Introducing... FedVTE and FedCTE
|
|
|
- Alvin Stanley
- 10 years ago
- Views:
Transcription
1 Introducing... FedVTE and FedCTE Sponsored by: Cybersecurity Education and Workforce Development Program (CEWD) DHS National Cyber Security Division October, 2010
2 Agenda FedVTE and FedCTE overview & how to get involved Benjamin Scribner, DHS/NCSD/CEWD Lead: FedVTE and FedCTE Q & A Jeanne Henifin, FedCTE Project Coordinator, Department of State /Diplomatic Security Training Center Hassan Gharekhanloo, Chief or Corporate Systems, Department of State/Foreign Service Institute
3 COMING TO A PC NEAR YOU!!!! First Quarter 2011 IT Security Courseware and Hands-on Labs, via the Federal Virtual Training Environment (FedVTE) and Federal Cybersecurity Training Exercise Program (FedCTE)
4 CNCI Education Initiative Senior Steering Committee - civilian, intelligence, defense, law enforcement DHS/Department of State Cybersecurity Training Partnerships: Foreign Service Institute FedVTE Diplomatic Security Training Center - FedCTE Drivers/Objectives: Develop a framework for cybersecurity training/career development that keeps pace with technological change Focus on role-based, specialized skills of current cybersecurity personnel to expand the capabilities of today s workforce
5 Virtual Training Environment Online, on-demand, and available to 125K Federal IT Security users! Over 800 hours of role-based training More than 75 hands-on virtual labs Hosting and help desk by Department of State, Foreign Service Institute and FULLY FUNDED! Application, content, and instructor support by Carnegie Mellon University/Software Engineering Institute
6 Cybersecurity Training Exercises Interactive, experiential training for Federal cybersecurity workforce Close training gaps More frequently refresh knowledge and skills Rapidly disseminate new techniques Learn Interact Foster crossgovernmental collaboration Promote inter- Agency sharing of best practices Operational Readiness Practice Reinforce learning concepts Build skills and experience Provide a safe environment for experimentation
7 FedVTE and FedCTE Status FedVTE FY10 FY11 FedCTE FY10 FY11
8 How to Get Involved Help us establish a point of contact at your Agency 1. Select a point of contact from your office who Can authorize access to IT security training Has visibility into your agency s IT security workforce CIOs and CISOs nominate points of contact from their organization by sending the full name(s) and contact information to [email protected] 2. POCs will Authorize distribution of FedVTE accounts Distribute calling notices for upcoming FedCTE events Help shape the program in support of agency needs Keep you informed as these programs evolve NOTE: Each agency will have one primary point of contact, but can also use multiple secondary points of contact.
9 For more information on the FedVTE or the FedCTE, contact or
10 BACKUP 1
11 Operation Cyber Threat 1.0 July Received more than 100 applications for 68 seats Participants from 25 agencies and 38 cities across the US Rave reviews in survey response Experiential and interactive training Shared best practices and developed inter-agency contacts Team building
12 VTE Material and Usage Course Highlights: CompTIA Security+ Prep CompTIA Network+ Prep CompTIA A+ Prep (Summer 2010) (ISC) 2 CISSP Prep Cisco CCNA Cisco Security (Summer 2010) Certified Ethical Hacker (Summer 2010) Wireless Security Incident Handling Courses and Content Updated quarterly by SEI Lifetime Usage Statistics (to DoD) 445,874 hours of training delivered That s almost 15,000 person-weeks of training! 85,044 Labs delivered 36,880 Users
13 Federal Integration Learning Management System integration VTE includes progress and completion reports Variety of filters Export to HTML, XML, CSV (through browser UI) Registration/Helpdesk Registration through Agency POC Technical and instructor support will be included as part of the FedVTE Custom Content Short-term SEI requirement to assist with content Contact to learn more
National Initiative for Cybersecurity Education
ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)
DoD IA Training Products, Tools Integration, and Operationalization
Defense Information Systems Agency A Combat Support Agency DoD IA Training Products, Tools Integration, and Operationalization Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Valarie Burks Deputy Chief Information Officer, IT Security Division National Aeronautics and Space Administration (NASA) Agenda
2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report
2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report March 14, 2013 TABLE OF CONTENTS List of Tables... iii List of Figures... iv Executive Summary... v 1. INTRODUCTION...
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Cyber Workforce Training
Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1 DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
WCA WEBINAR SERIES: The Case for Cyber Security Training
WCA WEBINAR SERIES: The Case for Cyber Security Training PLEASE NOTE: IN ORDER TO HEAR THE AUDIO FOR THIS WEBCAST YOU WILL NEED TO USE YOUR TELEPHONE TO DIAL INTO THE FOLLOWING CONFERENCE LINE: Conference
Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Cybersecurity Workforce Training Partnership
Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
Goal. Vision. CAE 2Y Program Eligibility and Summary
Goal National Centers of Academic Excellence in Information Assurance/Cyber Defense for Two-Year Education (CAE2Y) Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA)
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
Report on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
Thomas J. Schlagel Chief Information Officer, BNL
Thomas J. Schlagel Chief Information Officer, BNL PhD in Nuclear Physics from the University of Illinois at Urbana-Champaign in 1990 Joined BNL in 1990 as a Postdoctoral Associate in the Nuclear Theory
National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work
National Cyber Security Awareness Month Week Two: Creating a Culture of Cybersecurity at Work Webinar Recording and Evaluation Survey This webinar is being recorded and will be made available online to
of Highly Effective Security Professionals By Sondra Schneider CEO Security University [email protected] 203.357.7744
6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University [email protected] 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal
TOPSECRETPROTECTION.COM (TSP)
TOPSECRETPROTECTION.COM (TSP) OVERVIEW OF CYBER SECURITY-INFORMATION SYSTEMS SECURITY PROGRAM MANAGEMENT TRAINING COURSE CYBER SECURITY-ISSPM PROFESSIONAL CERTIFICATION Introduction To TSP TSP has over
CERT/CC Overview & CSIRT Development Team Activities
CERT/CC Overview & CSIRT Development Team Activities Georgia Killcrece CSIRT Development Team CERT Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 October 2006
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
Skillsoft Support for NICE Opportunities and Challenges
Skillsoft Support for NICE Opportunities and Challenges Kevin Duffer, VP Public Sector and Mid Atlantic Nicole Ferris Steven Crawford September, 19thh 2013 1 Skillsoft Overview By the Numbers Content-Focused
FedVTE Course Library
FedVTE Course Library Advanced PCAP Analysis and Signature Dev 1 Hour... 3 Artifact Analysis 1 Hour... 3 Basic Network Traffic Analysis 5 Hours... 3 CCNA Security 34 Hours... 4 Centaur SiLK Traffic Analysis
The fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO QUALIFYING PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
CyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
INFRAGARD.ORG. Portland FBI. Unclassified 1
INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence
Fort Gordon Mobile Training Team (MTT) Requirements (FY16)
Fort Gordon Mobile Training Team (MTT) Requirements (FY16) Overview: The Office Army CIO/G6, Cyber Security Directorate and the Fort Gordon Leader College of Network Operations, DoDIN are dedicated to
THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers
THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK USER GUIDE Employers Workforce Framework User Guide Welcome to the User Guide! The Workforce Framework helps Employers to recruit from a larger pool of more
NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
Brandman University. School of CCNA
Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and
Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information
Cyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
FedVTE Course Library
FedVTE Course Library Advanced PCAP Analysis and Signature Dev 1 Hour... 3 Artifact Analysis 1 Hour... 3 Basic Network Traffic Analysis 5 Hours... 3 CCNA Security 34 Hours... 4 Centaur SiLK Traffic Analysis
Introduction to Cybersecurity Overview. October 2014
Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,
The DS Information Assurance and Cybersecurity Role-Based Training Program. Diplomatic Security Training Center (DSTC) Dunn Loring, VA
The DS Information Assurance and Cybersecurity Role-Based Training Program Diplomatic Security Training Center (DSTC) Dunn Loring, VA IAB Mission The Information Assurance Branch s (IAB s) mission is to
Data Analytics & Information Security
Data Analytics & Information Security About The Speaker Practice Director at ERM M.S. Information Networking and Security CERT Coordination Center - Carnegie Mellon University Carnegie Mellon CyLab Agenda
Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce
Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Benjamin Scribner Department of (DHS) National Cybersecurity Education & Awareness Branch (CE&A) October 2014 Mid-South
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Implementing Security Education at a Small Community College
PRACTICAL SECURITY Implementing Security Education at a Small Community College Corrinne Sande Whatcom Community College Abstract: Key words: This paper discusses modifying an existing two-year degree
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
Working with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection
SESSION ID: CXO-F02 Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection Timothy Lee CISO City of Los Angeles @tswlj316 AGENDA Introduction Why do we need Cyber Security Operations
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
IT and Cybersecurity. Workforce Development with CompTIA Certification
IT and Cybersecurity Workforce Development with CompTIA Certification CompTIA solutions meet the federal IT security workforce challenge Federal agencies and contractors face an urgent and unrelenting
Inside this issue: WHAT TO DO ABOUT EXPIRED CERTIFICATIONS IN ATCTS
1 AUGUST 2015 U N I T E D S T A T E S A R M Y A R M Y S T R O N G Inside this issue: WHAT TO DO ABOUT EXPIRED CERTIFICATIONS IN ATCTS MOBILE TRAINING TEAM CLASSES COMPTIA CONTINUING EDUCATION INFORMATION
Information Security Training & Awareness
Online Training & Project Briefing Expectations & Responsibilities Information Security Manager s Forum, March 4, 2008 Revised September 20, 2010 (1) Why is awareness important? Obligation to protect private
Cybersecurity Certificate Programs
Cybersecurity Certificate Programs Maryland Workforce Outlook Forum May 26th, 2016 Homer Minnick, Director, Cybersecurity Academy, UMBC Training Centers umbctraining.com 443-692-6600 About UMBC Training
Field of Study Area of Expertise Certification Vendor Course
Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
Goal. Vision. CAE IA/CD Program Eligibility and Summary
Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and
Building CSIRT Capabilities
Building CSIRT Capabilities CERT CSIRT Development Team CERT Training and Education Center CERT Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2005 by Carnegie Mellon
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
State of South Carolina InfoSec and Privacy Career Path Model
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
September 24, 2015. Mr. Hogan and Ms. Newton:
Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930
Cybersecurity: The Defense Perspective
Cybersecurity: The Defense Perspective Ms. Essye Miller Director, Cybersecurity Army CIO/G-6 October 15, 2015 1 CIO/G-6 As the CIO As the G-6 Reports directly to the Secretary of the Army for setting the
Certification Programs
Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 [email protected] (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Leveraging Knowledge Capital
Leveraging Capital INTRODUCTION Leveraging knowledge capital in the Federal Government is increasingly critical today because: Reductions in staffing create a need to replace informal methods for sharing
CMMI Practitioners: How Can We Improve the Skill-set?
CMMI Practitioners: How Can We Improve the Skill-set? Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Lisa Masciantonio SEI Partner Network Manager 29 April 2009 2008 Carnegie
Cisco Networking Academy. Filling critical needs Certification and standards alignment Academy courses and content
Cisco Networking Academy Filling critical needs Certification and standards alignment Academy courses and content What is networking? Gathering and presenting data Analyzing and creating conclusions Creating
Understanding the Federal IT Security Professional (FITSP) Certification
Understanding the Federal IT Security Professional (FITSP) Certification Jim Wiggins Executive Director Federal IT Security Institute ISACA NCAC Conference Certification and Emerging Standards Holiday
ExecuTrain Live Virtual Training Schedule. Sepetember December 2013
ExecuTrain Live Virtual Training Schedule Sepetember December 2013 What is a Live Virtual? Get Live Virtual, Instructor-led room Learning at your desktop or wherever your Internet connection allows you
IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules
IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification
CYBER SECURITY WORKFORCE
Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1 Table of Contents I. Introduction
The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole
The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical
State of Cyber Workforce Development
State of Cyber Workforce Development Marie Baker August 2013 WHITE PAPER CERT Division http://www.sei.cmu.edu Copyright 2013 Carnegie Mellon University Any opinions, findings and conclusions or recommendations
2015 Cybersecurity Awareness
2015 Cybersecurity Awareness CDSE Cybersecurity Thomas N. LeBaron, CISSP Cybersecurity Curriculum Manager Mr. LeBaron has been the Cybersecurity Curriculum Manager for CDSE since October 2012 Mr. LeBaron
DoD Directive (DoDD) 8570 & GIAC Certification
DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance
