DoD Directive 8140 is the U.S. Department of Defense policy framework that governs how the military and defense agencies identify, develop, certify, and manage the cyberspace workforce.
DoD cyber operations demand mission alignment, rapid execution, and technical dominance. AntiSyphon provides mission focused training and certification programs that are trusted by service branches, agencies, and command so that your organization can build cyber forces, accelerate operational readiness, and map directly to DoD 8140 requirements and national defense priorities.
We can take any of the classes below and convert them to a tailored training plan for your team.

Work Role | Class |
---|---|
(121) Exploitation Analyst (541) Vulnerability Assessment Analyst (652) Security Architect | Introduction to Pentesting |
(212) Cyber Defense Forensics Analyst | Linux Forensics Enterprise Forensics and Response Practical Windows Forensics Advanced Endpoint Investigations |
(462) Control Systems Security Specialist | Enterprise Security for All |
(511) Cyber Defense Analyst | Getting Started in Packet Decoding PowerShell For InfoSec Advanced Network Threathunting |
(511) Cyber Defense Analyst (521) Cyber Defense Infrastructure Support Specialist | Foundations of Security Operations |
(511) Cyber Defense Analyst (531) Cyber Defense Incident Responder | SOC Core Skills Active Defense & Cyber Deception |
(521) Cyber Defense Infrastructure Support Specialist | SELinux Breaching the Cloud |
(521) Cyber Defense Infrastructure Support Specialist (462) Control Systems Security Specialist (612) Security Control Assessor | Introduction to Industrial Control Systems |
(521) Cyber Defense Infrastructure Support Specialist (511) Cyber Defense Analyst | Defending M365 & Azure Active Directory Security and Hardening |
(521) Cyber Defense Infrastructure Support Specialist (652) Security Architecture (628) Software/Cloud Architect | Securing the Cloud |
(531) Cyber Defense Incident Responder | Incident Response Foundations Cyber Security Incident Command Network Forensics & Incident Response |
(541) Vulnerability Assessment Analyst | HackerOps Hacking Active Directory Defending The Enterprise Red Team: Initial Access |
(541) Vulnerability Assessment Analyst (531) Cyber Defense Incident Responder | Getting Started in Security with BHIS and MITRE ATT&CK |
(611) Authorizing Official/Designated Representative | CISSP Mentorship Program |
(611) Authorizing Official/Designated Representative (612) Security Control Assessor (732) Privacy Compliance Manager | Security Compliance and Leadership |
(612) Security Control Assessor (611) Authorizing Official/Designated Representative | CIS Controls Mastery Course for MSPs |
(622) Secure Software Assessor | OWASP Top 10 Foundational Application Security Training Practical OWASP Top 10: 2021 Modern WebApp Pentesting Modern WebApp Pentesting 2 |
(631) Information Systems Security Developer | Python for the Cybersecurity Practitioner Bash scripting for Server Administration Linux Command Line for Analysts and Operators Regular Expressions, Your New Lifestyle |
(652) Security Architect | Offensive Tooling Foundations Reporting for Pentesters Offensive Tooling for Operators |
(722) Information Systems Security Manager | Security for MSPs |
(723) COMSEC Manager | Hiring Handbook: How to Build a Team |
(723) COMSEC Manager (612) Security Control Assessor | Blue Team Foundations with the Atomic Controls |