Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Defense Acquisition University
  4. Cybersecurity and Acquisition Integration

Cybersecurity and Acquisition Integration

The workshop introduces several methods to help guide the implementation of the core cybersecurity principles across the DoD acquisition lifecycle. The workshop will reinforce the importance of balancing People, Process, and Technology, which are critical to designing and maintaining cyber resilient systems. Participants will be introduced to foundational knowledge of cybersecurity as it relates to the DoD Acquisition Lifecycle. Students will learn how cybersecurity principles apply to their career fields. The case studies in the workshop will allow participants to explore cybersecurity integration and risk management issues similar to the ones that they will likely face in their workplaces. The workshop is tailorable to the specific customer needs.

Course Overview

Overall Proficiency Level
1 - Basic
Course Catalog Number
WSS 001
Course Prerequisites

None

Training Purpose
Skill Development
Specific Audience
Federal Employee
Contractor
Delivery Method
Online, Instructor-Led
Online, Self-Paced
Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
  • Classroom

Learning Objectives

The objective of this workshop includes the ability to: Given a cybersecurity scenario, evaluate steps to ensure appropriate cybersecurity measures are taken throughout the acquisition lifecycle. Summarize the key aspects of Cybersecurity as they relate to the Defense Acquisition System. Identify the foundational guidance and policies associated with cybersecurity. Identify the workforce roles regarding cybersecurity as it relates to the acquisition lifecycle. Explain cybersecurity threats to DoD systems and their impact throughout the acquisition lifecycle. Illustrate the integration of cybersecurity into programs earlier & throughout the systems lifecycle. Analyze how the cybersecurity risk management process integrates with all acquisition career fields.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Exploitation Analysis
  • Risk Management
  • Training, Education, and Awareness
  • Vulnerability Assessment and Management
  • Systems Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: