首页> 美国政府科技报告 >Information Technology Security Training Requirements: A Role- and Performance-Based Model
【24h】

Information Technology Security Training Requirements: A Role- and Performance-Based Model

机译:信息技术安全培训要求:基于角色和绩效的模型

获取原文

摘要

This document has been designed as a 'living handbook' to have the longest usefullife possible as the foundation of and structure for 'do-able' training by federal agencies. To avoid unnecessary outdating, the document uses terminology that is not consistent across Federal agencies and broadest in scope in encompass all information processing storage, and transmission resources and technologies--example, 'Information Technology.' A glossary in key terms is provided in an appendix. An extensible set of knowledges, skills, and abilities (KSAs) structure the Training Requirements and are linked to the document through generic IT Security Body of Knowledge, Topics and Concepts categories. Finally, the emphasis of the Training Requirements is on training criteria or standards, rather than on specific curricula or content. The training criteria are established according to trainees' role(s) within their organizations, and are measured by their on-the-job performance.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号