RECOMMENDED TRAINING: The examinee demonstrated a high-moderate practical knowledge and understanding of the core principles of Application Security. Based on the above scores, the following CYBRScore Education is recommended: • Cybersecurity Nexus Practitioner Examinee may also benefit from more specific technology or language education, including: • Penetration Testing and Exploitation • Malware Reverse Engineering • Network Forensics Sample Report Note: Assessment’s recommendations are limited in nature and are only suggested improvement guidelines for training. To provide the most effective training possible, it is recommended one view’s the complete CYBRScore course catalog and class descriptions before making a skills improvement plan. Recommend Training offers supplemental training suggestions for job-role competencies where user can improve EM P LOYER SUP E RP OWE R AB IL I TI E S B E S TO W E D. • Accurately measure employee competencies • Build teams with tailored skills • Prevent costly hiring errors • Offset liability • Demonstrate compliance • Increase confidence in employee performance, and confidence of employees A BO U T CYBRSCORE . CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network. Leveraging the NICE framework, CYBRScore creates the complete endto-end experience, delivering targeted, outcome-oriented cyber security training experiences that provide users with confidence to get the job done. In a world of recognized certifications and written knowledge-based exams, our solutions stand out by providing real insight into actual on-ground cyber security skills, and the capability to support your knowledge base with demonstrated network defense skills. Headquartered in Annapolis, Maryland, CYBRScore’s offerings include turnkey and custom training, hands-on labs, and performance assessment for individual skill set and defined job-role competencies. CYBRScore Comtech Command & Control Technologies TM 275 West Street, Annapolis, MD 21401 www.cybrscore.io © 2017, Comtech Telecommunications Corp. All rights reserved. T H E RE I S A VE RY E XP E NSIVE P R O B L E M CU R R E N TLY FA CI N G TH E CY BER D EMO N S T R AT E C O MPET EN C E + D O L L A R S I N Y O U R POCK E T. S ECU RI TY WORKFORCE . • According to IBM’s 11th annual Cost of Data Breach Study, the industry’s gold-standard benchmark research, the average consolidated total cost of a data breach is $4 million CY B RSCORE SKI L L S A SSE SSMEN T R EPO R T • Additionally, the study puts the likelihood of a material data breach involving 10,000 lost or stolen records in the next 24 months at 26 percent REPORT CY B RSCORE SKI LDETAILED L S A SSE SSMEN T R EPO R T SPECIALTY AREA: COMPUTER NETWORK DEFENSE ANALYSIS OVERALL SCORE: THE OVERALL SCORE REPRESENTS DETAILED REPORT LIKELY CANDIDATE SUCCESS CANDIDATE NAME: JOHN SMITH • With a growing, vast employee pool shortage, companies need to retain and obtain qualified cyber security professionals in key job roles APPLICANT TRACKING ID: 3798767656 TEST DATE: MAY 01 2016 SPECIALTY AREA: COMPUTER NETWORK DEFENSE ANALYSIS CLIENT: TECH STAFFING AGENCY CANDIDATE NAME: JOHN SMITH REGISTRATION ID: 653777 APPLICANT TRACKING ID: 3798767656 GIVEN THOSE STATISTICS, WOULD YOU BET $4 MILLION ON YOUR EMPLOYEE’S ABILITY TO DEFEND YOUR NETWORK? LIKELIHOOD OF SUCCESS. Sample Report THE OVERALL SCORE REPRESENTS LIKELY CANDIDATE SUCCESS TEST DATE: MAY 01 2016 IN THIS JOB.falls HIGHER Overall Score provides user onSCORES determined grading criteria, CLIENT: TECH STAFFING AGENCY numerical value as to where the ARE ASSOCIATED WITH HIGHER REGISTRATION ID: 653777 between 0 - LIKELIHOOD 100 OF SUCCESS. NETWORK MANAGEMENT COMPETENCY SCORES: H IG H KSA’s alike, the CYBRScore Skills Assessment is mapped to the NIST-NICE framework and uses practical, hands-on scenarios to evaluate one’s mastery of knowledge, skills and abilities. N E T WUse O Rnetwork K M Amanagement N A G E M tools E N Tto monitor network traffic Likely toDiagnose be a strength failed servers KSA’s H IG H identifying skill levels for both current and prospective employees. R E A L-TI M E ASSE SSME NT P ROC E S S. H IG H INFO SYSTEMS/NETWORK SECURITY Somewhat unlikely to be a strength O P E RSkill ATinI Nsystem G SYadmin ST EforMUnix/Linux S operating systems virtual machines Likely toSkill beina using strength H IG H Skill in developing & deploying signatures INFO SYSTEMS/NETWORK SECURITY Skill in discerning the projection needs of info systems & networks Somewhat unlikely to be a strength M O D ERAT E Knowledge of security event correlation tools Knowledge of file extensions KSA’s 10/10 Skill in using virtual machines Knowledge of security event correlation tools Knowledge of current & emerging threats/threat vectors Knowledge of file extensions HIGH- Knowledge of database procedures used for documenting & querying reported incidents Knowledge of disaster recovery continuity of operations HIGHplanlikely to be a strength Somewhat M O D E R AT E Knowledge of enterprise incident response program KSA’s Knowledge of root cause analysis for incidents Skill in recovering failedprocedures servers Knowledge of database used for Skill in performing root cause analysis for incidents documenting & querying reported incidents INCIDENT MANAGEMENT Knowledge of disaster recovery continuity of operations 7/10 plan Knowledge of enterprise incident response program Knowledge of root cause analysis for incidents Skill in recovering failed servers Skill in performing root cause analysis for incidents 7/10 I T A R Knowledge C H I T E CofTtroubleshooting URE basic systems Somewhat unlikelyof to be a strength Knowledge windows command line Knowledge of current & emerging threats/threat vectors Knowledge of host/network access controls Skill in developing & deploying signatures Knowledge of known vulnerabilities from alerts Skill in discerning the projection needs of info systems 4/10 & networks Knowledge of file system implementations Knowledge of network systems managementMprinciples Somewhat likely to be a strength O D E R AT E 10/10 KSA’s LOW- Knowledge of file system implementations Knowledge of troubleshooting basic systems Skill in utilizing virtual networks for testing Knowledge of windows command line Skill in system admin for Unix/Linux operating systems Diagnose failed servers LOWM O D ERAT E KSA’s Skill in utilizing virtual networks for testing KSA’s Correct physical & technical problems I N C I DKnowledge E N T MofA the N Arange GEM N T networks of E existing set of tasks. It provides immediate feedback, follows industry standards, and saves time and money by Likely to be a strength Knowledge of the range of existing networks Test & configure network workstations & peripherals Knowledge of network systems management principles Use network management tools to monitor network 10/10 traffic Correct physical & technical problems The CYBRScore Skills Assessment can holistically and quantifiably measure a user’s skills against a defined O P E R AT I N G SY ST E M S KSA’s Test & configure network workstations & peripherals an organization’s cyber security workforce. A valuable tool for companies, recruiters and professionals OUT OF 100 COMPETENCY SCORES: Likely to be a strength The CYBRScore Skills Assessment is a virtual computer-skills assessment designed to accurately evaluate IN THIS JOB. HIGHER SCORES OVERALL ARE ASSOCIATED SCORE: WITH HIGHER 80 OUT OF 100 80 LOWM O D E R AT E 10/10 KSA’s Knowledge of the enterprise IT architecture CONFIGURATION MANAGEMENT Knowledge of host/network access controls of known vulnerabilities from alerts L OW UnlikelyKnowledge to be a strength 4/10 KSA’s Knowledge of secure configuration management I T A RKnowledge C H I T E CofTremote U R Eaccess technology concepts techniques CONFIGURATION MANAGEMENT Knowledge of IT architectural concepts & frameworks Somewhat unlikely to be a strength M O D E R AT E Unlikelycapabilities to be a strength & limitations KSA’s KSA’s LOW- Knowledge of parallel & distributed computing concepts Knowledge of collection management processes, L OW Knowledge of the enterprise IT architecture Knowledge of remote access technology concepts 4/10 Knowledge of IT architectural concepts & frameworks Knowledge of parallel & distributed computing concepts Skill in configuring & utilizing hardware-based computer protection components Skill in configuring & utilizing network protection Knowledge of secure configuration management components techniques Knowledge of collection management processes, capabilities & limitations 2/10 Skill in configuring & utilizing hardware-based computer protection components Skill in configuring & utilizing network protection components 4/10 2/10 RECOMMEND ED TRAINING: Sample Report The examinee demonstrated a high-moderate practical knowledge and understanding of the core principles of Application Security. Competency Scores detail user’s strengths and weaknesses in specific job-role competencies RECOMMENDED TRAINING: Based on the above scores, the following CYBRScore Education is recommended: • Cybersecurity Nexus Practitioner The examinee demonstrated a high-moderate practical knowledge and understanding of the core principles of Application Security. Examinee may also benefit from more specific technology or language education, including: • Penetration Testing and Exploitation Based on the above scores, the following CYBRScore Education is recommended: • Malware Reverse Engineering •• Cybersecurity Nexus Practitioner Network Forensics Examinee may also benefit from more specific technology or language education, including: Note: Assessment’s recommendations are and limitedExploitation in nature and are only suggested improvement guidelines for training. To provide the most effective training possible, it is recommended one • Penetration Testing
© Copyright 2026 Paperzz