Page 15 - IT SDP_SeKON
P. 15

Information Security



                   Core Skills Development Opportunities (cont.)


                     Information Assurance                            Incident Detection and Response

                        Security, Privacy Policy & Standards             Perimeter Defense


                        Data Security                                    End Point Defense

                        Data Privacy                                     Lateral Movement

                        Identity Management &                            Enterprise Audit Log Management


                        Authentication                                     & Visibility

                        Vulnerability Management                         Incident Management

                     Risk Management                                     Digital Forensics


                        Enterprise IT Service Continuity                 Network Forensics

                        IT Impacts to Business Priorities

                        Risk Management Concepts &

                        Fundamentals

                        Privacy Fundamentals & Impacts








                   Building Coalitions, Leading People, Leading Change, Business Acumen, Driving Results

                   To access the LMS learning portal visit https://ams.hhs.gov, Select HHS Learning Portal,

                   under Open Access Internet, Scroll down to Catalog Search, and Search by course name.


                   To view Soft Skills Courses offered by the CMS Leadership Institute (CMSLI), view the

                   catalog at http://intranet.cms.gov/Component/OOM/DTD/PDF/CMS-Leadership-

                   Institute-Catalog.pdf.


     15            Version 1.0 – January 2017

                  INTERNAL CMS USE ONLY! INFORMATION NOT RELEASABLE TO THE PUBLIC UNLESS AUTHORIZED BY LAW: This information has not been publicly
                  disclosed and may be privileged and confidential. This document must not be disseminated, distributed, or copied to persons not authorized to
                  receive the information. Unauthorized disclosure may result in prosecution to the full extent of the law.
   10   11   12   13   14   15   16   17   18   19   20