A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) by Dan Shoemaker, Anne Kohnke, Ken Sigler, CRC Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Dan Shoemaker, Anne Kohnke, Ken Sigler ISBN: 9781315359960
Publisher: CRC Press Publication: September 3, 2018
Imprint: Auerbach Publications Language: English
Author: Dan Shoemaker, Anne Kohnke, Ken Sigler
ISBN: 9781315359960
Publisher: CRC Press
Publication: September 3, 2018
Imprint: Auerbach Publications
Language: English

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST’s cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF’s identification, protection, defense, response, or recovery functions are being carried out properly.

The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity.

The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST’s cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF’s identification, protection, defense, response, or recovery functions are being carried out properly.

The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity.

The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

More books from CRC Press

Cover of the book Soft Computing in Engineering by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Constructed Wetlands for the Treatment of Landfill Leachates by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Concise Introduction to Linear Algebra by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Bayesian Psychometric Modeling by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Respiratory Medicine by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Embedded Software Development by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Adsorption and Diffusion in Nanoporous Materials by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book International Environmental Risk Management by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Image Processing and Mathematical Morphology by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Vulvovaginal Infections by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Solar Radiation and Daylight Models by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Advanced Applications in Remote Sensing of Agricultural Crops and Natural Vegetation by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book CRC Handbook of Chromatography by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Electronic Circuits, 4th ed by Dan Shoemaker, Anne Kohnke, Ken Sigler
Cover of the book Structural Wood Design – ASD/LRFD, 2nd ed by Dan Shoemaker, Anne Kohnke, Ken Sigler
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy