• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

CBSD designates knowledgeable technology professionals in the field of biometric security. This program is designed for those who wish to gain a solid understanding of biometric technologies and apply concepts and COTS tools to improve logical and physical access control in identity management systems. Ideal candidates for this program include security architects, Software & Application Developers, Security Engineers, information assurance consultants, Program & Project Managers and other individuals with experience and expertise in information security related domains. Prior application and software programming experience is required.

Learning Objectives

CBSD designates knowledgeable technology professionals in the field of biometric security. This program is designed for those who wish to gain a solid understanding of biometric technologies and apply concepts and COTS tools to improve logical and physical access control in identity management systems. Ideal candidates for this program include security architects, Software & Application Developers, Security Engineers, information assurance consultants, Program & Project Managers and other individuals with experience and expertise in information security related domains. Prior application and software programming experience is required.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • All-Source Analysis
  • Collection Operations
  • Systems Administration
  • Systems Architecture
  • Systems Development
  • Technology R&D
  • Test and Evaluation
  • Threat Analysis
  • Training, Education, and Awareness
  • Vulnerability Assessment and Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.