Skip to main content

Explore Specific Projects Using the NICE Framework

Learning Objectives

After completing this unit, you’ll be able to:

  • Design a proficiency-based project using the NICE Framework.
  • Discuss the benefits of aligning cybersecurity training with the NICE Framework.

We’ve explored the NICE framework and the difference between proficiency and performance. Before we continue, let’s review a few concepts from the previous unit to ensure a solid foundation for moving forward.

Knowledge Check

Ready to review what you’ve learned? The following knowledge check isn’t scored—it’s just an easy way to quiz yourself. To get started, let’s review what you’ve learned by matching the cybersecurity proficiency level on the left to the job task to which it applies. When you finish matching all the items, click Submit to check your work. To start over, click Reset.

Now, it’s time to dig into some specific examples to explore how the NICE framework can be used to identify skills needed to solve business challenges.

Program Title: Enhance Skills in Secure Project Management

Scenario

In response to recent audit feedback, an organization has designated representatives from key organizational groups to assist the primary secure project team in carrying out their duties. Representatives work in the organization’s Secure Operations Center (SOC), Risk Management Division, and the Software Development Division. These new team members will play a crucial role in ensuring that cybersecurity is integrated into every aspect of all projects on their teams and that all projects comply with established cybersecurity standards and regulations.

To support this business requirement, the cybersecurity curriculum development team have used the NICE Framework to design a proficiency-based training program to speed up development of the knowledge and skills required for these new team members to become quickly proficient in their secure project management tasks.

Work Role, Tasks, Knowledge, and Skills

According to the National Initiative for Cybersecurity Education, the Secure Project Management work role is: “Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.”

Given the organization’s needs, proficiency-based projects will address the following tasks, knowledge, and skills.

Tasks

Knowledge

Skills

  • Identify opportunities for new and improved business process solutions.
  • Implement independent cybersecurity audit processes for application software, networks, and systems.
  • Determine if cybersecurity requirements included in contracts are being delivered.
  • Recommend organizational cybersecurity resource allocations.
  • Prepare risk management reports.
  • Knowledge of Risk Management Framework (RMF) requirements.
  • Knowledge of cybersecurity laws and regulations.
  • Knowledge of cybersecurity practices in the acquisition process.
  • Knowledge of organizational cybersecurity policies and procedures.
  • Skill in evaluating security designs and products.
  • Skill in identifying systems designed without security considerations.
  • Skill in configuring systems for performance enhancement.
  • Skill in translating operational requirements into security controls.
  • Skill in collecting relevant data from a variety of sources.
  • Skill in preparing reports.

The following proficiency scale will be used to define current and desired levels of skill development.

  • Awareness: You have a basic understanding of the skill and its concepts, but you need step-by-step guidance and supervision to apply it. You’re primarily observing and learning at this stage.
  • Basic: You can perform the skill in straightforward situations with clear instructions, but you still require frequent feedback and support. You’re starting to develop some independence but still relying on others for guidance.
  • Intermediate: You can apply the skill in a variety of situations with growing independence. You can handle some complexity, but you still need occasional guidance or support when facing new challenges.
  • Advanced: You can confidently and independently apply the skill in complex and unpredictable situations. You can troubleshoot problems, make informed decisions, and even guide others with less experience.
  • Expert: You have mastered the skill, easily applying it in any situation. You invent, mentor, and advance the field through your expertise and continuous learning.

Learners and Gap Analysis

For this project, there are nine learners. They differ in job roles, cybersecurity backgrounds, and levels of proficiency in key skills. The curriculum development team conducted a gap analysis to assess each and identify gaps in knowledge and skills. After identifying the gaps, the team designs projects focused on effectively and efficiently closing those gaps.

Identified Gaps

Learners are proficient in some areas of secure project management but also lack proficiency in other areas. Especially for projects where they manage multiple variables in a complex work environment.

Gap Analysis

Current Proficiency

Identified Skill Gap

Desired Work-Related Outcome

2 SOC Analysts

Skill in collecting relevant data from a variety of sources.

Skill in preparing reports.

  • Develop advanced proficiency in collecting data from a variety of internal and external sources, relevant to project security risks and performance.
  • Develop expert proficiency in preparing detailed reports for organizational leadership.

2 SCAs

Skill in configuring systems for performance enhancement.

Skill in translating operational requirements into security controls.

  • Develop intermediate proficiency in configuring systems to handle operational demands for security control testing without disrupting project timelines or quality.
  • Develop expert proficiency in creating tailored security controls to minimize project risk.

3 RMF Team Members

Skill in evaluating security designs and products.

  • Develop advanced proficiency in evaluating security designs and products to ensure that only solutions that meet organizational security standards are integrated into projects.

2 Developers

Skill in identifying systems designed without security considerations.

  • Develop expert proficiency in recognizing when systems and software lack essential security features, enabling early detection of vulnerabilities.

Addressing Proficiency Differences:

While learners are aiming to gain proficiency in various skills and at different levels, the proficiency-based project will challenge all participants by placing them in scenarios where they must apply the necessary skills in real-time. Learners progress at their own pace and are assessed on their ability to adapt to change, making it possible for those with basic awareness to achieve intermediate proficiency, and for those with intermediate proficiency to reach advanced and expert proficiency by the end of the project evaluation period.

Here are two sample labs that result from mapping the project's content and desired outcomes to the NICE Framework.

Project Lab 1: Evaluate Security Controls in a Complex Environment

Description

Learners will evaluate and select appropriate security controls for a simulated situation in the organization–implementing a new HR system. They’ll use project management tools OpenProject and GitLab to track tasks, manage timelines, and document control selection.

To assess systems and implement controls, learners will use a vulnerability scanning tool, Elasticsearch for security monitoring, and OpenVAS for asset management and compliance checks.

During the lab, instructors will inject unexpected scenarios, to include budget cuts, new compliance requirements (for example, a restriction on the use of open-source tools), and simulated security incidents, requiring participants to reevaluate control decisions and adapt to the new resource constraints and evolving regulatory requirements in real time.

Learning Objectives

  • Develop proficiency in translating operational requirements into tailored security controls.
  • Develop proficiency in evaluating, selecting, and implementing tailored security controls in a complex environment.

NICE Mapping

Relevant to the NICE Framework’s Oversight and Governance Work Role Category, with a focus on risk management and strategic decision-making in secure project environments. It also touches on the Protection and Defense Work Role Category by prioritizing safeguards for project integrity and asset protection.

Project Lab 2: Dynamic Data Collection and Leadership Reporting

Description

Learners collect and analyze cybersecurity performance and risk management data to inform critical leadership decisions about security investments. They'll use system logs, compliance reports, and industry threat intelligence feeds.

Using tools such as Kibana for data visualization, and Grafana for custom dashboards, learners will compile, interpret, and present findings.

During the lab, instructors will inject organizational-level changes, such as an urgent requirement from the CEO for a specific data-driven presentation to present to the Board. This will require learners to reprioritize, adjust their data sources and reporting approach to meet the needs of this high-profile requirement.

Learning Objectives

  • Develop proficiency in identifying and gathering relevant security data from multiple sources.
  • Develop proficiency in creating comprehensive and actionable reports tailored to leadership.
  • Develop proficiency in meeting dynamic reporting requirements for unexpected events.

NICE Mapping

Aligned with the Oversight and Governance and Protection and Defense categories in the NICE Framework, focusing on data-driven decision-making and effective communication of project data and insights.

Sum It Up

In this unit we discussed the distinction between performance-based and proficiency-based projects, highlighting how each approach influences learning outcomes. We also examined how the NICE Framework plays a key role in building proficiency.

By focusing on real work tasks in simulated work environments, proficiency-based projects challenge learners to move beyond following instructions, encouraging them to apply their technical, nontechnical, and business skills in their work. Mapping the NICE Framework to proficiency-based projects helps to ensure the training will match real job duties. The labs ensure that employees learn both the technical skills, problem-solving and the adaptive decision-making skills that are critical for many workplace environments.

Resources

Partagez vos commentaires sur Trailhead dans l'aide Salesforce.

Nous aimerions connaître votre expérience avec Trailhead. Vous pouvez désormais accéder au nouveau formulaire de commentaires à tout moment depuis le site d'aide Salesforce.

En savoir plus Continuer à partager vos commentaires