Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
Cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). 6 Topics
Vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). 4 Topics
0% Complete 0/6 Steps