Template B
Career Cluster: CYBERSECURITY
| KEY ACTIVITY | Performance Indicator How do we know when the key activity is performed well? |
Technical Knowledge Skills, Abilities, Tools |
Employabilty Skills SCANS Skills and Foundational Abilities |
| A1 Gather and document data/information assurance requirements |
|
|
|
| A2 Develop data/information assurance plans and implementation strategies |
|
|
|
| A3 Review and test plans and strategies for compliance with applicable regulations and standards |
|
|
|
| A4 Implement data/information assurance plans and strategies |
|
|
|
| A5 Monitor performance to ensure integrity and confidentiality |
|
|
|
| A6 Maintain and update data/information assurance plans and strategies as appropriate |
|
|
|
| KEY ACTIVITY | Performance Indicator How do we know when the key activity is performed well? |
Technical Knowledge Skills, Abilities, Tools |
Employabilty Skills SCANS Skills and Foundational Abilities |
| B1. Gather data and analyze security requirements |
|
|
|
| B2. Identify, analyze, and evaluate infrastructure and network vulnerabilities |
|
|
|
| B3. Develop critical situation contingency plans and disaster recovery plan |
|
|
|
| B4. Implement/ test contingency and backup plans and coordinate with stakeholders |
|
|
|
| B5. Monitor, report, and resolve security problems |
|
|
|
| KEY ACTIVITY | Performance Indicator How do we know when the key activity is performed well? |
Technical Knowledge Skills, Abilities, Tools |
Employabilty Skills SCANS Skills and Foundational Abilities |
| C1. Perform research and analyze requirements |
|
|
|
| C2. Develop, assess, and document security policies, practices, and procedures |
|
|
|
| C3. Disseminate policies and implementation practices and procedures |
|
|
|
| C4. Implement, enforce, and monitor security policies, practices, and procedures | |||
|
|
|
| KEY ACTIVITY | Performance Indicator How do we know when the key activity is performed well? |
Technical Knowledge Skills, Abilities, Tools |
Employabilty Skills SCANS Skills and Foundational Abilities |
| D1. Identify and assess education and training requirements for all constituents |
|
|
|
| D2. Identify resources and support materials |
|
|
|
| D3. Design and develop education and training plans and strategies |
|
|
|
| D4. Deliver education and training |
|
|
|
| D5. Assess results and determine followup requirements |
|
|
|
| KEY ACTIVITY | Performance Indicator How do we know when the key activity is performed well? |
Technical Knowledge Skills, Abilities, Tools |
Employabilty Skills SCANS Skills and Foundational Abilities |
| E1. Identify and assess current and anticipated security risks and vulnerabilities |
|
|
|
| E2. Research and evaluate alternative current and emerging practices, tools, and technologies |
|
|
|
| E3. Select and apply relevant tools to meet security goals and requirements |
|
|
|
| E4. Monitor, evaluate, and test security conditions and environment |
|
|
|
| E5. Implement, extend, and refine physical security plans and practices |
|
|
|
| KEY ACTIVITY | Performance Indicator How do we know when the key activity is performed well? |
Technical Knowledge Skills, Abilities, Tools |
Employabilty Skills SCANS Skills and Foundational Abilities |
| F1. Define current systems-level requirements, and forecast future needs and trends |
|
|
|
| F2. Evaluate current and emerging tools and technologies |
|
|
|
| F3. Evaluate organization�s security strategies |
|
|
|
| F4. Make recommendations regarding organization�s investment in security |
|
|
|
| F5. Coordinate systems testing and integration |
|
|
|
| F6. Audit and maintain systems performance and ensure future readiness |
|
|
|