(301) 220 2802
The NIST cybersecurity framework reminds us that it takes more than ethical hackers to defend an organization from cyber attacks.
In order to support your company or government agency implement the NIST framework, here are the courses that TrainACE offers. If you're in the Washington DC area, improve your organization's cyber security by encouraging employees to pursue these NICE specialties. For your convenience, we've organized these courses into the appropriate NICE Category.
Analyze
In this NICE framework category, analysis is performed to review and evaluate incoming cybersecurity information to assess its utility for intelligence.
- All-Source Analysis – Uses threat information analysis from numerous sources to contextualize findings and extricate important insights regarding possible implications.*
- Exploitation Analysis – Analyzes collected data to find vulnerable areas and evaluate the potential for exploitation.
- Language Analysis – Uses language, technical, and cultural knowledge to collect and analyze intelligence data.*
- Targets – Specializes in one or more countries, regions, entities, or technologies.
- Threat Analysis – Monitors cybercriminal activity to gather data and produce findings to support law enforcement or counterintelligence investigations.
- CompTIA Security+ Training & Certification
- CompTIA Cybersecurity Analyst+ (CySA+) Training
- CompTIA Pentest+ Training and Certification
- CompTIA Advanced Security Practitioner (CASP+)
- Security+ & Certified Ethical Hacker (CEH) Combo
- CND-Certified Network Defender Training
- CEH - Certified Ethical Hacker Training and Certification
- CHFI-Computer Hacking Forensic Investigator Training and Certification
- CEH + CHFI Certification Training Combo
- ECIH - Certified Incident Handler Training
- CTIA - Certified Threat Intelligence Analyst
- CCISO-Certified Chief Information Security Officer Training and Certification
- CISSP-Certified Information Systems Security Professional Training & Certification
- SSCP - Systems Security Certified Practitioner Training and Certification
- Fundamentals of Malware Analysis
- Advanced Malware Analysis
- Reverse Engineering Malware
Collect and Operate
This section of the framework focuses on conducting denial and deception operations while collecting cybersecurity information to be used for intelligence.
- Collection Operations – Gathering cybersecurity data using the collection management process.
- Cyber Operational Planning – Performs planning at the strategic and operational levels to integrate cyber and information operations.
- CompTIA Security+ Training & Certification
- CompTIA Advanced Security Practitioner (CASP+)
- Security+ & Certified Ethical Hacker (CEH) Combo
- CND-Certified Network Defender Training
- CISSP-Certified Information Systems Security Professional Training & Certification
- CISM-Certified Information Security Manager Training and Certification
- CISA-Certified Information Systems Auditor Training and Certification
- AWS Technical Essentials
- Reverse Engineering Malware
- Cyber Operations – Collects intelligence on criminal and foreign entities to allow for planning and mitigation of potential threats.
- CPENT
- Advanced Malware Analysis
- Analyzing Vulnerability Scans and Responding to Attacks
- Evidence Collection and Hidden Data Live Monitoring
- Introduction to System Forensics and System Forensics Issues
Investigate
This category involves investigating cybersecurity crimes and events on IT networks and systems.
- Cyber Investigation – Collecting cybersecurity intelligence using multiple strategies, techniques, and processes.
- Digital Forensics – Collecting, processing, preserving, analyzing, and presenting evidence to support network vulnerability mitigation, as well as fraud, criminal, counterintelligence, or law enforcement investigations.
- CHFI-Computer Hacking Forensic Investigator Training and Certification
- CEH + CHFI Certification Training Combo
- CPENT
- Analyzing Vulnerability Scans and Responding to Attacks
- Evidence Collection and Hidden Data Live Monitoring
- Introduction to System Forensics and System Forensics Issues
Operate and Maintain
The Operate and Maintain section focuses on the administration, maintenance, and support for IT system security and performance.
- Customer Service and Technical Support – Assisting and educating clients with technical issues related (but not limited) to installations, configurations, and troubleshooting.
- Data Administration – Overseeing data management systems and databases for the security of query, storage, and use of data.
- CompTIA Data+
- ECIH - Certified Incident Handler Training
- CCISO-Certified Chief Information Security Officer Training and Certification
- SSCP - Systems Security Certified Practitioner Training and Certification
- DA-100T00 Analyzing Data with Power BI
- Microsoft Access 2013 Basic - Access Part 1
- Microsoft Access 2013 Intermediate - Access Part 2
- Access - Part 3
- Microsoft Project 2013 Basic - Part 1 2019
- Microsoft Project 2013 Intermediate Part 2 – 2019
- Microsoft Excel 2016 Part 1
- Microsoft Excel 2016 Part 2
- Microsoft Excel 2016 Part 3
- Using Python for Data Analytics
- Knowledge Management – Managing and administering tools and processes that allow the organization to classify, document, and access intellectual capital.
- CompTIA A+ Training & Certification
- CompTIA Network+ Training & Certification
- CompTIA A+/Network+ Training Combo
- PMP-Project Management Professional Training
- CAPM - Certified Associate in Project Management
- AWS Technical Essentials
- Microsoft Access 2013 Basic - Access Part 1
- Microsoft Project 2013 Basic - Part 1 2019
- Microsoft Project 2013 Intermediate Part 2 - 2019
- Microsoft SharePoint 2013 Foundation Training - Microsoft Sharepoint
- Microsoft Excel 2016 Part 1
- Microsoft Excel 2016 Part 2
- Microsoft Excel 2016 Part 3
- Network Services – Installing, configuring, operating, testing, maintaining, and managing networks and firewalls, including software and hardware.
- CompTIA A+ Training & Certification
- CompTIA Network+ Training & Certification
- CompTIA A+/Network+ Training Combo
- CompTIA Cloud+ Training and Certification
- CCNA Training and Certification
- CCNA + CCNP Training Combo
- CCNP ENARSI - Cisco Certified Network Professional Training & Certification
- CCNP ENCOR - Cisco Certified Network Professional Training & Certification
- CCNP Enterprise (ENCOR + ENARSI)
- CCSE - Certified Cloud Security Engineer - Training and Certification
- CCSP - Certified Cloud Security Professional Training and Certification
- F5 Networks - Administering BIG-IP v14
- F5 Networks - Configuring BIG-IP APM (Access Policy Manager)
- MD-101T00: Managing Modern Desktops
- Systems Administration – Installing, configuring, troubleshooting, and maintaining server configurations to ensure integrity, confidentiality, and availability, including software and hardware. Additionally, managing accounts, patches, firewalls, access control, account creation, and passwords.
- CompTIA Security+ Training & Certification
- CompTIA Linux+ Training and Certification
- CompTIA Advanced Security Practitioner (CASP+)
- Security+ & Certified Ethical Hacker (CEH) Combo
- CND-Certified Network Defender Training
- CEH - Certified Ethical Hacker Training and Certification
- CHFI-Computer Hacking Forensic Investigator Training and Certification
- CEH + CHFI Certification Training Combo
- ECIH - Certified Incident Handler Training
- CCISO-Certified Chief Information Security Officer Training and Certification
- CISSP-Certified Information Systems Security Professional Training & Certification
- SSCP - Systems Security Certified Practitioner Training and Certification
- Architecting On AWS
- Advanced Architecting On AWS
- Developing On AWS
- Reverse Engineering Malware
- Microsoft SharePoint 2013 Foundation Training - Microsoft Sharepoint
- Windows Server 2019 Administration (WS-011T00)
- AZ-104T00 Microsoft Azure Administrator
- AZ-900T00 Microsoft Azure Fundamentals
- SC-900T00 Microsoft Security, Compliance, and Identity Fundamentals
- VMware vSphere Install, Configure, Manage Training
- Systems Analysis – Studying the organization's systems and procedures, and designing information systems solutions to operate more securely, effectively and efficiently by bringing business and IT together.
- CompTIA A+ Training & Certification
- CompTIA Network+ Training & Certification
- CompTIA A+/Network+ Training Combo
- CompTIA Security+ Training & Certification
- CompTIA Linux+ Training and Certification
- CompTIA Cloud+ Training and Certification
- CompTIA Advanced Security Practitioner (CASP+)
- CompTIA Cloud Essentials+ Training and Certification
- Security+ & Certified Ethical Hacker (CEH) Combo
- CND-Certified Network Defender Training
- CEH - Certified Ethical Hacker Training and Certification
- CHFI-Computer Hacking Forensic Investigator Training and Certification
- CEH + CHFI Certification Training Combo
- ECIH - Certified Incident Handler Training
- CCISO-Certified Chief Information Security Officer Training and Certification
- CISSP-Certified Information Systems Security Professional Training & Certification
- SSCP - Systems Security Certified Practitioner Training and Certification
- Reverse Engineering Malware
- RMF-CAP Certification Training
- Analyzing Vulnerability Scans and Responding to Attacks
- Evidence Collection and Hidden Data Live Monitoring
- Introduction to System Forensics and System Forensics Issues
Oversee and Govern
This category involves the direction, leadership, and advocacy of cybersecurity strategies, initiatives, and activities.
- Cybersecurity Management – Organizing and managing cybersecurity programs for enterprise businesses.
- CCNP Enterprise (ENCOR + ENARSI)
- CCSE - Certified Cloud Security Engineer - Training and Certification
- CRISC-Certified in Risk and Information Systems Control Training
- AWS Technical Essentials
- SC-900T00 Microsoft Security, Compliance, and Identity Fundamentals
- Executive Cyber Leadership – Overseeing and leading cyber-enabled teams.*
- Legal Advice and Advocacy – Providing legal advice and recommendations to staff and leadership. Acting as an advocate regarding policy changes and representing clients in legal proceedings, briefs, and other activities.*
- Program/Project Management and Acquisition – Managing acquisitions of software, hardware, and information systems, involving project management, auditing, and investment alignment.
- CompTIA Project+ Training and Certification
- CISM-Certified Information Security Manager Training and Certification
- CRISC-Certified in Risk and Information Systems Control Training
- PMP-Project Management Professional Training
- CAPM - Certified Associate in Project Management
- Evidence Collection and Hidden Data Live Monitoring
- Introduction to System Forensics and System Forensics Issues
- Strategic Planning and Policy Development – Developing policies and processes for an organization’s cybersecurity initiatives.
- Training, Education, and Awareness – Overseeing sourcing, planning, development, and implementing all cybersecurity training initiatives for staff.*
Protect and Defend
This category involves threat mitigation using careful analysis.
- Cyber Defense Analysis – Integrates intelligence and defensive measures to analyze and report actual and potential cybersecurity threats within a network.
- CompTIA Cybersecurity Analyst+ (CySA+) Training
- CompTIA Pentest+ Training and Certification
- PMP-Project Management Professional Training
- RMF-CAP Certification Training
- Analyzing Vulnerability Scans and Responding to Attacks
- Evidence Collection and Hidden Data Live Monitoring
- Cyber Defense Infrastructure Support – Implementing, maintaining, and testing infrastructure software and hardware, and monitoring the network for any suspicious activity.
- CompTIA Network+ Training & Certification
- CompTIA A+/Network+ Training Combo
- CompTIA Cybersecurity Analyst+ (CySA+) Training
- CompTIA Cloud Essentials+ Training and Certification
- CCNA + CCNP Training Combo
- CCNP ENARSI - Cisco Certified Network Professional Training & Certification
- CCNP ENCOR - Cisco Certified Network Professional Training & Certification
- CCNP Enterprise (ENCOR + ENARSI)
- CCSE - Certified Cloud Security Engineer - Training and Certification
- CISA-Certified Information Systems Auditor Training and Certification
- AWS Technical Essentials
- Windows Server 2019 Administration (WS-011T00)
- Analyzing Vulnerability Scans and Responding to Attacks
- Incident Response – Responding to potential threats on a network and mitigating them immediately to secure or recover data.
- Vulnerability Assessment and Management – Performing assessments of vulnerabilities and threats, to develop countermeasures.
- CompTIA Cybersecurity Analyst+ (CySA+) Training
- CompTIA Pentest+ Training and Certification
- CCNP ENARSI - Cisco Certified Network Professional Training & Certification
- CCNP ENCOR - Cisco Certified Network Professional Training & Certification
- CCNP Enterprise (ENCOR + ENARSI)
- CISA-Certified Information Systems Auditor Training and Certification
- ITIL - Information Technology Infrastructure Library Foundations
- Fundamentals of Malware Analysis
- Exploit Development
Securely Provision
This category focuses on conceptualizing, designing, procuring, and building secure IT systems. It also covers system and network development.
- Risk Management – Responsible for all aspects of information security risk requirements to ensure compliance. This includes conducting risk assessments, deploying strategies for risk mitigation, and monitoring and documenting of risk management program.
- CISM-Certified Information Security Manager Training and Certification
- CCSP - Certified Cloud Security Professional Training and Certification
- PMP-Project Management Professional Training
- DevOps Engineering On AWS
- RMF-CAP Certification Training
- SC-900T00 Microsoft Security, Compliance, and Identity Fundamentals
- Software Development – Creating, designing, implementing, and assessing software.
- CompTIA Linux+ Training and Certification
- CISM-Certified Information Security Manager Training and Certification
- CSSLP - Certified Secure Software Lifecycle Professional Training & Certification
- DevOps Engineering On AWS
- Introduction to C Programming
- Introduction to Java Programming
- Advanced C Programming
- Advanced JAVA Programming
- Microsoft Access 2013 Basic - Access Part 1
- Microsoft Access 2013 Intermediate - Access Part 2
- Access - Part 3
- Microsoft Project 2013 Basic - Part 1 2019
- Microsoft Project 2013 Intermediate Part 2 - 2019
- Microsoft Excel 2016 Part 1
- Microsoft Excel 2016 Part 2
- Microsoft Excel 2016 Part 3
- Using Python for Data Analytics
- Python Programming
- Python for Pentesters
- Systems Architecture – Developing system capabilities and concepts, ensuring technology and external conditions are integrated into cybersecurity processes and designs.
- CompTIA Security+ Training & Certification
- CompTIA Advanced Security Practitioner (CASP+)
- CompTIA Cloud Essentials+ Training and Certification
- CCNP ENARSI - Cisco Certified Network Professional Training & Certification
- CCNP ENCOR - Cisco Certified Network Professional Training & Certification
- CCNP Enterprise (ENCOR + ENARSI)
- CND-Certified Network Defender Training
- CEH - Certified Ethical Hacker Training and Certification
- CEH + CHFI Certification Training Combo
- ECIH - Certified Incident Handler Training
- CCISO-Certified Chief Information Security Officer Training and Certification
- CISSP-Certified Information Systems Security Professional Training & Certification
- CCSP - Certified Cloud Security Professional Training and Certification
- CSSLP - Certified Secure Software Lifecycle Professional Training & Certification
- SSCP - Systems Security Certified Practitioner Training and Certification
- Reverse Engineering Malware
- Systems Development – Focusing on the systems development lifecycle phases that involve development.
- Systems Requirements Planning – providing consultation to customers explaining how to convert business needs into technical solutions effectively.
- Technology R&D – Assessing technology and integration processes, providing support, and evaluating prototype utility and capabilities.*
- Test and Evaluation – Conducting regular systems testing to track specification and requirement compliance.
*If TrainACE does not currently offer a course related to a specific NICE framework that you need in your organization, please speak with one of our program managers- we still might be able to help.