Skip to main content
  • Textbook
  • © 2019

The NICE Cyber Security Framework

Cyber Security Intelligence and Analytics

Authors:

  • Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE)
  • Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training
  • Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more

Buy it now

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (13 chapters)

  1. Front Matter

    Pages i-xx
  2. Introduction

    • Izzat Alsmadi
    Pages 1-7
  3. Acquisition Management

    • Izzat Alsmadi
    Pages 9-40
  4. Continuity Planning and Disaster Recovery

    • Izzat Alsmadi
    Pages 41-51
  5. Cyber Defense Analysis and Support

    • Izzat Alsmadi
    Pages 53-73
  6. Cyber Intelligence

    • Izzat Alsmadi
    Pages 75-90
  7. Cyber Intelligence Analysis

    • Izzat Alsmadi
    Pages 91-134
  8. Cyber Operational Planning

    • Izzat Alsmadi
    Pages 135-179
  9. Cyber Policy and Strategy Management

    • Izzat Alsmadi
    Pages 181-203
  10. Cyber Threat Analysis

    • Izzat Alsmadi
    Pages 205-242
  11. Cyber Security Management

    • Izzat Alsmadi
    Pages 243-251
  12. Forensics Analysis

    • Izzat Alsmadi
    Pages 253-312
  13. Identity Management

    • Izzat Alsmadi
    Pages 313-329
  14. Incident Response

    • Izzat Alsmadi
    Pages 331-346
  15. Back Matter

    Pages 347-354

About this book

This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.
  • Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) 

  • Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training

  • Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more


Authors and Affiliations

  • Texas A&M University, San Antonio, USA

    Izzat Alsmadi

About the author

Dr. Izzat Alsmadi is an Assistant Professor in the department of computing and cyber security at the Texas A&M, San Antonio. He has his master and PhD in Software Engineering from North Dakota State University. He has more than 100 conference and journal publications. His research interests include: Software security, software engineering, software testing, social networks and software defined networking. He is lead editor of Information Fusion for Cyber-Security Analytics, Alsmadi, Izzat M, Karabatis, George, Aleroud, Ahmed, Springer, 2017. The author is also a member of The National Initiative for Cybersecurity Education (NICE) group, which meets frequently to discuss enhancements on cyber security education at the national level.

Bibliographic Information

Buy it now

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access