Cybrary for Teams

Align Your Training To The NICE Cybersecurity Workforce Framework

Build, customize and implement training plans across your team aligned to the NIST Cyber Security Workforce Framework. Cybrary for Teams offers pre-built training paths that enable your team to develop the skills to accelerate organizational security.

Screen Shot 2020-09-10 at 11.44.40 AMCybrary Logo 2019-BlackCybraryScreen Shot 2020-09-10 at 11.44.30 AM

The National Initiative for Cybersecurity Education (NICE), sponsored by the National Institute of Standards and Technology (NIST), is a collaboration between the U.S. government, academia, and the private sector focused on cybersecurity education, training, and workforce development. With NICE aligned training through Cybrary for Teams, cybersecurity professionals can verify their training adheres to the guidelines and standards tgat classify cyber workers by cyber work roles and the knowledge areas, skills, abilities, and tasks associated with each role.

Interview Mocha Teaser Screenshot

Cybrary’s certification training courses including A+, Network+, CCNA, Security+, CySA+, CASP, CEH, and CISSP are updated regularly with additional labs and practice assessments to focus on key cyber work roles and best practices, and are all aligned to the knowledge, skills, and abilities in the NICE Workforce Framework. All of Cybrary’s content is mapped to the NICE Categories (7), Specialty Areas (33), and Work Roles (52).

Dashboard - business page

Explore how Cybrary training aligns to the NICE Cybersecurity Workforce Framework

Investigate

Fields that specialize detecting and analyzing cyber events and/or crimes in IT systems, networks, and digital evidence.

SPECIALTY AREAS

Cyber Investigation (INV)

Applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interview and interrogation techniques, surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of prosecution versus intelligence gathering.

Work roles:


Digital Forensics (FOR)

Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations.

Work roles:

Oversee & Govern

Fields that allow the leadership, management, or development and advocacy in order to provide the efficiency needed in their cybersecurity work.

SPECIALTY AREAS

Legal Advice and Advocacy (LGA)

Provides legally sound advice and recommendations to leadership and staff on a variety of relevant topics within the pertinent subject domain. Advocates legal and policy changes, and makes a case on behalf of client via a wide range of written and oral work products, including legal briefs and proceedings.

Work roles:


Training, Education, and Awareness (TEA)

Conducts training of personnel within pertinent subject domain. Develops, plans, coordinates, delivers and/or evaluates training courses, methods, and techniques as appropriate.

Work roles:

  • Cyber Instructional Curriculum Developer
  • Cyber Instructor

Cybersecurity Management (MGT)

Oversees the cybersecurity program of an information system or network, including man- aging information security implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, requirements, policy enforcement, emergency planning, security awareness, and other resources.

Work roles:


Strategic Planning and Policy (SPP)

Develops policies and plans and/or advocates for changes in policy that support organizational cyberspace initiatives or required changes/enhancements.

Work roles:


Executive Cyber Leadership (EXL)

Supervises, manages, and/or leads work and workers performing cyber and cyber-related and/or cyber operations work.

Work roles:


Program/Project Management (PMA) and Acquisition

Applies knowledge of data, information, processes, organizational interactions, skills, and analytical expertise, as well as systems, networks, and information exchange capabilities to manage acquisitionprograms. Executes duties governing hardware, software, and information system acquisition programs and other program management policies. Provides direct support for acquisitions that use information technology (IT) (including National Security Systems), applying IT-related laws and policies, and provides IT-related guidance throughout the total acquisition life cycle.

Work roles:

Protect & Defend

Fields that specialize in threats to internal IT systems or networks which includes the identification, analysis, and mitigation.

SPECIALTY AREAS

Cybersecurity Defense Analysis (CDA) Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.

Work roles:


Cybersecurity Defense Infrastructure Support (INF) Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.

Work roles:


Incident Response (CIR) Responds to crises or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities.

Work roles:


Vulnerability Assessment and Management (VAM) Conducts assessments of threats and vulnerabilities; determines deviations from acceptable configurations, enterprise or local policy; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational situations.

Work roles:

Operate & Maintain

Fields that provide the necessary support, administration, and maintenance in order to enhance the effectiveness and efficiency of the performance and security within the IT system.

SPECIALTY AREAS

Data Administration (DTA) Develops and administers databases and/or data management systems that allow for the storage, query, protection, and utilization of data

Work roles:

  • Database Administrator
  • Data Analyst

Knowledge Management (KMG) Manages and administers processes and tools that enable the organization to identify, document, and access intellectual capital and information content.

Work roles:


Customer Service and Technical Support (STS) Addresses problems; installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support). Typically provides initial incident information to the Incident Response (IR) Specialty.

Work roles:

  • Technical Support Specialist

Network Services (NET) Installs, configures, tests, operates, maintains, and manages networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, and protective distributor systems) and software that permit the sharing and transmission of all spectrum transmissions of info mation to support the security of infor- mation and information systems.

Work roles:


Systems Administration (ADM) Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Manages accounts, firewalls, and patches. Responsible for access control, passwords, and account creation and administration.

Work roles:


Systems Analysis (ANA) Studies an organization’s current computer systems and procedures, and designs infor- mation systems solutions to help the organization operate more securely, efficiently, and effectively. Brings business and information technology (IT) together by understanding the needs and limitations of both.

Work roles:

Securely Provision

Fields specializing in the creation of more comprehensive security measures, including developing secure IT systems and/or investigating security threats.

SPECIALTY AREAS

Risk Management (RSK) Oversees, evaluates, and supports the documentation, validation, assessment, and authorization processes necessary to assure that existing and new information technology (IT) systems meet the organization’s cybersecurity and risk requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.

Work roles:


Software Development (DEV) Develops and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs following software assurance best practices.

Work roles:


Systems Architecture (ARC) Develops system concepts and works on the capabilities phases of the systems development life cycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.

Work roles:


Technology R&D (TRD) Conducts technology assessment and integration processes; provides and supports a prototype capability and/or evaluates its utility.

Work roles:


Systems Requirements Planning (SRP) Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions. Provides guidance to customers about \ applicability of information systems to meet business needs.

Work roles:


Test and Evaluation (TST) Develops and conducts tests of systems to evaluate compliance with specifications and requirements by applying principles and methods for cost-effective planning, evaluating, verifying, and validating of technical, functional, and performance characteristics (including interoperability) of systems or elements of systems incorporating IT.

Work roles:


Systems Development (SYS) Works on the development phases of the systems development life cycle.

Work roles:

Analyze

Areas specializing in the expert analysis and assessment of cybersecurity information in order to support intelligence gathering.

SPECIALTY AREAS

Threat Intelligence (TWA) Identifies and assesses the capabilities and activities of cybersecurity criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities.

Work roles:


Exploitation Analysis (EXP) Analyzes collected information to identify vulnerabilities and potential for exploitation.

Work roles:


All-Source Analysis (ASA) Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications.

Work roles:


Targets (TGT) Applies current knowledge of one or more regions, countries, non-state entities, and/or technologies.

Work roles:


Language Analysis (LNG) Applies language, cultural, and technical expertise to support information collection, analysis, and other cybersecurity activities.

Work roles:

  • Multi-Disciplined Language Analyst

Collect & Operate

Fields specializing in deterrence and cyber information gathering in order to expand intelligence and increase resilience.

SPECIALTY AREAS

Collection Operations (CLO) Executes collection using appropriate strategies and within the priorities established through the collection management process.

Work roles:


Cyber Operational Planning (OPL) Performs in-depth joint targeting and cybersecurity planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational-level planning across the full range of operations for integrated information and cyberspace operations.

Work roles:


Cyber Operations (OPS) Performs activities to gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.

Work roles:

Schedule a Demo

See the platform 96% of the Fortune 1000 has employees building their careers on in motion and how it can enable security skills for your entire organization. Complete the form, then we’ll reach out to schedule a demo.

Loading...