Normal view MARC view ISBD view

The NICE Cyber Security Framework [electronic resource] : Cyber Security Intelligence and Analytics / by Izzat Alsmadi.

By: Alsmadi, Izzat [author.].
Contributor(s): SpringerLink (Online service).
Material type: materialTypeLabelBookPublisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019.Description: XX, 354 p. 192 illus., 153 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030023607.Subject(s): Telecommunication | Data protection | Security systems | Computer networks  | Communications Engineering, Networks | Data and Information Security | Security Science and Technology | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 621.382 Online resources: Click here to access online
Contents:
Introduction -- Acquisition Management -- Continuity Planning and Disaster Recovery -- Cyber Defense Analysis and Support -- Cyber Intelligence -- Cyber Intelligence Analysis -- Cyber Operational Planning -- Cyber Policy and Strategy Management -- Cyber Threat Analysis -- Cybersecurity Management -- Forensics Analysis -- Identity Management -- Incident Response.
In: Springer Nature eBookSummary: This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more.
    average rating: 0.0 (0 votes)
No physical items for this record

Introduction -- Acquisition Management -- Continuity Planning and Disaster Recovery -- Cyber Defense Analysis and Support -- Cyber Intelligence -- Cyber Intelligence Analysis -- Cyber Operational Planning -- Cyber Policy and Strategy Management -- Cyber Threat Analysis -- Cybersecurity Management -- Forensics Analysis -- Identity Management -- Incident Response.

This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more.

There are no comments for this item.

Log in to your account to post a comment.