Page 15 - Skills Development Program Booklet Mobile
P. 15

Information Security



                   Core Skills Development Opportunities (cont.)


                     Information Assurance                            Incident Detection and Response

                        Security, Privacy Policy & Standards             Perimeter Defense


                        Data Security                                    End Point Defense

                        Data Privacy                                     Lateral Movement

                        Identity Management &                            Enterprise Audit Log Management


                        Authentication                                     & Visibility

                        Vulnerability Management                         Incident Management

                     Risk Management                                     Digital Forensics


                        Enterprise IT Service Continuity                 Network Forensics

                        IT Impacts to Business Priorities

                        Risk Management Concepts &

                        Fundamentals


                        Privacy Fundamentals & Impacts









                   Building Coalitions, Leading People, Leading Change, Business Acumen, Driving Results


                   To access the LMS learning portal visit https://ams.hhs.gov, Select HHS Learning Portal,

                   under Open Access Internet, Scroll down to Catalog Search, and Search by course name.



                   To view Soft Skills Courses offered by the CMS Leadership Institute (CMSLI), view the

                   catalog at http://intranet.cms.gov/Component/OOM/DTD/PDF/CMS-Leadership-

                   Institute-Catalog.pdf.




     15            Version 1.0 – November 2016

   Version        INTERNAL CMS USE ONLY! INFORMATION NOT RELEASABLE TO THE PUBLIC UNLESS AUTHORIZED BY LAW: This information has not been publicly
    1.0 –         disclosed and may be privileged and confidential. This document must not be disseminated, distributed, or copied to persons not authorized to
                  receive the information. Unauthorized disclosure may result in prosecution to the full extent of the law.
   Octobe
   r 2016
   10   11   12   13   14   15   16   17   18   19   20