Attention: November 11th is the last day to access FedVTE. Users may access FedVTE until 6PM EST on November 11th. After this time FedVTE will be permanently decommissioned. Starting November 15th, users will be able to access all the same learning content through CISA Learning. Stay tuned for more details about the CISA Learning platform.

Knowledge ID: K1101

Knowledge of analytics

Work roles with this Knowledge

  • Security Control Assessment

    NICE Framework ID: OG-WRL-012

    Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.

  • Data Analysis

    NICE Framework ID: IO-WRL-001

    Responsible for analyzing data from multiple disparate sources to provide cybersecurity and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

  • Threat Analysis

    NICE Framework ID: PD-WRL-006

    Responsible for collecting, processing, analyzing, and disseminating cybersecurity threat assessments. Develops cybersecurity indicators to maintain awareness of the status of the highly dynamic operating environment.

  • All-Source Analysis

    NICE Framework ID: CI-WRL-001

    Responsible for analyzing data and information from one or multiple sources to conduct preparation of the operational environment, respond to requests for information, and submit intelligence collection and production requirements in support of intelligence planning and operations.

  • Cyber Intelligence Planning

    NICE Framework ID: CI-WRL-004

    Responsible for developing intelligence plans to satisfy cyber operation requirements. Identifies, validates, and levies requirements for intelligence collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.

  • Cyber Operations Planning

    NICE Framework ID: CE-WRL-002

    Responsible for developing cybersecurity operations plans; participating in targeting selection, validation, and synchronization; and enabling integration during the execution of cyber actions.

  • Exploitation Analysis

    NICE Framework ID: CE-WRL-003

    Responsible for identifying access and intelligence collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

  • Mission Assessment

    NICE Framework ID: CE-WRL-004

    Responsible for developing assessment plans and performance measures; conducting strategic and operational effectiveness assessments for cyber events; determining whether systems perform as expected; and providing input to the determination of operational effectiveness.

  • Partner Integration Planning

    NICE Framework ID: CE-WRL-005

    <p>Responsible for advancing cooperation across organizational or national borders between cyber operations partners. Provides guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.</p>

  • Target Analysis

    NICE Framework ID: CE-WRL-006

    Responsible for conducting target development at the system, component, and entity levels. Builds and maintains electronic target folders to include inputs from environment preparation and/or internal or external intelligence sources. Coordinates with partner target working groups and intelligence community members, and presents candidate targets for vetting and validation. Assesses and reports on damage resulting from the application of military force and coordinates federal support as required.

  • Target Network Analysis

    NICE Framework ID: CE-WRL-007

    Responsible for conducting advanced analysis of collection and open-source data to ensure target continuity; profiling targets and their activities; and developing techniques to gain target information. Determines how targets communicate, move, operate, and live based on knowledge of target technologies, digital networks, and applications.