101 Courses - Basic level courses
NICE Cybersecurity Workforce Framework Category - Analyze
NICE Cybersecurity Workforce Framework Category - Collect and Operate
NICE Cybersecurity Workforce Framework Category - Investigate
NICE Cybersecurity Workforce Framework Category - Operate and Maintain
NICE Cybersecurity Workforce Framework Category - Oversee and Govern
NICE Cybersecurity Workforce Framework Category - Protect and Defend
NICE Cybersecurity Workforce Framework Category - Securely Provision

The NICE Cybersecurity Workforce Framework can be found at: https://niccs.us-cert.gov/workforce-development/cyber-security-workforce-framework

FedVTE Course Catalog
Limit to NICE Cybersecurity Workforce Framework Category or subject:
101 Courses - Basic level courses Analyze Collect and Operate
Investigate Operate and Maintain Oversee and Govern
Protect and Defend Securely Provision
Show All Courses in All Categories

Expand/Collapse All
101 Coding - 5 HoursSkill Level: Basic
+ Description
 101 Coding

In this course, you will learn the basics of computer programming - how to give a machine a set of instructions to produce a desired behavior. This course provides information on the elements of programming and programming languages, frameworks, and models. The course includes an interactive programming game, interactive knowledge checks, and the chance to write your own fully functional code.

Learning Objectives

  • Define programming.
  • Describe the structure and purpose of major programming paradigms.
  • Explain the difference between high-level and low-level languages.
  • Describe the uses of scripting and compiled languages.
  • State the elements of programming.
  • Explain when to use a variable in programming.
  • List basic data types.
  • State how operators are used in programming.
  • Explain why logic and flow are important in programming
  • State the purpose of programming frameworks.

Training Purpose: Securely Provision

Specialty Areas: Software Assurance and Security Engineering, Systems Development, Systems Requirements Planning, Systems Security Architecture, Technology Research and Development, Test and Evaluation

Training Proficiency Area: Level 1 - Basic

Course Date: 6/7/2017

+ Course Modules/Units
 
Coding 101 - Review
101- Critical Infrastructure Protection 2 HoursSkill Level: Basic
+ Description
 101 - Critical Infrastructure Protection

In this course, you will learn about the influence, impact, and need for cybersecurity when defending the critical infrastructure and key resources of the United States. This course provides the definition of critical infrastructure, examples of cybersecurity threats to critical infrastructure, and information on what is being done to protect critical infrastructure from these cybersecurity threats.

Learning Objectives

  • Define and give examples of critical infrastructure.
  • Identify possible cyber threats to critical infrastructure.
  • Describe U.S. cybersecurity policies and programs.
  • Explain the cybersecurity roles of the Department of Homeland Security (DHS) and other Federal agencies.

Training Purpose: Securely Provision, Operate and Maintain, Oversee and Govern, Protect and Defend

Specialty Areas: Systems Architecture, Technology Research and Development, Systems Requirements Planning, Systems Development, Software Assurance and Security Engineering, Network Services, Systems Administration, Systems Analysis, Information Systems Security Operations, Security Program Management, Strategic Planning and Policy Development, Computer Network Defense Analysis, Computer Network Defense Infrastructure Support

Training Proficiency Area: Level 1 - Basic

Course Date: 5/19/2017

+ Course Modules/Units
 
Critical Infrastructure Protection
101 Reverse Engineering - 2 HoursSkill Level: Basic
+ Description
 101 Reverse Engineering

In this course, you will learn the basics of reverse engineering, the process of analyzing a technology specifically to determine how it was designed or how it operates. Instead of working toward building a finished product (like you would in engineering), in reverse engineering you start with a finished product and try to work backwards to determine its component parts. This course focuses on reverse engineering computer software.

Learning Objectives

  • Identify common uses for reverse engineering
  • Explain the process and methodology of reverse engineering
  • Understand some of the legal questions involved in reverse engineering.

Training Purpose: Securely Provision

Specialty Areas: Software Assurance and Security Engineering, Systems Development, Technology Research and Development

Training Proficiency Area: Level 1 - Basic

Course Date: 5/19/2017

+ Course Modules/Units
 
Reverse Engineering