NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense



Similar documents
NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Cyber Security at NSU

Bellevue University Cybersecurity Programs & Courses

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

CESG Certification of Cyber Security Training Courses

Sabbatical Leave Application

External Supplier Control Requirements

The Protection Mission a constant endeavor

A Systems Engineering Approach to Developing Cyber Security Professionals

External Supplier Control Requirements

defense through discovery

IT Networking and Security

Center of Academic Excellence Cyber Operations Program 2013 Application

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Federal Aviation Administration

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Critical Controls for Cyber Security.

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

TUSKEGEE CYBER SECURITY PATH FORWARD

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Introduction to Cyber Security / Information Security

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Enterprise Capabilities Descriptions

Looking at the SANS 20 Critical Security Controls

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

INFORMATION SECURITY TRAINING CATALOG (2015)

Cybersecurity in a Mobile IP World

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Passing PCI Compliance How to Address the Application Security Mandates

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico

Protecting Your Organisation from Targeted Cyber Intrusion

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Post-Access Cyber Defense

Assessing the Effectiveness of a Cybersecurity Program

I N T E L L I G E N C E A S S E S S M E N T

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Cyber R &D Research Roundtable

NIST Cyber Security Activities

Defending Against Data Beaches: Internal Controls for Cybersecurity

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

SANS Top 20 Critical Controls for Effective Cyber Defense

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

IT Networking and Security

Department of Management Services. Request for Information

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

DoD Strategy for Defending Networks, Systems, and Data

Computer and Information Science

Update On Smart Grid Cyber Security

IBM Security Strategy

Access FedVTE online at: fedvte.usalearning.gov

Protecting critical infrastructure from Cyber-attack

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Cybersecurity Definitions and Academic Landscape

Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy

Logging In: Auditing Cybersecurity in an Unsecure World

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

Altius IT Policy Collection Compliance and Standards Matrix

Top 20 Critical Security Controls

Cisco Advanced Services for Network Security

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

INTERNATIONAL CYBEREX 2015

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

CYBER SECURITY TRAINING SAFE AND SECURE

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Course Descriptions November 2014

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

CGI Cyber Risk Advisory and Management Services for Insurers

Information Technology Cluster

The Open Cyber Challenge Platform *

SCADA Security Training

Master of Science in Information Systems & Security Management. Courses Descriptions

IT Security Testing Services

Cybersecurity for the C-Level

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

ABB s approach concerning IS Security for Automation Systems

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Building a More Secure and Prosperous Texas through Expanded Cybersecurity

Transcription:

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial Control Systems SCADA Security Network Security Administration Network Security Engineering Secure Cloud Computing Secure Embedded Systems Secure Mobile Technology Secure Software Development Secure Telecommunications Security Incident Analysis and Response Security Policy Development and Compliance Systems Security Administration Systems Security Engineering are for use with the CAE IA/CD Knowledge Units document. 1

Cyber Investigations necessary skills and abilities for performing technical analyses of computer incidents and intrusions to determine source, infiltration path, mechanism, system modifications and effects, damages, exfiltration path, data exfiltrated, and residual effects. Basic Data Analysis None Digital Investigations Forensic Accounting Fraud Prevention and Management IA Compliance 2

Data Management Systems Security necessary skills and abilities for the secure configuration, operation and maintenance of databases and database management systems housing sensitive data. Intro to Cryptography System Administration Database Management Systems Operating Systems Concepts Cloud Computing Cybersecurity Planning and Management Data Administration Databases IA Compliance Secure Programming Practices 3

Data Security Analysis necessary skills and abilities for the analysis of data (e.g., system logs, network traffic) to identify suspected malicious activities. Basic Data Analysis Basic Scripting or Introductory Programming Database Management Systems Probability and Statistics Data Administration IA Architectures IA Compliance Intrusion Detection Security Program Management Systems Engineering Wireless Sensor Networks 4

Digital Forensics necessary skills and abilities for the analysis of computer systems (hosts, servers, network components) to determine the effects that malware has had on the system. Basic Scripting or Introductory Programming Intro to Cryptography System Administration Operating Systems Concepts Data Structures Device Forensics Digital Investigations Forensic Accounting Hardware Reverse Engineering Host Forensics Media Forensics Network Forensics Operating Systems Theory Software Reverse Engineering Vulnerability Analysis 5

Health Care Security necessary skills and abilities for the design, development, operation and maintenance of computer systems used in health care applications. Cyber Defense Intro to Cryptography System Administration Database Management Systems Network Defense Data Administration Databases IA Compliance IA Standards Security Program Management Software Security Analysis 6

Industrial Control Systems/SCADA Security necessary skills and abilities for the design, development, operation and maintenance of industrial control systems used in critical infrastructures (e.g., finance, transportation, energy). Cyber Defense System Administration Network Defense Operating Systems Concepts Cybersecurity Planning and Management Embedded Systems Hardware/Firmware Security Industrial Control Systems Intrusion Detection Operating Systems Hardening Secure Programming Practices Systems Engineering Vulnerability Analysis 7

Network Security Administration necessary skills and abilities for the secure configuration, operation and operation of an enterprise computer network (to include infrastructure devices, network services and the servers upon which they run). Basic Scripting or Introductory Programming Intro to Cryptography Network Defense Advanced Network Technology and Protocols Certification and Accreditation Intrusion Detection Network Administration Network Forensics Penetration Testing Vulnerability Analysis 8

Network Security Engineering necessary skills and abilities for the design of secure network infrastructures and security analysis of network traffic. Basic Scripting or Introductory Programming Cyber Defense Intro to Cryptography Network Defense Advanced Cryptography Advanced Network Technology and Protocols Analog Telecommunications Digital Communications Mobile Technologies Network Administration Network Forensics Penetration Testing RF Principles Systems Engineering Vulnerability Analysis 9

Secure Cloud Computing necessary skills and abilities for the design, development, operation and maintenance of secure cloud architectures. Basic Scripting or Introductory Programming Cyber Defense Intro to Cryptography System Administration Network Defense Operating Systems Concepts Advanced Cryptography Advanced Network Technology and Protocols Cloud Computing IA Compliance Network Administration Operating Systems Hardening Operating Systems Theory Virtualization Technologies Vulnerability Analysis 10

Secure Embedded Systems necessary skills and abilities for the design, development, analysis and secure use of embedded systems technologies. Basic Scripting or Introductory Programming Operating Systems Concepts Programming Data Structures Embedded Systems Hardware Reverse Engineering Hardware/Firmware Security Industrial Control Systems Low Level Programming QA / Functional Testing Secure Programming Practices Systems Programming 11

Secure Mobile Technology necessary skills and abilities for the secure design, development, utilization and management of mobile technologies, devices and services. Cyber Defense Intro to Cryptography Advanced Network Technology and Protocols Data Structures Device Forensics Digital Communications Hardware/Firmware Security IA Compliance IA Standards Mobile Technologies Network Forensics RF Principles Secure Programming Practices Systems Programming Wireless Sensor Networks 12

Secure Software Development necessary skills and abilities for the development of secure software (i.e., software that performs only it s intended functions without the presence of exploitable vulnerabilities). Basic Scripting or Introductory Programming Programming Algorithms Data Structures Formal Methods Secure Programming Practices Software Assurance Software Security Analysis Vulnerability Analysis 13

Secure Telecommunications necessary skills and abilities for the design, development and secure use of secure telecommunications systems, digital and analog. Intro to Cryptography Network Defense Advanced Network Technology and Protocols Analog Telecommunications Digital Communications Low Level Programming Mobile Technologies Network Administration Network Forensics RF Principles Systems Engineering Systems Programming 14

Security Incident Analysis and Response necessary skills and abilities for analyzing security incidents on a system or network to determine the weakness (technological or operational) that allowed the incident to occur and developing appropriate mitigations to prevent further incidents via that weakness. Basic Data Analysis Cyber Defense System Administration Network Defense Operating Systems Concepts Cybersecurity Planning and Management Digital Investigations IA Architectures IA Compliance IA Standards Operating Systems Hardening Overview of Cyber Operations Security Program Management Vulnerability Analysis 15

Security Policy Development and Compliance necessary skills and abilities for the development of organizational policies related to information assurance / cyber defense and the analysis of operational systems for compliance with applicable IA/CD-related laws and policies. Cyber Defense System Administration None Cybersecurity Planning and Management IA Architectures IA Compliance IA Standards Security Program Management 16

System Security Administration necessary skills and abilities for the secure configuration, operation and maintenance of a computer system (host or workstation). Basic Scripting or Introductory Programming Cyber Defense System Administration Network Defense Operating Systems Concepts Certification and Accreditation Host Forensics IA Architectures IA Compliance IA Standards Intrusion Detection Network Administration Operating Systems Hardening Security Program Management Systems Engineering Vulnerability Analysis 17

Systems Security Engineering necessary skills and abilities for the development of secure systems from original idea through its entire lifecycle. This includes requirements definition, allocation of security mechanisms to system components for most effective and efficient implementation to satisfy the requirements, to development, operation, maintenance, and disposition of the system. Basic Scripting or Introductory Programming Cyber Defense Operating Systems Concepts Advanced Network Technology and Protocols Cybersecurity Planning and Management Data Structures IA Architectures IA Standards Low Level Programming Operating Systems Hardening QA / Functional Testing Systems Engineering Systems Programming Virtualization Technologies 18