"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[5515],{15515:function(e,i,t){t.r(i),t.d(i,{default:function(){return f}});var r=t(67294),n=t(87379),a=n.ZP.section.withConfig({displayName:"GovernmentCapabilitiesStyles",componentId:"sc-bqs9fz-0"})(["text-align:center;padding 10rem 0;article{padding:0 6rem;}"]),o=n.ZP.div.withConfig({displayName:"GovernmentGridStyles",componentId:"sc-bqs9fz-1"})(["text-align:left;max-width:120rem;margin:0 auto;display:grid;grid-template-columns:repeat(3,1fr);grid-gap:7rem;@media only screen and (max-width:","){grid-template-columns:repeat(2,1fr);}@media only screen and (max-width:","){grid-template-columns:1fr;}"],function(e){return e.theme.desktop1200},function(e){return e.theme.tablet}),s=n.ZP.div.withConfig({displayName:"GovernmentGridItemStyles",componentId:"sc-bqs9fz-2"})([".underline{padding-bottom:1.6rem;width:100%;}:nth-child(11) .underline{@media only screen and (max-width:1308px){margin-block-start:0em;}@media only screen and (max-width:","){margin-block-start:1.33em;}@media only screen and (max-width:890px){margin-block-start:0em;}@media only screen and (","){margin-block-start:1.33em;}}ul{line-height:2.5rem;list-style:none;padding:0;}li{padding:0.5rem 0;}"],function(e){return e.theme.desktop1200},function(e){return e.theme.tablet}),c=t(17099),C=t(429),l=t(85893),S=function(e){var i=e.title,t=e.path,n=e.loggedInPath,a=(0,r.useContext)(c.V).isLoggedIn?n:t;return a?(0,l.jsx)("li",{children:(0,l.jsx)(C.Z.AnchorLink,{href:a,children:i})}):(0,l.jsx)("li",{children:i})},I=function(e){var i=e.categoryHeading,t=e.courses;return(0,l.jsxs)(s,{children:[(0,l.jsx)("h4",{className:"underline",children:i}),(0,l.jsx)("ul",{children:t.map(function(e){var i=e.title,t=e.path,r=e.loggedInPath;return(0,l.jsx)(S,{title:i,path:t,loggedInPath:r},i)})})]})},d={"CompTIA Security+":{title:"CompTIA Security+",path:"it-training/comptia/security-plus",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:5f15cdd184403b0015ac5150"},"(ISC)2 Certified Information Systems Security Professional (CISSP) (or Associate)":{title:"(ISC)2 Certified Information Systems Security Professional (CISSP) (or Associate)",path:"/it-training/cyber-security/isc-2-cissp",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:5c26ad6349417f090094f404"},"CompTIA Cloud+":{title:"CompTIA Cloud+",path:"/it-training/comptia/cloud-plus",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:6008b52788f40f0016d9b80a"},"White Hat Hacking":{title:"White Hat Hacking",path:"/it-training/cyber-security/white-hat-hacking",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:5e0a87a16be15b00159a7383"},"Cisco Certified CyberOps Associate":{title:"Cisco Certified CyberOps Associate",path:"/it-training/cisco/cyberops-associate",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:5f5bae8cf693ee0015ed0e43"},"CompTIA CySA+":{title:"CompTIA CySA+",path:"/it-training/comptia/cysa-plus",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:5eaaf102fd5d3b001512b67d"},"CompTIA A+ Core":{title:"CompTIA A+ Core",path:"/it-training/comptia/a-plus-core-1",loggedInPath:"/it-training/comptia/comptia-a-plus"},"CompTIA Network+":{title:"CompTIA Network+",path:"/it-training/comptia/network-plus",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:6165ce1b7fdc2d002dc5c75d"},"(ISC)2 Systems Security Certified Practitioner (SSCP)":{title:"(ISC)2 Systems Security Certified Practitioner (SSCP)"},"GIAC Global Security Cyber Security Professional (GICSP)":{title:"GIAC Global Security Cyber Security Professional (GICSP)"},"GIAC Security Essentials (GSEC)":{title:"GIAC Security Essentials (GSEC)",path:"/it-training/cyber-security/enterprise-security-essentials",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:621531b6b64ead002c23a313"},"CompTIA Advanced Security Practitioner (CASP)":{title:"CompTIA Advanced Security Practitioner (CASP)",path:"/it-training/comptia/casp",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:5e827bd07055a20015dbb7bb"},"ISACA Certified Information Systems Auditor (CISA)":{title:"ISACA Certified Information Systems Auditor (CISA)",path:"/it-training/cyber-security/isaca-cisa",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:5f52723f80e1f9001566c392"},"GIAC Certified Enterprise Defender (GCED)":{title:"GIAC Certified Enterprise Defender (GCED)"},"GIAC Certified Incident Handler (GCIH)":{title:"GIAC Certified Incident Handler (GCIH)",path:"/it-training/cyber-security/hacker-tools-techniques-incident-handling",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:630bf14dbb5dfa002b2707bb"},"(ISC)2 Certified Authorization Professional (CAP)":{title:"(ISC)2 Certified Authorization Professional (CAP)"},"GIAC Security Leadership (GSLC)":{title:"GIAC Security Leadership (GSLC)"},"ISACA Certified Information Security Manager (CISM)":{title:"ISACA Certified Information Security Manager (CISM)",path:"/it-training/isaca/cism",loggedInPath:"/learn/it-training/playlist/nrn:playlist:certification:6041550e36c447001570b45b"},"(ISC)2 Certified Secure Software Lifecycle Professional (CSSLP)":{title:"(ISC)2 Certified Secure Software Lifecycle Professional (CSSLP)"},"(ISC)2 Certified Information Systems Security Professional – Architecture (CISSP-ISSAP)":{title:"(ISC)2 Certified Information Systems Security Professional – Architecture (CISSP-ISSAP)"},"(ISC)2 Certified Information Systems Security Professional – Engineering (CISSP-ISSEP)":{title:"(ISC)2 Certified Information Systems Security Professional – Engineering (CISSP-ISSEP)"},"GIAC Certified Intrusion Analyst (GCIA)":{title:"GIAC Certified Intrusion Analyst (GCIA)"},"GIAC Global Industrial Cyber Security Professional (GICSP)":{title:"GIAC Global Industrial Cyber Security Professional (GICSP)"},"Logical Operations Inc. CFR":{title:"Logical Operations Inc. CFR"},"GIAC Certified Forensic Analyst (GCFA)":{title:"GIAC Certified Forensic Analyst (GCFA)"},"GIAC Systems and Network Auditor (GSNA)":{title:"GIAC Systems and Network Auditor (GSNA)"},"(ISC)2 Certified Information Systems Security Professional – Management (CISSP-ISSMP)":{title:"(ISC)2 Certified Information Systems Security Professional – Management (CISSP-ISSMP)"}},y=[{categoryHeading:"IAT Level I",courses:[d["CompTIA A+ Core"],d["CompTIA Network+"],d["(ISC)2 Systems Security Certified Practitioner (SSCP)"]]},{categoryHeading:"IAT Level II",courses:[d["GIAC Global Security Cyber Security Professional (GICSP)"],d["GIAC Security Essentials (GSEC)"],d["CompTIA CySA+"],d["CompTIA Security+"],d["(ISC)2 Systems Security Certified Practitioner (SSCP)"]]},{categoryHeading:"IAT Level III",courses:[d["CompTIA Advanced Security Practitioner (CASP)"],d["ISACA Certified Information Systems Auditor (CISA)"],d["(ISC)2 Certified Information Systems Security Professional (CISSP) (or Associate)"],d["GIAC Certified Enterprise Defender (GCED)"],d["GIAC Certified Incident Handler (GCIH)"]]},{categoryHeading:"IAM Level I",courses:[d["(ISC)2 Certified Authorization Professional (CAP)"],d["GIAC Security Leadership (GSLC)"],d["CompTIA Security+"],d["CompTIA Cloud+"]]},{categoryHeading:"IAM Level II",courses:[d["(ISC)2 Certified Authorization Professional (CAP)"],d["CompTIA Advanced Security Practitioner (CASP)"],d["ISACA Certified Information Security Manager (CISM)"],d["(ISC)2 Certified Information Systems Security Professional (CISSP) (or Associate)"],d["GIAC Security Leadership (GSLC)"]]},{categoryHeading:"IAM Level III",courses:[d["ISACA Certified Information Security Manager (CISM)"],d["(ISC)2 Certified Information Systems Security Professional (CISSP) (or Associate)"],d["GIAC Security Leadership (GSLC)"]]},{categoryHeading:"IASAE I",courses:[d["CompTIA Advanced Security Practitioner (CASP)"],d["(ISC)2 Certified Information Systems Security Professional (CISSP) (or Associate)"],d["(ISC)2 Certified Secure Software Lifecycle Professional (CSSLP)"]]},{categoryHeading:"IASAE II",courses:[d["CompTIA Advanced Security Practitioner (CASP)"],d["(ISC)2 Certified Information Systems Security Professional (CISSP) (or Associate)"],d["(ISC)2 Certified Secure Software Lifecycle Professional (CSSLP)"]]},{categoryHeading:"IASAE III",courses:[d["(ISC)2 Certified Information Systems Security Professional – Architecture (CISSP-ISSAP)"],d["(ISC)2 Certified Information Systems Security Professional – Engineering (CISSP-ISSEP)"]]},{categoryHeading:"CSSP ANALYST",courses:[d["White Hat Hacking"],d["GIAC Certified Intrusion Analyst (GCIA)"],d["GIAC Certified Incident Handler (GCIH)"],d["GIAC Global Industrial Cyber Security Professional (GICSP)"],d["Cisco Certified CyberOps Associate"],d["CompTIA CySA+"],d["Logical Operations Inc. CFR"],d["CompTIA Cloud+"]]},{categoryHeading:"CSSP INFRASTRUCTURE SUPPORT",courses:[d["White Hat Hacking"],d["GIAC Global Industrial Cyber Security Professional (GICSP)"],d["(ISC)2 Systems Security Certified Practitioner (SSCP)"],d["CompTIA CySA+"],d["Logical Operations Inc. CFR"],d["CompTIA Cloud+"]]},{categoryHeading:"CSSP INCIDENT RESPONDER",courses:[d["White Hat Hacking"],d["GIAC Certified Forensic Analyst (GCFA)"],d["GIAC Certified Incident Handler (GCIH)"],d["Cisco Certified CyberOps Associate"],d["CompTIA CySA+"],d["Logical Operations Inc. CFR"]]},{categoryHeading:"CSSP AUDITOR",courses:[d["White Hat Hacking"],d["ISACA Certified Information Systems Auditor (CISA)"],d["GIAC Systems and Network Auditor (GSNA)"],d["CompTIA CySA+"],d["Logical Operations Inc. CFR"]]},{categoryHeading:"CSSP MANAGER",courses:[d["ISACA Certified Information Security Manager (CISM)"],d["(ISC)2 Certified Information Systems Security Professional – Management (CISSP-ISSMP)"]]}],f=function(){return(0,l.jsx)(a,{children:(0,l.jsx)("article",{children:(0,l.jsx)(o,{children:y.map(function(e){var i=e.categoryHeading,t=e.courses;return(0,l.jsx)(I,{categoryHeading:i,courses:t},i)})})})})}}}]);