US flag signifying that this is a United States Federal Government website

  Official website of the Cybersecurity and Infrastructure Security Agency

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Breadcrumb
  1. Home >>
  2. About NICCS >>
  3. Featured Stories >>
  4. FedVTE Has a NEW Look! And a new Supply Chain course!

FedVTE Has a NEW Look! And a new Supply Chain course!

FedVTE has a NEW LOOK!

Create Your Account to Access Free Cybersecurity Training Here: https://fedvte.usalearning.gov/

*The Federal Virtual Training Environment (FedVTE) provides free online cybersecurity training to U.S. government employees, Federal contractors, and veterans.

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

FedVTE NEW Course Alert! Cyber Supply Chain Risk Management  (C-SCRM)

The C-SCRM course is NOW LIVE on the Federal Virtual Training Environment (FedVTE)! Please log in or create your FedVTE account here: https://fedvte.usalearning.gov/

Understanding the cyber risks to the supply chain…

The purpose of this course is to educate the learner about cyber supply chain risk management, also known as C-SCRM, and the role it plays within our society today. This course will teach learners how to securely provision, analyze, oversee and govern, protect and defend a supply chain.

Objectives:

  • Describe product supply chains and life cycles
  • Identify the role of adversaries in supply chain risk management
  • Define the risks associated with supply chains
  • State the principles of supply chain management
  • Identify security measures taken to protect a supply chain
  • Apply suggested tools to address supply chain vulnerabilities
  • Explain how knowledge of the "internet of things" (IOT) is used to evaluate products as IOT devices
  • Recognize potential dangers posed by various devices brought to work
  • Identify the threats outlined for acquisitions personnel through the Federal Acquisition Regulation (FAR)
  • Define how to personally safeguard your organization’s cybersecurity

Training Purpose: Securely Provision, Analyze, Oversee and Govern, Protect and Defend

Specialty Areas:  Risk Management, Software Development, Systems Development, Systems Requirements Planning, All-Source Analysis, Exploitation Analysis, Targets, Threat Analysis, Cybersecurity Management, Program/Project Management and Acquisition, Strategic Planning and Policy, Cyber Defense Analysis, Cyber Defense Infrastructure Support

Training Area: Level 1 - Basic

Remember, ALL FedVTE courses are aligned to the NICE Cybersecurity Workforce Framework.

 

You have been selected to participate in a brief survey about your experience today with National Initiative for Cybersecurity Careers and Studies.

Would you like to participate on a survey?