Cybersecurity Resources

A lock over a background of computer circuitry.

Looking for specific cybersecurity information? Below are the NICCS tools and resources available for anyone seeking cyber education information. To know more about the cybersecurity field or how to advance in your cybersecurity career, the links below are a great place to start. No matter what your life circumstances are, you can use this roadmap to help direct you to detailed information in specific cybersecurity areas of expertise.

Industry Resources

Cybersecurity Workforce Development Toolkit
The Cybersecurity Workforce Development Toolkit provides organizations with information, tools and templates to plan, build, and advance their cybersecurity workforce. Developed for Human Resource professionals, this tool will help Human Resources personnel plan and recruit cybersecurity resources and includes tools such as career path templates.

DHS PushButtonPD™ Tool
This Human Resources and Manager tool was developed to help quickly draft Federal employee cyber position description(s). It is a no cost excel workbook file which makes drafting of the position description easier without any prior knowledge of the cyber position.  

Workforce Management Guidebook - Cybersecurity is Everyone's Job
The Workforce Management Guidebook  is a publication of the National Initative for Cybersecurity  Education (NICE) Working Group Sub-Group on Workforce Management.  It provides things to know, and things to do, for everyone in an organization, regardless of its type or size. It is intended for the general audience, which may not otherwise be knowledgeable about, or interested in, cybersecurity. It can be read as a complete guide, or by each business function as standalone guides.

Community College Resources

Introduction to Assured Software Engineering Course
Introduction to Assured Software Engineering Course (Instructor Notes Only)
The Introduction to Assured Software Engineering course highlights software assurance challenges, foundations, and guiding principles.  It covers security models and methods in the areas of lifecycle process models; risk management; requirements engineering; architecture and design; and verification and validation.

Last Published Date: 
September 27, 2018