Center for Qualified CyberSecurity Excellence & Mastery

"Where Qualified CyberSecurity Education Happens"

SU and Security University Testing (SUT) Qualified Certificate Programs of Mastery and SUT Certifications has partnered with the National Security Workforce to place over 43 cyber security courses and corresponding SUT Qualified Certifications within the NICE Cybersecurity Framework Mapping. The SU Cybersecruity Maaping Framework Compendium below will help you identify the SU courses and SUT Qualified Certifications necessary to advance your cyber career as a Federal Employee.

Security University maps all Qualified Certificate programs to NICE Framework v2.0 (March 2025) and DoD Cyber Workforce Framework (DCWF) work roles to ensure 8140.03 compliance.

Many of the courses and certifications found on the NICE Cybersecurity Framework are DoD 8140 (DoD 8570) compliant. Visit the DoD 8140 resource page for the full list of associated SUT Certifications.

 
Cybersecurity Workforce Categories
Work Roles
Threat/Warning Analyst
AN-WRL-001
Cyber Crime Investigator
IN-WRL-001
System Administrator
OM-WRL-001
Cyber Defense Infrastructure Support Specialist
PD-WRL-001
Secure Software Developer
SP-WRL-001
Exploitation Analyst
AN-WRL-002
Digital Evidence Analyst
IN-WRL-002
Information Systems Security Manager
OM-WRL-002
Cyber Defense Analyst
PD-WRL-002
Software Assessor
SP-WRL-002
All Source Analyst
AN-WRL-003
Technical Support Specialist
OM-WRL-003
Cyber Defense Incident Responder
PD-WRL-003
Enterprise Architect
SP-WRL-003
Targets Analyst
AN-WRL-004
Network Operations Specialist
OM-WRL-004
Cyber Defense Forensics Analyst
PD-WRL-004
Security Architect
SP-WRL-004
Cyber Intel Planner
AN-WRL-005
Data Center Support Specialist
OM-WRL-005
Insider Threat Analyst
PD-WRL-005
Systems Requirements Planner
SP-WRL-005
Systems Developer
SP-WRL-006
Information Systems Security Engineer
SP-WRL-007
Hardware Assurance Specialist
SP-WRL-008

 

Department of Defense Cyber Workforce Framework (DCWF)

The Department of Defense Cyber Workforce Framework (DCWF) chart below outlines the categories and roles defined under DoDM 8140.03. This framework is used by the DoD to structure and manage cyber workforce qualifications and training. Security University includes this chart to support our students and clients working in or pursuing careers in the federal and military cyber workforce. It complements the NICE Framework chart above, which remains widely used in civilian and academic environments.

 

Cybersecurity Work Roles

Analyze (AN) Back to Top

Work Role: Threat/Warning Analyst - AN-WRL-001
Identifies and assesses threats to information systems.

SU Training Course SUT Certification Work Role Proficiency

*QFE® Qualified/ Forensic Expert Certification Class

SUT *QFE® Qualified/ Forensic Expert Certification & Practical

4: Expert

SUT IDS III: On-site Log Analysis, Event Correlation and Response Certification Class

SUT IDS III: On-site Log Analysis, Event Correlation and Response Certification

4: Expert

Other Mapped SU Training and SUT Certifications:

 

Analyze (AN) Back to Top

Exploitation Analyst - AN-WRL-002
Analyzes collected data to identify vulnerabilities and adversary actions.

SU Training Course SUT Certification Work Role Proficiency

Q/EH® Qualified/ Ethical Hacker Certification Class

SUT Q/EH® Qualified/ Ethical Hacker Certification

3: Advanced

Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class

SUT Q/SA® Qualified/ Security Analyst Penetration Tester Certification

3: Advanced

*Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical

SUT *Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical

4: Expert

*Q/ND® Qualified/ Network Defender Certification Class Practical

SUT *Q/ND® Qualified/ Network Defender Certification

4: Expert

Other Mapped SU Training and SUT Certifications:

 

Analyze (AN) Back to Top

Work Role: All Source Analyst - AN-WRL-003
Uses information from all sources to evaluate and predict cyber threats.

SU Training Course SUT Certification Work Role Proficiency

SU Security + Class and Certification

CompTIA Security + Certification

2: Intermediate

IDS III: On-site Log Analysis, Event Correlation and Response Cert Class

IDS III: On-site Log Analysis, Event Correlation and Response Cert

3: Advanced

Other Mapped SU Training and SUT Certifications:

 

Analyze (AN) Back to Top

Work Role: Targets Analyst - AN-WRL-004
Analyzes and interprets target information to support cyber operations.

SU Training Course SUT Certification Work Role Proficiency

Q/EH® Qualified/ Ethical Hacker Certification Class

SUT Q/EH® Qualified/ Ethical Hacker Certification Class

3: Advanced

Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class

SUT Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class

3: Advanced

Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical

Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical

4: Expert

Q/CDA Qualified/ Cyber Defense Analyst Certification Class

SUT Q/CDA Qualified/ Cyber Defense Analyst Certification Class

3: Advanced

Q/CDA Qualified/ Cyber Defense Analyst Certification Class

SUT Q/CDA Qualified/ Cyber Defense Analyst Certification

3: Advanced

Other Mapped SU Training and SUT Certifications:

 

Analyze (AN) Back to Top

Work Role: Cyber Intel Planner - AN-WRL-005
Plans cyber intelligence support operations.

SU Training Course

SUT Certification

Work Role Proficiency

 

 

 

 

 

 

Other Mapped SU Training and SUT Certifications:

 

Investigate (IN) Back to Top

Work Role: Cyber Crime Investigator - IN-WRL-001
Conducts forensic analysis and investigations into cyber crimes.

SU Training Course SUT Certification Work Role Proficiency

*QFE® Qualified/ Forensic Expert Certification Class Practical

SUT *QFE® Qualified/ Forensic Expert Certification Class Practical

4: Expert

*Q/ND® Qualified/ Network Defender Certification Class Practical

SUT *Q/ND® Qualified/ Network Defender Certification Class Practical

4: Expert

Other Mapped SU Training and SUT Certifications:

 

Investigate (IN) Back to Top

Work Role: Digital Evidence Analyst - IN-WRL-002
Acquires, preserves, and analyzes digital evidence.

SU Training Course SUT Certification Work Role Proficiency

Q/EH® Qualified/ Ethical Hacker Certification Class

SUT Q/EH® Qualified/ Ethical Hacker Certification Class

3: Advanced

*Q/ND® Qualified/ Network Defender Certification Class Practical

SUT *Q/ND® Qualified/ Network Defender Certification Class Practical

3: Advanced

*QFE® Qualified/ Forensic Expert Certification Class Practical

SUT *QFE® Qualified/ Forensic Expert Certification Class Practical

3: Advanced

Other Mapped SU Training and SUT Certifications:

 

Operate & Maintain (OM) Back to Top

Work Role: System Administrator - OM-WRL-001
Installs, configures, and maintains systems.

SU Training Course SUT Certification Work Role Proficiency

Security+

CompTIA Security+

Intermediate

How to Break & FIX Web Security Certification Class

How to Break & FIX Web Security Certification Class

Advanced

Other Mapped SU Training and SUT Certifications:

  • SU Certified Information Security Systems CISSP® Certification Class

 

Operate & Maintain (OM) Back to Top

Work Role: Information Systems Security Manager - OM-WRL-002
Manages organizational cybersecurity requirements.

SU Training Course SUT Certification Work Role Proficiency

Security+

CompTIA Security+

Intermediate

SU How to Break & FIX Web Security Certification Class

SUT How to Break & FIX Web Security Certification Class

Advanced

Other Mapped SU Training and SUT Certifications:

  • SU Certified Information Security Systems CISSP® Certification Class

 

Operate & Maintain (OM) Back to Top

Work Role: Technical Support Specialist - OM-WRL-003
Provides technical assistance and support.

SU Training Course SUT Certification Work Role Proficiency

Security+

CompTIA Security+

2: Intermediate

PowerShell Forensics Certification Class

PowerShell Forensics Certification Class

3: Advanced

Linux/UNIX® Security Certification Class

Linux/UNIX® Security Certification Class

3: Advanced

Other Mapped SU Training and SUT Certifications:

  • SU Certified Information Security Systems CISSP® Certification Class
  • IDS I Catching the Hackers – Introduction to Intrusion Detection Certification Class
  • Introduction to Reverse Engineering Certification

 

Operate & Maintain (OM) Back to Top

Work Role: Network Operations Specialist - OM-WRL-004
Monitors and manages network infrastructure.

SU Training Course SUT Certification Work Role Proficiency

Security+

CompTIA Security+

Intermediate

SU Q/EH® Qualified/ Ethical Hacker Certification Class

SUT Q/EH® Qualified/ Ethical Hacker Certification

Advanced

SU Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class

SUT Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class

Expert

SU Q/PTL® Qualified/ Penetration Tester License Certification Lab Class

SUT Q/PTL® Qualified/ Penetration Tester Certification Class

4: Expert

SU *Q/ND® Qualified/ Network Defender Certification Class Practical

SUT *Q/ND® Qualified/ Network Defender Certification & Practical

4: Expert

Other Mapped SU Training and SUT Certifications:

 

Operate & Maintain (OM) Back to Top

Work Role: Data Center Support Specialist - OM-WRL-005
Maintains data center infrastructure and services.

SU Training Course SUT Certification Work Role Proficiency

Security+

CompTIA Security+

2: Intermediate

SU Q/EH® Qualified/ Ethical Hacker Certification Class

SUT Q/EH® Qualified/ Ethical Hacker Certification

3: Advanced

SU Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class

SUT Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class

3: Advanced

SU Q/PTL® Qualified/ Penetration Tester License Certification Class

SUT Q/PTL® Qualified/ Penetration Tester Certification Class

4: Expert

*Q/ND® Qualified/ Network Defender Certification Class Practical

*Q/ND® Qualified/ Network Defender Certification & Practical

4: Expert

*Q/FE® Qualified/ Forensic Expert Certification & Practical

*Q/FE® Qualified/ Forensic Expert Certification & Practical

4: Expert

Other Mapped SU Training and SUT Certifications:

  • SU Certified Information Security Systems CISSP® Certification Class
  • - PowerShell Forensics Certification Class
  • Python Forensics Certification Class
  • SUT Qualified Forensics Expert

 

Protect & Defend (PD) Back to Top

Work Role: Cyber Defense Infrastructure Support Specialist - PD-WRL-001
Prepares and maintains cybersecurity systems.

SU Training Course SUT Certification Work Role Proficiency

SU Security+ Certification Class

CompTIA Security+

2. Intermediate

SU Q/EH® Qualified/ Ethical Hacker Certification Class

SUT Q/EH® Qualified/ Ethical Hacker Certification Class

3. Advanced

Other Mapped SU Training and SUT Certifications:

 

Protect & Defend (PD) Back to Top

Work Role: Cyber Defense Analyst - PD-WRL-002
Detects and mitigates cybersecurity threats.

SU Training Course SUT Certification Work Role Proficiency

SU Security+ Certification Class

CompTIA Security+

2. Intermediate

SU Q/SA® Qualified/ Security Analyst Penetration Tester

SU Q/SA® Qualified/ Security Analyst Penetration Tester

3. Advanced

SU IDS I Catching the Hackers – Introduction to Intrusion Detection Certification Class

SUT Qualified Intrusion Analyst

3: Advanced

SU IDS II Catching the Hackers II: Systems to Defend Networks Certification Class

SUT Continuous Monitoring Certification

4. Expert

SU IDS III: On-site Log Analysis, Event Correlation and Response Certification Class

IDS III: On-site Log Analysis, Event Correlation and Response Certification Class

4: Expert

SU Q/CDA Qualified/ Cyber Defense Analyst Certification Class

Q/CDA Qualified/ Cyber Defense Analyst Certification Class

4: Expert

Other Mapped SU Training and SUT Certifications:

 

Protect & Defend (PD) Back to Top

Work Role: Cyber Defense Incident Responder - PD-WRL-003
Responds to cybersecurity incidents.

SU Training Course SUT Certification Work Role Proficiency

SU Security + Certification Class

CompTIA Security + Certification

2. Intermediate

SU Q/EH® Qualified/ Ethical Hacker Certification Class

SUT Q/EH® Qualified/ Ethical Hacker Certification Class

3. Advanced

SU QFE® Qualified/ Forensic Expert Certification Class Practical

SUT *QFE® Qualified/ Forensic Expert Certification Class Practical

3: Advanced

Other Mapped SU Training and SUT Certifications:

 

Protect & Defend (PD) Back to Top

Work Role: Cyber Defense Forensics Analyst - PD-WRL-004
Performs forensic analysis of cyber incidents.

SU Training Course SUT Certification Work Role Proficiency

Enterprise Threat and Vulnerability Assessment

N/A

2. Intermediate

SU How to Break  & FIX Web Security Certification Class & Web App Penetration Testing

SUT How to Break  & FIX Web Security Certification Class

3. Advanced

SU Q/EH® Qualified/ Ethical Hacker Certification Class

SUT Q/EH® Qualified/ Ethical Hacker Certification Class

3: Advanced

SU Q/SA® Qualified/ Security Analyst Certification Class

SUT Q/SA Qualified/ Security Analyst Penetration Tester Certification Class

4: Expert

SU *Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical

SUT *Q/PTL® Qualified/ Penetration Tester License Class/ Workshop Practical

4. Expert

Advanced Penetration Testing, Exploit Writing, and Ethical Hacking

SUT Exploit Researcher and Advanced Penetration Tester

4. Expert

Other Mapped SU Training and SUT Certifications:

 

Protect & Defend (PD) Back to Top

Work Role: Insider Threat Analyst - PD‑WRL‑005
Detects and mitigates threats posed by internal users or compromised insiders.

SU Training Course SUT Certification Work Role Proficiency

 

 

 

 

 

 

 

 

 

Other Mapped SU Training and SUT Certifications:

 

Securely Provision (SP) Back to Top

Work Role: Secure Software Developer - SP-WRL-001
Develops secure software to protect information systems.

SU Training Course SUT Certification Work Role Proficiency

SU *Q/SSE® Qualified/ Software Security Expert Certification Class

SUT *Q/SSE® Qualified/ Software Security Expert Certification

3: Advanced

SU Q/SSPT® Qualified/ Software Security Penetration Tester Certification Class

SUT Q/SSPT® Qualified/ Software Security Penetration Tester Certification

3: Advanced

SU How to Break & FIX Web Security Certification Class

SUT How to Break & FIX Web Security Certification

3: Advanced

Other Mapped SU Training and SUT Certifications:

  • Fundamentals of Secure Software Programming Certification
  • Q/SH/D® Qualified/ Software Hacker / Defender Certification
  • Q/STBP® Qualified/ Software Tester Best Practices Certification

 

Securely Provision (SP) Back to Top

Work Role: Software Assessor - SP-WRL-002
Assesses software for security vulnerabilities.

SU Training Course SUT Certification Work Role Proficiency

SU Security+ Certification Class

CompTIA Security+

2: Intermediate

SU CISSP®Qualified Information Security Systems Professional Class

ISC2 CISSP Information Security
Systems Professional

2. Intermediate

SU Linux/UNIX® Security Certification Class

CompTIA Linux+

2: Intermediate

Other Mapped SU Training and SUT Certifications:

  • Forensics, Incident Handling / Q/FE: SUT Qualified/Forensics Expert
  • and Q/SA – Q/PTL Qualified/Security Analyst & Q/PTL Qualified/ Penetration Tester License
  • Ethical Hacking / Q/EH: SUT Qualified Ethical Hacker

 

Securely Provision (SP) Back to Top

Work Role: Enterprise Architect - SP-WRL-003
Develops enterprise-level security architecture.


*S0374 -Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.
*K0003 - Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
*K0198 - Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).
*K0002 - Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
*K0214 - Knowledge of the Risk Management Framework Assessment Methodology.
*K0264 - Knowledge of program protection planning (e.g. information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements).
*S0060 - Skill in writing code in a currently supported programming language (e.g., Java, C++).
*K0030 - Knowledge of electrical engineering as applied to computer architecture (e.g., circuit boards, processors, chips, and computer hardware).
*K0043 - Knowledge of industry-standard and organizationally accepted analysis principles and methods.
*K0024 - Knowledge of database systems.
*K0063 - Knowledge of parallel and distributed computing concepts.
*K0200 - Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
*K0291 - Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.)
*K0293 - Knowledge of integrating the organization’s goals and objectives into the architecture.
*S0005 - Skill in applying and incorporating information technologies into proposed solutions.
*S0122 - Skill in the use of design methods.
*A0008 - Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture.
*A0027 Ability to apply an organization's goals and objectives to develop and maintain architecture.
*A0060 Ability to build architectures and frameworks.

SU Training Course SUT Certification Work Role Proficiency

SU Q/ND® Qualified/ Network Defender Certification Class Practical

SUT Q/ND® Qualified/ Network Defender Certification Class Practical

3: Advanced

SU Q/ISP Qualified/ Information Security Professional Certificate Program of Mastery

SU Q/ISP® Qualified/ Information Security Professional Certificate Program of Mastery

3: Expert

SU Cloud Computing Security Knowledge Certification

Cloud Computing Security Knowledge Certification

3: Advanced

 

Securely Provision (SP) Back to Top

Work Role: Security Architect - SP-WRL-004
Designs security systems and infrastructure.

SU Training Course SUT Certification Work Role Proficiency

SU *Q/ND® Qualified/ Network Defender Certification Class Practical

SUT *Q/ND® Qualified/ Network Defender Certification Class Practical

3: Advanced

SU Q/AA RMF Risk Management Framework - Qualified/ Authorization & Accreditation Class

SUT Q/AA RMF Risk Management Framework - Qualified/ Authorization & Accreditation Class

3: Advanced

Other Mapped SU Training and SUT Certifications:

  • Security + Certification
  • SUT Q/CDA Qualified/ Cyber Defense Analyst Certification Class
  • SUT IDS II Catching the Hackers II: Systems to Defend Networks Certification Class

 

Securely Provision (SP) Back to Top

Work Role: Systems Requirements Planner - SP-WRL-005
Determines system requirements for cybersecurity needs.

SU Training Course SUT Certification Work Role Proficiency

SU Certified ISO 27001 ISMS® Lead Auditor Class

 

SUT Certified ISO 27001 SU ISMS® Lead Auditor Certification

2: Intermediate

SU Certified ISO 27001 ISMS® Lead Implementer Certification Class

SUT Certified ISO 27001 SU ISMS® Lead Implementer Certification

2: Intermediate

Other Mapped SU Training and SUT Certifications:

  • Security+ Class and Certification / SU CISSP® Certification Class
  • SUT Information Certified ISO 27001
  • SU ISMS® Lead Implementer Certification Class
  • SU Q/ISO Qualified/ Chief Information Security Officer Certification Class
  • SU Q/CSO Qualified/Cyber Security Officer Certification Class

 

Securely Provision (SP) Back to Top

Work Role: Systems Developer - SP-WRL-006
Develops IT systems that incorporate security controls.

SU Training Course SUT Certification Work Role Proficiency

*Q/SSE® Qualified/ Software Security Expert 5 Day Bootcamp Certification Class

*Q/SSE® Qualified/ Software Security Expert 5 Day Bootcamp Certification Class

3: Advanced

How to Break & FIX Web Security Certification Class

How to Break & FIX Web Security Certification Class

3: Advanced

Other Mapped SU Training and SUT Certifications:

  • SU Security+ Class and CompTIA Security+ Certification
  • SU Certified Information Security Systems CISSP® Certification Class
  • How to Break & FIX Software Security Certification Class
  • Fundamentals of Secure Software Programming Certification
  • Q/SH/D® Qualified/ Software Hacker / Defender Certification Class

 

Securely Provision (SP) Back to Top

Work Role: Information Systems Security Engineer - SP-WRL-007
Designs and implements security solutions.

SU Training Course SUT Certification Work Role Proficiency

SU Q/AA RMF Risk Management Framework - Qualified/ Authorization & Accreditation Class*

SUT Q/AA RMF Risk Management Framework - Qualified/ Authorization & Accreditation

3: Advanced

SU Q/SA® Qualified/ Security Analyst Penetration Tester Certification Class

SUT Q/SA® Qualified/ Security Analyst Penetration Tester Certification

3: Advanced

SUF Cloud Computing Security Knowledge Certification

SUT CCSK Cloud Computing Security Knowledge Certification

3: Advanced

Other Mapped SU Training and SUT Certifications:

  • SU Security+ Class and CompTIA Security+ Certification
  • SU Certified Information Security Systems CISSP® Certification Class
  • Q/SSE® Qualified/ Software Security Expert 5 Day Bootcamp Certification
  • Q/STP® Qualified Software Testing Bootcamp Certification Class
  • How to Break & FIX Web Security Certification, Q/EH Qualified/
  • /PTL® Qualified/ Penetration Tester License Class/ Workshop Practical
  • Ethical Hacking, and Exploitation Techniques
  • Q/CDA Qualified/ Cyber Defense Analyst Certification Class

 

Securely Provision (SP) Back to Top

Work Role: Hardware Assurance Specialist - SP-WRL-008
Ensures the integrity and security of hardware components.

SU Training Course SUT Certification Work Role Proficiency

 

 

 


Ensuring a Trained and Certified and Qualified/ Cyber Security Workforce

Since our first Q/SA- Q/PTL class SU provided at SANS Orlando 1999, SU's "hands-on training" and SUT Certifications have pioneered performance based competency based cybersecurity training with practicals to validate cyber skills, going way beyond theory based classes, to learn hands-on skills necessary to defend our networks and our national critical infrastructure against foreign and domestic threats. Using the proven “Schneider Method” of stacked (successively more challenging) instructor led hands-on, competency-based cyber curricula of 40 hour classes over 2, 6, or 8 weeks to develop key cyber skills for cyber careers.

20 years of competency based experience demonstrates SU's capability to build a certified and qualified workforce focusing on advanced tactical deep knowledge; instructor and peer validated skills and real world applications needed to prove your team can meet Federal Contract requirements.

The NICE Cybersecurity Framework provides a blueprint to categorize, organize, and describe cybersecurity work into Specialty Areas, Categories and new Work Roles. Identifying the needs of a trained, certified and qualified workforce, is further by defining critical tasks, knowledge, skills and abilities (KSAs). The Cybersecurity Workforce Framework provides a common language to help define professional work requirements in cybersecurity speak on resumes, job role descriptions and career objectives’.

Using the NICE Cybersecurity Framework

SU classes and SUT Certifications are mapped to the NICE Cybersecurity Workrole Framework. For ease of use we have formatted both the downloadable .pdf and the Interactive Map utilizing the work role as the basis.

Everything you need to know about that job role, specialty area, and map to SU Instructor Led Training Courses and the affiliated SUT Certifications are located on one page or section; including the SU Course, SUT Certification, and proficiency levels. To maintain organizational integrity, SU and SUT NICE Framework approach includes only courses and certifications that mapp and made sense.

Basic Information About Proficiency Levels

Basic - Training maps to many knowledge statements, simpler skills, and tasks that are pre-requisites to an employee being effective in this job role.

Intermediate - Training maps to many mid-level knowledge, skills, abilities and tasks. Employee can be reasonably effective in this job role after receiving training.

Advanced - Maps to higher level knowledge, skills, abilities, and tasks. Employee should be very effective in this functional area after receiving training. However, some lower level, pre-requisite KSAs may not be covered by these courses.

Expert - Maps to few very specific KSAs or tasks in a highly focused area. This training assumes someone is already well trained and effective in this job role overall. It focuses on expertise in a very specific, narrow area.