ABOUT CYBRSCORE. EMPLOYER SUPERPOWER ABILITIES

RECOMMENDED TRAINING:
The examinee demonstrated a high-moderate practical knowledge and understanding of the core principles of Application
Security.
Based on the above scores, the following CYBRScore Education is recommended:
• Cybersecurity Nexus Practitioner
Examinee may also benefit from more specific technology or language education, including:
• Penetration Testing and Exploitation
• Malware Reverse Engineering
• Network Forensics
Sample Report
Note: Assessment’s recommendations are limited in nature and are only suggested improvement guidelines for training. To provide the most effective training possible, it is recommended one
view’s the complete CYBRScore course catalog and class descriptions before making a skills improvement plan.
Recommend Training offers supplemental training suggestions for job-role competencies where user can
improve
EM P LOYER SUP E RP OWE R AB IL I TI E S B E S TO W E D.
• Accurately measure employee competencies
• Build teams with tailored skills
• Prevent costly hiring errors
• Offset liability
• Demonstrate compliance
• Increase confidence in employee performance, and confidence of employees
A BO U T CYBRSCORE .
CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies
a user’s ability to defend a network. Leveraging the NICE framework, CYBRScore creates the complete endto-end experience, delivering targeted, outcome-oriented cyber security training experiences that provide
users with confidence to get the job done.
In a world of recognized certifications and written knowledge-based exams, our solutions stand out
by providing real insight into actual on-ground cyber security skills, and the capability to support your
knowledge base with demonstrated network defense skills. Headquartered in Annapolis, Maryland,
CYBRScore’s offerings include turnkey and custom training, hands-on labs, and performance assessment for
individual skill set and defined job-role competencies.
CYBRScore
Comtech Command & Control Technologies TM
275 West Street, Annapolis, MD 21401
www.cybrscore.io
© 2017, Comtech Telecommunications Corp. All rights reserved.
T H E RE I S A VE RY E XP E NSIVE P R O B L E M CU R R E N TLY FA CI N G TH E CY BER
D EMO N S T R AT E C O MPET EN C E + D O L L A R S I N Y O U R POCK E T.
S ECU RI TY WORKFORCE .
• According to IBM’s 11th annual Cost of Data Breach Study, the industry’s gold-standard benchmark
research, the average consolidated total cost of a data breach is $4 million
CY B RSCORE SKI L L S A SSE SSMEN T R EPO R T
• Additionally, the study puts the likelihood of a material data breach involving 10,000 lost or stolen records
in the next 24 months at 26 percent
REPORT
CY B RSCORE SKI LDETAILED
L S A SSE
SSMEN T R EPO R T
SPECIALTY AREA: COMPUTER NETWORK DEFENSE ANALYSIS
OVERALL SCORE:
THE OVERALL SCORE REPRESENTS
DETAILED REPORT
LIKELY CANDIDATE SUCCESS
CANDIDATE NAME: JOHN SMITH
• With a growing, vast employee pool shortage, companies need to retain and obtain qualified cyber
security professionals in key job roles
APPLICANT TRACKING ID: 3798767656
TEST DATE: MAY 01 2016
SPECIALTY
AREA:
COMPUTER
NETWORK DEFENSE ANALYSIS
CLIENT: TECH
STAFFING
AGENCY
CANDIDATE
NAME:
JOHN SMITH
REGISTRATION
ID: 653777
APPLICANT TRACKING ID: 3798767656
GIVEN THOSE STATISTICS, WOULD YOU BET $4 MILLION ON YOUR
EMPLOYEE’S ABILITY TO DEFEND YOUR NETWORK?
LIKELIHOOD OF SUCCESS.
Sample Report
THE OVERALL SCORE REPRESENTS
LIKELY CANDIDATE SUCCESS
TEST DATE: MAY 01 2016
IN THIS
JOB.falls
HIGHER
Overall
Score
provides
user
onSCORES
determined grading criteria,
CLIENT:
TECH
STAFFING
AGENCY numerical value as to where the
ARE ASSOCIATED WITH HIGHER
REGISTRATION ID: 653777
between 0 - LIKELIHOOD
100
OF SUCCESS.
NETWORK MANAGEMENT
COMPETENCY SCORES:
H IG H
KSA’s
alike, the CYBRScore Skills Assessment is mapped to the NIST-NICE framework and uses practical, hands-on
scenarios to evaluate one’s mastery of knowledge, skills and abilities.
N E T WUse
O Rnetwork
K M Amanagement
N A G E M tools
E N Tto monitor network
traffic
Likely toDiagnose
be a strength
failed servers
KSA’s
H IG H
identifying skill levels for both current and prospective employees.
R E A L-TI M E ASSE SSME NT P ROC E S S.
H IG H
INFO SYSTEMS/NETWORK SECURITY
Somewhat unlikely to be a strength
O P E RSkill
ATinI Nsystem
G SYadmin
ST EforMUnix/Linux
S
operating systems
virtual machines
Likely toSkill
beina using
strength
H IG H
Skill in developing & deploying signatures
INFO SYSTEMS/NETWORK
SECURITY
Skill in discerning the projection
needs of info systems
& networks
Somewhat
unlikely to be a strength
M O D ERAT E
Knowledge of security event correlation tools
Knowledge of file extensions
KSA’s
10/10
Skill in using virtual machines
Knowledge of security event correlation tools
Knowledge of current & emerging threats/threat vectors
Knowledge of file extensions
HIGH-
Knowledge of database procedures used for
documenting & querying reported incidents
Knowledge of disaster recovery continuity of operations
HIGHplanlikely to be a strength
Somewhat
M O D E R AT E
Knowledge of enterprise incident response program
KSA’s Knowledge of root cause analysis for incidents
Skill in recovering
failedprocedures
servers
Knowledge
of database
used for
Skill in performing
root cause
analysis
for incidents
documenting
& querying
reported
incidents
INCIDENT MANAGEMENT
Knowledge of disaster recovery continuity of operations
7/10
plan
Knowledge of enterprise incident response program
Knowledge of root cause analysis for incidents
Skill in recovering failed servers
Skill in performing root cause analysis for incidents
7/10
I T A R Knowledge
C H I T E CofTtroubleshooting
URE
basic systems
Somewhat
unlikelyof to
be a strength
Knowledge
windows
command line
Knowledge of current & emerging threats/threat vectors
Knowledge of host/network access controls
Skill in developing & deploying signatures
Knowledge of known vulnerabilities from alerts
Skill in discerning the projection needs of info systems
4/10
& networks
Knowledge of file system implementations
Knowledge
of network
systems managementMprinciples
Somewhat
likely to
be a strength
O D E R AT E
10/10
KSA’s
LOW-
Knowledge of file system implementations
Knowledge
of troubleshooting
basic
systems
Skill
in utilizing
virtual networks
for testing
Knowledge
of windows
command
line
Skill
in system
admin for
Unix/Linux
operating systems
Diagnose failed servers
LOWM O D ERAT E
KSA’s
Skill in utilizing virtual networks for testing
KSA’s
Correct physical & technical problems
I N C I DKnowledge
E N T MofA the
N Arange
GEM
N T networks
of E
existing
set of tasks. It provides immediate feedback, follows industry standards, and saves time and money by
Likely to be a strength
Knowledge of the range of existing networks
Test & configure network workstations & peripherals
Knowledge of network systems management principles
Use network management tools to monitor network
10/10
traffic
Correct physical & technical problems
The CYBRScore Skills Assessment can holistically and quantifiably measure a user’s skills against a defined
O P E R AT I N G SY ST E M S
KSA’s
Test & configure network workstations & peripherals
an organization’s cyber security workforce. A valuable tool for companies, recruiters and professionals
OUT OF 100
COMPETENCY SCORES:
Likely to be a strength
The CYBRScore Skills Assessment is a virtual computer-skills assessment designed to accurately evaluate
IN THIS JOB. HIGHER SCORES
OVERALL
ARE ASSOCIATED SCORE:
WITH HIGHER
80
OUT OF 100
80
LOWM O D E R AT E
10/10
KSA’s
Knowledge of the enterprise IT architecture
CONFIGURATION
MANAGEMENT
Knowledge of host/network
access controls
of known vulnerabilities from alerts L OW
UnlikelyKnowledge
to be a strength
4/10
KSA’s
Knowledge of secure configuration management
I T A RKnowledge
C H I T E CofTremote
U R Eaccess technology concepts
techniques
CONFIGURATION
MANAGEMENT
Knowledge of IT architectural concepts & frameworks
Somewhat
unlikely to be a strength
M O D E R AT E
Unlikelycapabilities
to be a strength
& limitations
KSA’s
KSA’s
LOW-
Knowledge of parallel & distributed computing concepts
Knowledge of collection management processes,
L OW
Knowledge of the enterprise IT architecture
Knowledge of remote access technology concepts
4/10
Knowledge of IT architectural concepts & frameworks
Knowledge of parallel & distributed computing concepts
Skill in configuring & utilizing hardware-based computer
protection components
Skill in configuring
& utilizing
network
protection
Knowledge
of secure
configuration
management
components
techniques
Knowledge of collection management processes,
capabilities & limitations
2/10
Skill in configuring & utilizing hardware-based computer
protection components
Skill in configuring & utilizing network protection
components
4/10
2/10
RECOMMEND ED TRAINING:
Sample Report
The examinee demonstrated a high-moderate practical knowledge and understanding of the core principles of Application
Security.
Competency Scores
detail user’s strengths and weaknesses in specific job-role competencies
RECOMMENDED
TRAINING:
Based on the above scores, the following CYBRScore Education is recommended:
• Cybersecurity Nexus Practitioner
The examinee demonstrated a high-moderate practical knowledge and understanding of the core principles of Application
Security.
Examinee may also benefit from more specific technology or language education, including:
• Penetration Testing and Exploitation
Based
on the above
scores,
the following CYBRScore Education is recommended:
• Malware
Reverse
Engineering
•• Cybersecurity
Nexus Practitioner
Network Forensics
Examinee may also benefit from more specific technology or language education, including:
Note: Assessment’s
recommendations
are and
limitedExploitation
in nature and are only suggested improvement guidelines for training. To provide the most effective training possible, it is recommended one
• Penetration
Testing