The intent of this notice is to determine the availability of qualified commercial sources technically capable of providing courses with training and GIAC vouchers similar to the below:
AUD507 Auditing Networks, Perimeters, and Systems
FOR508 Advanced Computer Forensic Analysis and Incident Response
SEC401 Security Essentials Bootcamp Style
SEC464 Hacker Guard: Security Baseline Training for IT Administrators and Operations with Continuing Education
SEC501 Advanced Security Essentials - Enterprise Defender
SEC503 Intrusion Detection In-Depth
SEC504 Hacker Techniques, Exploits & Incident Handling
SEC505 Securing Windows with the Critical Security Controls
SEC542 Web App Penetration Testing and Ethical Hacking
SEC560 Network Penetration Testing and Ethical Hacking
SEC566 Implementing and Auditing the Critical Security Controls - In-Depth
SEC561 Intense Hands-on Pen Testing Skill Development
SEC573 Python for Penetration Testers
GIAC Vouchers
NETWARS Licenses
ICS410 ICS/SCADA Security Essentials
ICS456 Essentials for NERC Critical
Infrastructure Protection
ICS515 ICS Active Defense and Incident Response
FOR408 Windows Forensic Analysis, FOR518 Mac
Forensic Analysis, FOR508 Advanced Digital Forensics and Incident Response
SEC511 Continuous Monitoring and Security Operations
FOR572 Advanced Network Forensics Analysis
SEC575 Mobile Device Security and Ethical Hacking,
FOR585 Advanced Smartphone Forensics
Controls
SEC506 Securing Linux/Unix
SEC579 Virtualization and Private Cloud Security
SEC502 Perimeter Protection In-Depth
FOR610 Reverse-Engineering Malware: Malware
Analysis Tools and Techniques
Potential offerors having the skills, experience, professional qualifications, and capabilities necessary to perform the described requirement are invited to provide a capabilities statement via e-mail. The Capability statements shall not exceed ten (10) pages and must include the following: 1) Company name and Point of Contact information (address, telephone, e-mail, web-site, etc.); 2) DUNS number and CAGE code; 3) Small Business Size/Certification (to include 8(a), HUBZone, SDVOSB, etc.); and 4) Familiarity and knowledge of the requirement.
Responses are due no later than 12:00 pm, Thursday, 11 August 2016, and shall be electronically submitted to [email protected]. All responses will be used to determine the appropriate acquisition strategy for a potential future acquisition. Response is strictly voluntary; no reimbursement will be made for any costs associated with providing information in response to this synopsis or any follow-up information requests.