A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)
Author :
Publisher : CRC Press
Total Pages : 503
Release :
ISBN-10 : 9781315359960
ISBN-13 : 1315359960
Rating : 4/5 (60 Downloads)

Book Synopsis A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) by : Dan Shoemaker

Download or read book A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) written by Dan Shoemaker and published by CRC Press. This book was released on 2018-09-03 with total page 503 pages. Available in PDF, EPUB and Kindle. Book excerpt: A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST’s cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF’s identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.


A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) Related Books

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)
Language: en
Pages: 503
Authors: Dan Shoemaker
Categories: Computers
Type: BOOK - Published: 2018-09-03 - Publisher: CRC Press

DOWNLOAD EBOOK

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks,
Design, Motivation, and Frameworks in Game-Based Learning
Language: en
Pages: 306
Authors: Tan, Wee Hoe
Categories: Education
Type: BOOK - Published: 2018-07-13 - Publisher: IGI Global

DOWNLOAD EBOOK

Game-based learning relates to the use of games to enhance the learning experience. Educators have been using games in the classroom for years, and when tied to
Securing an IT Organization through Governance, Risk Management, and Audit
Language: en
Pages: 396
Authors: Ken E. Sigler
Categories: Business & Economics
Type: BOOK - Published: 2016-01-05 - Publisher: CRC Press

DOWNLOAD EBOOK

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers c
Supply Chain Risk Management
Language: en
Pages: 278
Authors: Ken Sigler
Categories: Business & Economics
Type: BOOK - Published: 2017-11-07 - Publisher: CRC Press

DOWNLOAD EBOOK

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based con
Research Anthology on Artificial Intelligence Applications in Security
Language: en
Pages: 2253
Authors: Management Association, Information Resources
Categories: Computers
Type: BOOK - Published: 2020-11-27 - Publisher: IGI Global

DOWNLOAD EBOOK

As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top pr