Our Space, Cybersecurity, Operations, and Resilience Platform Professional (SCOR-P2)™ micro-credential training course introduces an innovative solution for experienced and emerging space cybersecurity professionals. This introductory course navigates learners through eight core knowledge domains developed from a uniquely crafted combination of foundational standards, real-world operational experience, and focus on emerging space cybersecurity capability requirements.
- In module one, your training will start with an introduction to space platform decomposition and analytics using our Multiple Environment Threat Exposure of Resources Space Threats and Operational Risk to Missions (METEORSTORM) framework for converged space platforms.
- In module two, you will be introduced to Space Collective Defense through Collective Development, Collective Research, and Collective Response. This module ensures the learner knows the critical importance of understanding organizational and communal space platform exposure.
- In module three, you will close out your learning path with Threat Management, Resilience Engineering, and Breach Detection & Response Management.
Our unique training approach empowers our learning community with real-world tools that can be taken back to their work centers or applied directly to their independent security research the day after they complete their training. Learners will receive a 12-month blockchain verifiable digital badge and 4 CPE credits upon completion of their learning journey.
Course Objectives
- Understand space platform decomposition and analytics
- Prepare Space Collective Defense capability concepts for Collective Development, Collective Research, and Collective Response
- Develop space platform Threat Management, Resilience Engineering, and Breach Detection & Response Management capability concepts
Related NIST NICE Specialty Areas
- Systems Architecture: Develops system concepts and works on the capabilities phases of the systems development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.
- Systems Analysis: Conducts the integration/testing, operations, and maintenance of systems security.
- Cyber Operations: Performs activities to gather evidence on criminal or foreign intelligence entities in order to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.
- Exploitation Analysis: Analyzes collected information to identify vulnerabilities and potential for exploitation.
- Threat Analysis: Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities.
Related NIST NICE Competency Areas
- Artificial Intelligence (AI) Security: This Competency Area describes a learner’s capabilities to secure Artificial Intelligence (AI) against cyberattacks, to ensure it is adequately contained where it is used, and to mitigate the threat AI presents where it or its users have malicious intent.
-
Asset Management: This Competency Area describes a learner’s capabilities to conduct and maintain an accurate inventory of all digital assets, to include identifying, developing, operating, maintaining, upgrading, and disposing of assets.
- Cyber Resiliency: This Competency Area describes a learner’s capability related to architecting, designing, developing, implementing, and maintaining the trustworthiness of systems that use or are enabled by cyber resources in order to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises that use or are enabled by cyber resources
- DevSecOps: This Competency Area describes a learner’s capabilities to integrate security as a shared responsibility throughout the development, security, and operations (DevSecOps) life cycle of technologies.
- Supply Chain Security: This Competency Area describes a learner’s capabilities to analyze and control digital and physical risks presented by technology products or services purchased from parties outside your organization.
Related NIST NICE Work Roles
- Defensive Cybersecurity: Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.
- Incident Response: Responsible for investigating, analyzing, and responding to network cybersecurity incidents.
- Threat Analysis: Responsible for collecting, processing, analyzing, and disseminating cybersecurity threat assessments. Develops cybersecurity indicators to maintain awareness of the status of the highly dynamic operating environment.
- Exploitation Analysis: Responsible for identifying access and intelligence collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
- Cyberspace Operations: Responsible for gathering evidence on criminal or foreign intelligence entities to mitigate and protect against possible or real-time threats. Conducts collection, processing, and geolocation of systems to exploit, locate, and track targets. Performs network navigation and tactical forensic analysis and executes on-net operations when directed.
The self-paced online micro-credential format is available for $250.00 USD or €250.00 EUR, depending on your location.
Please complete the registration form below to request a seat in the next available course.