The Multiple Environment Threat Exposure of Resources Space Threats and Operational Risk to Missions (METEORSTORM)™ micro-credential training course introduces an innovative solution for experienced and emerging space cybersecurity professionals. This introductory course navigates learners through two knowledge domains. You will explore the Decompostion and Analytic knoweldge domains.
Decompostion Knowledge Domain
- Primary Capability Layer
- Segment Layer
- Service Layer
- Asset Layer
Analytic Knowledge Domain
- SPARTA Enrichmnet
- SPACE Shield Enrichment
- MITRE Fight Enrichment
- MITRE ATLAS Enrichment
Our unique training approach empowers our learning community with real-world tools that can be taken back to their work centers or applied directly to their independent security research the day after they complete their training. Learners will receive a 12-month blockchain verifiable digital badge and 1 CPE credit upon completion of their learning journey.
Course Objectives
- Understand space platform decomposition and analytics
Related NIST NICE Specialty Areas
- Systems Architecture: Develops system concepts and works on the capabilities phases of the systems development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.
- Systems Analysis: Conducts the integration/testing, operations, and maintenance of systems security.
- Cyber Operations: Performs activities to gather evidence on criminal or foreign intelligence entities in order to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.
- Exploitation Analysis: Analyzes collected information to identify vulnerabilities and potential for exploitation.
- Threat Analysis: Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities.
Related NIST NICE Competency Areas
- Artificial Intelligence (AI) Security: This Competency Area describes a learner’s capabilities to secure Artificial Intelligence (AI) against cyberattacks, to ensure it is adequately contained where it is used, and to mitigate the threat AI presents where it or its users have malicious intent.
-
Asset Management: This Competency Area describes a learner’s capabilities to conduct and maintain an accurate inventory of all digital assets, to include identifying, developing, operating, maintaining, upgrading, and disposing of assets.
- Cyber Resiliency: This Competency Area describes a learner’s capability related to architecting, designing, developing, implementing, and maintaining the trustworthiness of systems that use or are enabled by cyber resources in order to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises that use or are enabled by cyber resources
- Supply Chain Security: This Competency Area describes a learner’s capabilities to analyze and control digital and physical risks presented by technology products or services purchased from parties outside your organization.
Related NIST NICE Work Roles
- Defensive Cybersecurity: Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.
- Incident Response: Responsible for investigating, analyzing, and responding to network cybersecurity incidents.
- Threat Analysis: Responsible for collecting, processing, analyzing, and disseminating cybersecurity threat assessments. Develops cybersecurity indicators to maintain awareness of the status of the highly dynamic operating environment.
- Exploitation Analysis: Responsible for identifying access and intelligence collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
- Cyberspace Operations: Responsible for gathering evidence on criminal or foreign intelligence entities to mitigate and protect against possible or real-time threats. Conducts collection, processing, and geolocation of systems to exploit, locate, and track targets. Performs network navigation and tactical forensic analysis and executes on-net operations when directed.
The self-paced online micro-credential format is available for $50.00 USD or €50.00 EUR, depending on your location.
Please complete the registration form below to request a seat in the next available course.