Length: 2 Days
Print Friendly, PDF & Email

DoDD 8140 – DoD Directive 8140: Cyberspace Workforce Qualification and Management Program Training by Tonex

MIL-1553 Training | MIL-STD-1553 Training

The DoDD 8140 course is designed to provide a comprehensive understanding of the DoD Directive 8140, which pertains to the Cyberspace Workforce Qualification and Management Program. Participants will gain insights into the policies, responsibilities, and procedures associated with the qualification of personnel within the DoD cyberspace workforce.

The course will cover key topics such as workforce structure, program objectives, compliance, and personnel information management, enabling participants to effectively contribute to the cybersecurity efforts within the Department of Defense.

Learning Objectives:
Upon completing this course, participants will be able to:

  • Understand the principles and importance of the DoD Cyberspace Workforce
  • Qualification and Management Program.
  • Identify the roles and responsibilities within the cyberspace workforce structure.
  • Comprehend the program objectives and procedures for workforce qualification.
  • Apply governance and compliance measures within the cyberspace workforce.
  • Recognize the reporting requirements for cyberspace personnel information management.

Target Audience:
This course is suitable for individuals working within the Department of Defense and related organizations, including:

  • Information Security Professionals
  • IT Managers
  • Cybersecurity Analysts
  • Personnel responsible for workforce qualification and management
  • Compliance and governance personnel within the cyberspace workforce

Course Outline:

Introduction to DoD Cyberspace Workforce

  • Overview of DoD Directive 8140
  • Importance of Cyberspace Workforce Qualification
  • Role of Cyberspace Workforce in DoD Operations
  • Overview of Job Categories Using the DoD 8140 Framework
  • Overview of Job Categories
  • Information Assurance Technical (IAT)
  • Information Assurance Management (IAM)
  • Information Assurance Security Architecture and Engineering (IASAE)
  • Cyber Security Service Provider (CSSP)

Cyberspace Workforce Structure

  • Identifying Cyberspace Work Roles
  • Organizational Structure
  • Workforce Classification and Responsibilities

DoD Cyberspace Workforce Qualification and Management Program

  • Program Objectives and Goals
  • Procedures for Qualification
  • Program Implementation Framework

Governance and Compliance

  • Governance Principles
  • Compliance Requirements
  • Auditing and Monitoring
  • Penalties for Non-compliance

Cyberspace Workforce Compliance Responsibilities

  • Responsibilities of Managers and Supervisors
  • Individual Compliance Responsibilities
  • Reporting Incidents and Non-compliance

Cyberspace Workforce Compliance Reviews

  • Conducting Compliance Reviews
  • Reporting Findings
  • Corrective Action Plans

Cyberspace Personnel Information Management

  • Reporting Requirements for Personnel Information
  • Handling and Safeguarding Personnel Data
  • Data Retention and Disposal

Case Studies and Practical Exercises

  • Real-world scenarios and case studies related to DoD Cyberspace Workforce compliance and qualification.

Course Delivery:

  • The course will be delivered through a combination of lectures, presentations, case studies, and practical exercises.
  • Participants will have access to course materials and resources for reference.

Assessment:

  • Participants will be assessed through quizzes, assignments, and a final examination to evaluate their understanding of the course material.

By the end of this course, participants will have a solid foundation in DoDD 8140 and the DoD Cyberspace Workforce Qualification and Management Program, enabling them to contribute effectively to cybersecurity efforts within the Department of Defense:

  • Security Provision:
    • This category encompasses roles such as architecture, engineering, and operations, including information assurance compliance, software development, security engineering, system development, and research, among others.

    Operate/Maintain:

    • Roles in this category involve customer service, technical support, data administration, knowledge management, network services, and security analysis.

    Protect/Defend:

    • This category focuses on defense against cyberattacks, defense analysis, incident reporting, vulnerability assessment, and related areas.

    Analyze:

    • This category relates to various forms of network analysis, resource intelligence, exploitation analysis, threat analysis, and similar functions.

    Operate/Collect:

    • This category is applicable to cyber operations and planning, collection operations, planning, and implementation.

    Oversight and Development:

    • This category deals with the legal aspects of conducting operations in the digital realm, with an emphasis on planning, education, and awareness.

    Investigate:

    • This category is relevant to investigative and forensic work concerning online security and related issues.

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.