Cyber Instructor Job Profile

Discover more salary details for

What is a Cyber Instructor

The Cyber Instructor develops and conducts training or education of personnel within cyber domain.

Professional Certification

Cyber Instructor must know

  • computer networking concepts and protocols, and network security methodologies.
  • risk management processes (e.g., methods for assessing and mitigating risk).
  • laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • cybersecurity and privacy principles.
  • cyber threats and vulnerabilities.
  • specific operational impacts of cybersecurity lapses.
  • authentication, authorization, and access control methods.
  • new and emerging information technology (IT) and cybersecurity technologies.
  • technology that can be exploited.
  • multiple cognitive domains and tools and methods applicable for learning in each domain.
  • virtualization technologies and virtual machine development and maintenance.
  • the organization’s core business/mission processes.
  • emerging security issues, risks, and vulnerabilities.
  • learning assessment techniques (rubrics, evaluation plans, tests, quizzes).
  • computer based training and e-learning services.
  • instructional design and evaluation models (e.g., ADDIE, Smith/Ragan model, Gagne’s Events of Instruction, Kirkpatrick’s model of evaluation).
  • organizational training policies.
  • learning levels (i.e., Bloom’s Taxonomy of learning).
  • Learning Management Systems and their use in managing learning.
  • learning styles (e.g., assimilator, auditory, kinesthetic).
  • modes of learning (e.g., rote learning, observation).
  • organizational training systems.
  • media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media.
  • principles and processes for conducting training and education needs assessment.
  • relevant concepts, procedures, software, equipment, and technology applications.
  • Test & Evaluation processes for learners.
  • training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects.
  • an organization’s information classification program and procedures for information compromise.
  • external organizations and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development).
  • technical delivery capabilities and their limitations.
  • cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations.

Key skills of the Cyber Instructor include:

  • conducting vulnerability scans and recognizing vulnerabilities in security systems.
  • analyzing network traffic capacity and performance characteristics.
  • applying confidentiality, integrity, and availability principles.
  • the use of penetration testing tools and techniques.
  • the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.).
  • tuning sensors.
  • using knowledge management technologies.
  • using network management tools to analyze network traffic patterns (e.g., simple network management protocol).
  • using protocol analyzers.
  • writing code in a currently supported programming language (e.g., Java, C++).
  • developing and executing technical training programs and curricula.
  • talking to others to convey information effectively.
  • using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.).
  • conducting forensic analyses in multiple operating system environments (e.g., mobile device systems).
  • configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirus software, anti-spyware).
  • using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.).
  • configuring and utilizing network protection components (e.g., Firewalls, VPNs, network intrusion detection systems).
  • applying security controls.
  • detecting host and network based intrusions via intrusion detection technologies. (See Network Management)
  • utilizing or developing learning activities (e.g., scenarios, instructional games, interactive exercises).
  • utilizing technologies (e.g., SmartBoards, websites, computers, projectors) for instructional purposes.
  • system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
  • analyzing malware.
  • performing packet-level analysis.
  • analyzing traffic to identify network devices.
  • reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools.
  • reviewing and editing assessment products.
  • technical writing.
  • using tools, techniques, and procedures to remotely exploit and establish persistence on a target.
  • writing about facts and ideas in a clear, convincing, and organized manner.
  • communicating with all levels of management including Board members (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience).
  • remain aware of evolving technical infrastructures.

Cyber Instructor must be able to

  • prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures.
  • answer questions in a clear and concise manner.
  • ask clarifying questions.
  • communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • communicate effectively when writing.
  • conduct vulnerability scans and recognize vulnerabilities in security systems.
  • facilitate small group discussions.
  • gauge learner understanding and knowledge level.
  • prepare and present briefings.
  • produce technical documentation.
  • provide effective feedback to students for improving learning.
  • apply principles of adult learning.
  • design valid and reliable assessments.
  • develop clear directions and instructional materials.
  • develop curriculum for use within a virtual environment.
  • operate common network tools (e.g., ping, traceroute, nslookup).
  • tailor curriculum that speaks to the topic at the appropriate level for the target audience.
  • execute OS command line (e.g., ipconfig, netstat, dir, nbtstat).
  • operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
  • accurately and completely source all data used in intelligence, assessment and/or planning products.
  • apply critical reading/thinking skills.
  • evaluate information for reliability, validity, and relevance.
  • function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
  • tailor technical and planning information to a customer’s level of understanding.
  • think critically.
  • monitor advancements in information privacy technologies to ensure organizational adaptation and compliance.
  • develop or procure curriculum that speaks to the topic at the appropriate level for the target.
  • understand technology, management, and leadership issues related to organization processes and problem solving.
  • understand the basic concepts and issues related to cyber and its organizational impact.
  • conduct training and education needs assessment

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?