Encyclopedia AllABCDEFGHIJKLMNOPQRSTUVWXYZ A ACTEDS ACTEDS (Army Civilian Training, Education and Development System): Historical/Legacy system for managing Army civilian training... Learn More → AI Learn More → ATO ATO (Authority to Operate): Official management decision to authorize operation of an information system and... Learn More → Authority to Operate ATO (Authority to Operate): Official management decision to authorize operation of an information system and... Learn More → C CAP CAP (Cybersecurity Apprenticeship Program): A structured training program that combines on-the-job learning with technical instruction... Learn More → CAWF CAWF (Cyber Workforce Framework): A common foundation to organize and describe cybersecurity work. Provides a... Learn More → CBT CBT (Computer-Based Training): Original delivery method for cyber workforce training before WBT became standard. Learn More → CEH Original 8570 Approved Certifications: Legacy Categories Initial list of commercial certifications approved for DOD IA/cybersecurity... Learn More → CEMAP CEMAP (Cyber Exchange Management Assignment Program): Early rotation program for developing cyber workforce expertise. Learn More → Certification Management The process of tracking, maintaining, and updating professional certifications for cybersecurity personnel. Learn More → Chief Information Officer CIO (Chief Information Officer): Senior executive responsible for information technology strategy and systems, including cybersecurity... Learn More → CIO CIO (Chief Information Officer): Senior executive responsible for information technology strategy and systems, including cybersecurity... Learn More → CISSP CISSP (Certified Information Systems Security Professional): A globally recognized certification for information security professionals, covering... Learn More → CMMC CMMC (Cybersecurity Maturity Model Certification): A unified standard for implementing cybersecurity across the Defense Industrial... Learn More → CND-SP CND-SP (Computer Network Defense Service Provider): Legacy category for specialized defensive cyberspace operations roles under... Learn More → Compliance Tracking Monitoring and documenting adherence to regulatory requirements and security standards. Learn More → CompTIA CompTIA: Computing Technology Industry Association - Organization that issues professional certifications for the IT industry,... Learn More → CompTIA Security+ Original 8570 Approved Certifications: Legacy Categories Initial list of commercial certifications approved for DOD IA/cybersecurity... Learn More → Computing Environment Certification Legacy Requirement Early requirement focusing on specific computing environment expertise (Windows, Unix/Linux, etc.). Learn More → CSWF CSWF (Cyber Security Workforce Framework): Early iteration of the cyber workforce framework that bridged between... Learn More → Cyber Range A virtual environment used for cybersecurity training and skills development through simulated scenarios and attacks. Learn More → Cyber Workforce Framework CAWF (Cyber Workforce Framework): A common foundation to organize and describe cybersecurity work. Provides a... Learn More → Cybersecurity Apprenticeship Program CAP (Cybersecurity Apprenticeship Program): A structured training program that combines on-the-job learning with technical instruction... Learn More → D DCPDS DCPDS (Defense Civilian Personnel Data System): Legacy system for managing civilian personnel data before modern... Learn More → DCWF DCWF (DOD Cyber Workforce Framework): Framework that defines and codes cyber work roles and tasks... Learn More → DCWS DCWS (Defense Civilian Workforce System): System for managing civilian workforce personnel actions and data, including... Learn More → Defense Civilian Workforce System DCWS (Defense Civilian Workforce System): System for managing civilian workforce personnel actions and data, including... Learn More → DISA Baseline DISA Baseline Certifications: Original certification requirements established by Defense Information Systems Agency. Learn More → DoD Cyber Workforce Framework DCWF (DOD Cyber Workforce Framework): Framework that defines and codes cyber work roles and tasks... Learn More → DoDI DoDI (Department of Defense Instruction): Issuances that implement DOD policy established in DOD directives. Provides... Learn More → F FIPS FIPS (Federal Information Processing Standards): Standards developed by NIST for federal computer systems, including security... Learn More → FISMA FISMA (Federal Information Security Management Act): Law that defines cybersecurity framework for federal information systems,... Learn More → G Gap Analysis Assessment of the difference between current workforce capabilities and required competencies. Learn More → GSEC Original 8570 Approved Certifications: Legacy Categories Initial list of commercial certifications approved for DOD IA/cybersecurity... Learn More → I IAM Level IAM Levels I-III: Legacy Categories Original management categories under 8570.01 for Information Assurance Management positions,... Learn More → IASAE Level IASAE Levels I-III:Legacy Categories System Architecture and Engineering categories under 8570.01, focusing on system security... Learn More → IASS IASS (Information Assurance Scholarship Program): Legacy Program Early DOD initiative established by the National Defense... Learn More → IAT Level IAT Levels I-III: Legacy Categories Original technical categories under 8570.01 that defined certification requirements for... Learn More → Information Assurance Internship Program Predecessor to modern cyber workforce development programs. Learn More → Information Assurance Training Legacy term for cybersecurity training programs under 8570. Learn More → Information Assurance Workforce Term used before "cybersecurity workforce" became 8140: DOD Directive 8140 establishes policies and responsibilities for... Learn More → ISSM Information Systems Security Manager (ISSM): Predecessor to modern cybersecurity management roles. Learn More → ISSO Information Systems Security Officer (ISSO): Historical role that evolved into various specialized cybersecurity positions. Learn More → IT Workforce Development Original program focusing on general IT skills before the specialization into cybersecurity roles. Learn More → J Joint Qualification Standards Early attempts to standardize cyber workforce requirements across military branches. Learn More → K KSA KSA (Knowledge, Skills, and Abilities): Specific competencies required for cyber workforce positions. Used in job... Learn More → KSAs KSAs (Knowledge, Skills, and Abilities): Specific competencies required for cyber workforce positions. Used in job... Learn More → L Legacy Position Coding Original system for coding cyber positions before current DCWF codes. Learn More → Legacy Role Mapping Process of converting positions from old IA categories to new cyber workforce categories. Learn More → M Manual Tracking Systems Early methods of tracking workforce certifications and qualifications before automated systems. Learn More → Manual Waiver Manual Waiver Process: Historical process for requesting exceptions to certification requirements. Learn More → MCIT DOD Mission Critical Information Technology (MCIT): Transitional Framework Early classification system for identifying critical IT... Learn More → ML ML (Machine Learning See Also: Artificial Intelligence. Machine Learning (ML) and Artificial Intelligence (AI)- Advanced computing... Learn More → N Network Security Administrator Network Security Administrator: Early designation for roles now split into multiple specialized network security positions. Learn More → NICE NICE (National Initiative for Cybersecurity Education): Framework for cybersecurity education, training, and workforce development. Provides... Learn More → NICE 1.0 NICE 1.0 Framework (2012): Transitional Framework Initial version of the NICE Framework that helped standardize... Learn More → NICE 2.0 NICE 2.0 Framework (2014): Transitional Framework Updated version that introduced the concept of work roles... Learn More → NIST NIST (National Institute of Standards and Technology): Federal agency that develops cybersecurity standards and guidelines,... Learn More → O Original Compliance Reporting Initial methods for tracking and reporting workforce certification status. Learn More → P Position Management The process of creating, modifying, and tracking position descriptions and requirements within an organization. Learn More → Q Qualification Standards Original standards used to evaluate cyber workforce candidates before current KSA-based evaluation. Learn More → R Risk Management Framework RMF (Risk Management Framework): Framework for managing organizational risk related to information systems. Includes six... Learn More → RMF RMF (Risk Management Framework): Framework for managing organizational risk related to information systems. Includes six... Learn More → S Security Operations Center SOC (Security Operations Center): Facility where information security issues are monitored and addressed. Central point... Learn More → Skill Matrix A visual tool that maps employees' skills against required competencies for different cyber work roles. Learn More → SOC SOC (Security Operations Center): Facility where information security issues are monitored and addressed. Central point... Learn More → T Talent Pipeline A pool of candidates being developed for current and future cybersecurity positions through training and... Learn More → Training Management System Software platform for administering, documenting, tracking, and reporting educational courses and programs. Learn More → W WBT WBT (Web-Based Training): Training delivered through web browsers and internet technologies. Enables flexible, self-paced learning... Learn More → Work Role A specific grouping of cyber work and requirements for a position. Defines the tasks, knowledge,... Learn More → Workforce Analytics The analysis of workforce data to improve human resource management, including skills gap analysis, training... Learn More → Workforce Development Strategic approach to improving employees' capabilities through training, education, and career development opportunities. Learn More → Workforce Management The integrated set of processes organizations use to optimize employee productivity, including time tracking, scheduling,... Learn More → Z Zero Trust Security concept that requires strict identity verification for every person and device trying to access... Learn More → Zero-Trust Security concept that requires strict identity verification for every person and device trying to access... Learn More →