It explains how to create queries for hardware (HW) and software (SW) assets and introduces a framework for using data reports to inform risk-based decision-making. This course is a recording of a virtual two-hour course and presents an ES-4 overview of how the dashboard provides visibility into the metrics and measurements needed for a continuous monitoring program. Operate and Maintain Systems Administration, Systems Analysis System Administrator, Systems Security AnalystĬDM 142 – Asset Management with the CDM Agency Dashboard Training Proficiency Area: Level 1 - BeginnerĪlignment to the NIST SP 800-181 Cybersecurity Workforce Framework Category Instructor demonstrates the CDM Agency Dashboard.Understand CDM Agency Dashboard basic features and functionality.Register to join the next live iteration of this course via. ![]() It explains basic features and navigation within the environment, and includes demonstrations using the new CDM Agency Dashboard to identify and report on vulnerabilities. This course is a recording of a virtual two-hour course which provides participants with the essential knowledge of the ES-4 version of the CDM Agency Dashboard. He also discusses how the CDM Dashboard supports the implementation of Endpoint Detection and Response (EDR).ĬDM 141 – Introduction to the CDM Agency Dashboard Richard Grabowski, acting CDM PMO, explains CDM Enabled Threat Hunting (CETH) and how CETH benefits the federal agencies. Micro Learn: The CDM PMO speaks about CDM Enabled Threat Hunting (CETH) and the CDM Agency Dashboard IT Investment/Portfolio Manager, IT Program Auditor, IT Project Manager, Product Support Manager, Program Manager Program/Project Management and Acquisition System Administrator, Systems Security Analyst Training Proficiency Area: Level 1 - BasicĪlignment to the NIST SP 800-181 Cybersecurity Workforce Framework Dave Otto, the Risk expert of the CDM program, explains the Binding Operational Directive 22-01, the CISA KEV (Known Exploited Vulnerabilities) Catalog, and how agencies can better protect their assets. ![]() Micro Learn: CISA’s Binding Operative Directive (BOD) 22-01 and the Known Exploited Vulnerabilities (KEV) catalog
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |