Infosec Skills Cybersecurity Talent Development Playbook
Infosec Skills Cybersecurity Talent Development Playbook
development playbook
12 pre-built training plans to help teams
identify, upskill and retain cybersecurity talent
Introduction
There are more than four million open cyber roles worldwide.
This shortage of cybersecurity talent is magnified by today’s
highly competitive job market — causing many organizations
to see record-high churn rates, recruitment costs and staff
salaries. $138K - $184K
Cost to replace a single
Infosec’s 2021 IT and Security Talent Pipeline Study found cybersecurity employee
that hiring managers experiencing recruiting success were (Source: Gallup and Payscale)
44% more likely to consider candidates with no previous
experience and 67% more likely to report well-defined cyber
roles.
1
Creating a training plan
Role-guided Hands-on
Developing cybersecurity talent and teams We all learn better when we learn by doing.
cannot be a one-size-fits-all approach. It Incorporating elements of hands-on training
is critical to tailor training plans to each will deepen your team’s engagement,
employee’s job role and level of proficiency. accelerate their skill development and
Check out the “Which roles fit your team” increase their knowledge retention. Explore
section to find the right role for each of your our Infosec Skills Roles for relevant hands-on
team members. training opportunities to move your team
from theory to practice.
Measurable
Set your team up for success by identifying Engaging
and tracking training goals. Every Infosec A great way to encourage continuous
Skills Role includes a variety of skill learning is to gamify the experience with
assessments and practice exams, helping micro-credentials. Small yet tangible
you to gather baseline scores and report on milestones will provide your team with the
progress over time. social validation they need to stay motivated.
Every time your employee completes a
learning path on their training roadmap, they
Personalized will earn a certificate of completion.
Beyond immediate training goals, provide
each employee with a long-term career
roadmap. Employees with this insight tend to
have greater confidence in their skills, longer
retention rates and higher job satisfaction.
Twelve sample training plans are provided
below to support the long-term career
development of each Infosec Skills Role.
“We are finding that retention 2021 IT and Security Talent 2021 Cybersecurity Role and
rates are going up in our Pipeline Study Career Path Clarity Study
cybersecurity roles because
Read Now Read Now
people feel like they’re being
listened to. They’re being
provided opportunities that
Developing Cybersecurity Talk to Infosec about
they may not have had before.”
Talent and Teams Ebook role-guided training
2
Which roles fit your team?
Infosec Skills role-guided training is designed to be flexible, whether you want to hit the ground running with an
out-of-the-box training plan or build a custom plan mapped to the NICE Workforce Framework for Cybersecurity or
MITRE ATT&CK® Matrix for Enterprise.
Check out the 12 Roles below and tweak the training plans as necessary to fit your organization’s needs.
Build your team’s skills around Build your team’s operational Build your team’s technical
uncovering vulnerabilities and technology skills and keep your skills and keep your
other security weaknesses. industrial control systems (ICS) organization’s security controls
secure. running smoothly.
Build your team’s cloud Upskill your team to better Upskill your team and gain
security skills and ensure design, implement and a better understanding of
your organization’s cloud maintain secure infrastructure. how to assess and manage
infrastructure is secure. organizational risk.
Build your team’s management Build your team’s privacy skills Upskill your engineering team
skills and ensure your and learn to create a strategic and ensure your software and
organization’s security aligns and comprehensive privacy applications are protected
with business objectives. program. from vulnerabilities.
Create your free Infosec Skills account to browse all 190+ role-guided learning paths.
View Training
4
INFOSEC SKILLS SAMPLE TRAINING PLAN
Cybersecurity Beginner
Cross-train employees and build a baseline of cybersecurity knowledge with the
Cybersecurity Beginner Role training plan. Use the pre-built training below or
customize the plan to meet your organization’s goals.
Linux Fundamentals The Basics: EC-Council CEH Fundamental Privacy Laws & Acts
• Linux architecture • Recon & vulnerability analysis • U.S. federal privacy legislation
• Linux jobs & processes • Web app, wireless & IoT hacking • U.S. healthcare privacy laws
• Linux scripting & automation • Exploitation & exfiltration • Global data protection laws
Other potential Cybersecurity Beginner training: CompTIA ITF+, Certified Reverse Create your free Infosec Skills account to
Engineering Analyst Fundamentals, The Basics: CISA, The Basics: CISM and more. see all role-guided training
6
INFOSEC SKILLS SAMPLE TRAINING PLAN
SOC Analyst
Build a baseline of incident response skills and prepare junior analysts to progress
into more senior positions with the SOC Analyst Role training plan. Use the pre-built
training below or customize the plan to meet your organization’s goals.
Network Traffic Analysis Cyber Range Cyber Threat Hunting Cyber Range
• TShark, Scapy & other tools • Detect port scans
• Examine capture files & live traffic • Find threats in .pcap & .vmem files
• Identify & analyze abnormal traffic • Hunt host-based & network-based threats
Other potential SOC Analyst training: Computer Forensics, Threat Modeling and more. Create your free Infosec Skills account to
see all role-guided training
Other potential Digital Forensics Analyst training: Incident response, Network Traffic Create your free Infosec Skills account to
Analysis for Incident Response, CertNexus CyberSec First Responder and more. see all role-guided training
Penetration Tester
Build your team’s skills around uncovering vulnerabilities and other security
weaknesses with the Penetration Tester Role training plan. Use the pre-built
training below or customize the plan to meet your organization’s goals.
Certified Mobile & Web App Machine Learning for Red Team Certified Expert Penetration
Penetration Tester Hackers Tester
• Pentesting methodologies • Hack CAPTCHA systems • Create Windows exploits
• Pentesting tools • Write evolutionary fuzzer • Create Linux exploits
• Mobile & web app attacks • Evade malware detection • Advanced techniques
Purple Team Web App Cyber Common Attack Types Cyber Resource Development Cyber
Range Range Range
• Remote code execution • Cross-site scripting • Build custom tools
• LFI vulnerability • Cross-site request forgery • Malicious APK & Linux packages
• Web app firewall • Injection attacks • C&C, keyloggers & webshells
Other potential Penetration Tester training: CompTIA PenTest+, Cyber Threat Hunting, Create your free Infosec Skills account to
Reconnaissance Cyber Range and more. see all role-guided training
OT Security Practitioner
Build your team’s operational technology skills and keep your industrial control
systems (ICS) secure with the OT Security Practitioner Role training plan. Use the
pre-built training below or customize the plan to meet your organization’s goals.
Other potential OT Security Practitioner training: CompTIA Security+, Incident Create your free Infosec Skills account to
Response and more. see all role-guided training
Security Engineer
Build your team’s technical skills and keep your organization’s security controls
running smoothly with the Security Engineer Role training plan. Use the pre-built
training below or customize the plan to meet your organization’s goals.
Other potential Security Engineer training: CISSP-ISSEP, Identity and Access Create your free Infosec Skills account to
Management, Advanced Adversary Tactics, Web Application Security and more. see all role-guided training
(ISC)² Certified Cloud Security Professional (CCSP) Identity & Access Management
• Cloud architecture & design • Design & implement IAM system
• Data, platform & app security • IAM security considerations
• Legal, risk & compliance • IAM federal standards
Offensive Bash Scripting Project Container Security Project Identity & Access Management
• Attack virtual machine • Review images
Project
• SQL injection • Docker image best practices • Password policies
• Python reverse shell • Scan for vulnerable software • Access control & authentication
• PKI systems
Other potential Cloud Security Engineer training: AWS Essentials and Solutions Create your free Infosec Skills account to
Architect Associate and more. see all role-guided training
Security Architect
Upskill your team to better design, implement and maintain secure infrastructure
with the Security Architect Role training plan. Use the pre-built training below or
customize the plan to meet your organization’s goals.
NIST DoD RMF AWS Essentials & Solutions Certified SCADA Security Architect
• NIST RMF phases
Architect Associate • SCADA security best practices
• Security authorization processes • Resilient architectures • Authentication & authorization
• Statutory & regulatory requirements • High-performing architectures • Detecting cyber incidents
• Secure apps & architectures
SIEM Architecture & Process Web Server Protection Project Incident Response Project
Project • Implement network filtering • Wireshark, Zeek & Volatility
• Dashboard visualization • Harden host OS • Watering hole attack
• Enrich data • Identify tampered files • SQL injection attack
• Create alerts
Other potential Security Architect training: Threat Modeling, Incident Response, Create your free Infosec Skills account to
CISSP-ISSAP and more. see all role-guided training
NIST DoD RMF Implementing Controls for HIPAA NIST Cybersecurity Framework
• NIST RMF phases
Compliance • Legal guidelines
• Security authorization processes • HIPAA models & protocols • NIST CSF implementation
• Statutory & regulatory requirements • HIPAA controls • CSF components & processes
• HIPAA security incidents
Other potential Information Risk Analyst training: ISACA CISA, CompTIA Cloud+, Create your free Infosec Skills account to
NIST 800-171 and more. see all role-guided training
Core domains
How this role helps my organization » Cybersecurity management
Security Managers often come from two primary » Leadership
backgrounds: technical cybersecurity roles or business and
project management roles. No matter their background, Related job titles
Security Managers require solid relationship-building skills
to make sure your organization’s security is aligned with » Chief information security
your business strategy. An effective training program should officer (CISO)
provide the frameworks, strategies and metrics needed to » Chief security officer (CSO)
help them meet that objective.
» Head of cybersecurity
» VP of cybersecurity
What will my team learn? » Information security
director
The Security Manager Role in Infosec Skills aligns with 68
» Information technology
Knowledge Statements and three Skill Statements in the
manager
NICE Framework, which primarily roll up to the following
competencies:
» Vulnerabilities assessment » Network management
Related NICE Work Roles
» Systems integration » Legal, government and » Information systems
» Risk management jurisprudence
security manager
» Infrastructure design » Information technology
assessment » Authorizing official
» Information systems/
network security » Information assurance » Program manager
» Data privacy and » Incident management
» Privacy officer/compliance
protection » Contracting/procurement
manager
» Project management » Business continuity
» IT project manager
Common frameworks and documentation
» NIST Cybersecurity » ISO/IEC 27001
Framework » CMMC (Federal)
» NIST 800-30 View all Security
» NIST 800-37
Manager training
» NIST 800-53
» NIST 800-171 View Training
22
INFOSEC SKILLS SAMPLE TRAINING PLAN
Security Manager
Build your team’s management skills and ensure your organization’s security aligns
with business objectives with the Security Manager Role training plan. Use the
pre-built training below or customize the plan to meet your organization’s goals.
Other potential Security Manager training: ISACA Certified Information Security Manager (CISM), ISACA Create your free Infosec Skills account to
Certified in Risk and Information Systems Control (CRISC), NIST Cybersecurity Framework and more. see all role-guided training
The Privacy Manager Role in Infosec Skills aligns with 15 » Privacy officer/privacy
Knowledge Statements and four Skill Statements in the compliance manager
NICE Framework, which primarily roll up to the following
competencies:
» Legal, government and » Telecommunications
jurisprudence » Risk management
» Vulnerabilities assessment » Requirements analysis
» Data privacy and » Organizational awareness
protection » Infrastructure design
» Business continuity » Information systems/
» TPO (third party oversight) network security
» Threat analysis
Privacy Manager
Build your team’s privacy skills and learn to create a strategic and comprehensive
privacy program with the Privacy Manager Role training plan. Use the pre-built
training below or customize the plan to meet your organization’s goals.
IAPP Certified Information Privacy Professional/U.S. IAPP Certified Information Privacy Manager (CIPM)
(CIPP/US) • Company vision & team
• Private-sector data use • Implement privacy program
• Government & court data access • Measure & communicate
• Federal, state & workplace laws
Other potential Privacy Manager training: CIPP/Europe (CIPP/E), Certified Create your free Infosec Skills account to
Information Privacy Technologist (CIPT) and more. see all role-guided training
If it’s true that every company is a software company, then Related job titles
Secure Coders are the backbone that keeps your organization
running securely. An effective training program should » Security software developer
include both widely applicable secure coding methodologies » Software testing engineer
as well as training related to specific coding languages within
your organization.
Related NICE Work Roles
» Software developer
What will my team learn? » Secure software assessor
The Secure Coder Role in Infosec Skills aligns with 44
Knowledge Statements and 14 Skill Statements in the
NICE Framework, which primarily roll up to the following
competencies:
» Software development » Information systems/
» Computer languages network security
» Vulnerabilities assessment » Information assurance
» Risk management » Data privacy and
» Infrastructure design protection
» Systems testing and » Identity management
evaluation
26
INFOSEC SKILLS SAMPLE TRAINING PLAN
Secure Coder
Upskill your engineering team and ensure your software and applications are
protected from vulnerabilities with the Secure Coder Role training plan. Use the
pre-built training below or customize the plan to meet your organization’s goals.
Secure Coding Cyber Range Python Code Security Cyber Range C++ Code Security Cyber Range
• Javascript • Common issues • Common issues
• Java • Perform control flow analysis • Perform control flow analysis
• C/C++, PHP & Python • Recognize vulnerabilities • Recognize vulnerabilities
Other potential Secure Coder training: Writing Secure Code for Android, Writing Create your free Infosec Skills account to
Secure Code for iOS, HTML5 Security, PCI DSS for Developers and more. see all role-guided training
28
About Infosec
Infosec believes knowledge is power when fighting cybercrime. We help IT
and security professionals advance their careers with skills development
and certifications while empowering all employees with security
awareness and privacy training to stay cyber-safe at work and home. It’s
our mission to equip all organizations and individuals with the know-how
and confidence to outsmart cybercrime.