, students should plan on preparing an additional 150+ hours if they wish to successfully pass CAS Exam 1. Similar preparation is required for the other exams. Credit is earned by students passing the Society of Actuary Exam P.

How long is ACAS training?

The four-day, instructor-led training is open to all Department of Defense (DOD) military, civilian, and contract support personnel responsible for the implementation, management, maintenance, and supervision of ACAS - an automated, enterprise-wide vulnerability scanning software solution used to detect and assess vulnerabilities and attempts to access the DOD Information Networks in real-time.

What are the prerequisites for a security certificate?

There are no prerequisites; however , students should possess a basic knowledge of vulnerability management, compliance auditing, and information security and awareness concepts, vulnerability scanning tools, and basic networking concepts.

Where to submit 182 form?

To register, please submit complete the standard form 182 registration form on the Information Assurance Support Environment website

Who is responsible for lodging in a class?

Students who plan to attend the class are responsible for securing their own lodging.

What is ACAS in security?

A. ACAS is a network-based security compliance and assessment capability designed to provide awareness of the security posture and network health of DoD networks.

What is ACAS in the military?

C. ACAS is a system that monitors and corrects vulnerabilities to provide security for the DoD networks.

What is asset list?

Asset lists are dynamically or statically generated lists of hosts.

What is FedVTE training?

FedVTE helps train current and future government cybersecurity professionals, as well as U.S. veterans. To ensure a secure cyberspace, we must develop a technologically skilled workforce and an effective pipeline of future employees. USERS & ACCOUNTS.

Do you have to start a course to see where you left off?

Yes, course modules which have been started are denoted by a green button to the left of each module title within a course. However, if you start a module, leave it, and come back, the system does not track where you left off in the video. Fast Forward and Rewind capability is available within each course module.

Does GIAC require a copy of the FedVTE certificate?

They will require a copy of the FedVTE course completion Certificate with any new online CPE submission.

image