CYBERSECURITY EDUCATION

NIST’s NICE Framework is a fundamental reference

CyberEd.io’s comprehensive learning platform provides complete cybersecurity education and upskill curriculum that covers all categories of the NICE framework.

By relying on the NICE framework to inform our course creation and training strategy we can ensure that we have all the coursework needed for your team to develop their cybersecurity skills.

Securely Provision​

Conceptualize, design, build and/or
acquire secure IT systems​.

Security Architecture​
Identity Management​
Risk ​Management​
Product Delivery

Operate &​ Maintain​

Provide support, admin and maintenance to
assure system performance and security.

Business Enablement
Cloud Services
Customer & Tech Support
Budget

Oversee & Govern

Leadership, management, direction and governance to assure cybersecurity effectiveness.

Governance
Legal & Human Resources​
Ethics​
Selling InfoSec ​(internal)​

Threat Analysis​

Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes
and places intelligence information in context; draws insights about the possible implications.​

Compliance​ & Audits​
Threat Mapping​
M&A​ Threats​
Targets

Protect &​ Defend​

Identify, analyze, and mitigate
threats to systems and networks.

Security Operations​
Threat Prevention​
Threat Detection​​
Cyberdefesnse​ Analysis​

Collect & Operate​

Performs in-depth joint targeting and cybersecurity planning process. Gathers information and develops detailed Operational Plans and Orders, supporting requirements. Conducts strategic and operational-level planning across the full range of operations for integrated information and cyberspace operations.

 

Incident Management
Data Collection
Operational Planning
Cyber Operations

Forensics/Discovery​

Collects, processes, preserves, analyzes and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence or law enforcement investigations.

Breach Investigation​
Threat​ Intelligence​​
Investigate/Discover​
Criminal​ Analysis​

Get In Touch!

Leave your details and we will get back to you.