The NICE Cyber Security Framework

Cyber Security Intelligence and Analytics

Nonfiction, Science & Nature, Technology, Telecommunications, Computers, Networking & Communications, Computer Security
Cover of the book The NICE Cyber Security Framework by Izzat Alsmadi, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Izzat Alsmadi ISBN: 9783030023607
Publisher: Springer International Publishing Publication: January 24, 2019
Imprint: Springer Language: English
Author: Izzat Alsmadi
ISBN: 9783030023607
Publisher: Springer International Publishing
Publication: January 24, 2019
Imprint: Springer
Language: English

This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.

  • Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) 

  • Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training

  • Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.

More books from Springer International Publishing

Cover of the book Progress in the Chemistry of Organic Natural Products 108 by Izzat Alsmadi
Cover of the book Metric Modular Spaces by Izzat Alsmadi
Cover of the book Making Friends on the Fly: Advances in Ad Hoc Teamwork by Izzat Alsmadi
Cover of the book Female Entrepreneurship in Nineteenth-Century England by Izzat Alsmadi
Cover of the book Game Theory for Networks by Izzat Alsmadi
Cover of the book Pollination Biology, Vol.1 by Izzat Alsmadi
Cover of the book Hybrid Artificial Intelligent Systems by Izzat Alsmadi
Cover of the book Moral Ecologies by Izzat Alsmadi
Cover of the book Multidisciplinary Management of Prostate Cancer by Izzat Alsmadi
Cover of the book Spirituality in Management by Izzat Alsmadi
Cover of the book Modeling, Dynamics, Optimization and Bioeconomics III by Izzat Alsmadi
Cover of the book Bernard Mandeville: A Treatise of the Hypochondriack and Hysterick Diseases (1730) by Izzat Alsmadi
Cover of the book Wildlife Tourism, Environmental Learning and Ethical Encounters by Izzat Alsmadi
Cover of the book Bioactive Compounds in Agricultural Soils by Izzat Alsmadi
Cover of the book The Intangible Elements of Culture in Ethnoarchaeological Research by Izzat Alsmadi
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy